{"id":"CVE-2022-45419","details":"If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox \u003c 107.","modified":"2026-05-04T08:42:36.131535Z","published":"2022-12-22T20:15:45Z","withdrawn":"2026-05-04T08:42:36.131535Z","related":["openSUSE-SU-2024:12518-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1716082"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"107.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45419.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}