Search for vulnerabilities
Vulnerability details: VCID-9eqa-kuhe-gkf6
Vulnerability ID VCID-9eqa-kuhe-gkf6
Aliases CVE-2024-7527
Summary Unexpected marking work at the start of sweeping could have led to a use-after-free.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
epss 0.00371 https://api.first.org/data/v1/epss?cve=CVE-2024-7527
cvssv3.1 8.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
ssvc Track https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2024-7527
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2024-33/
ssvc Track https://www.mozilla.org/security/advisories/mfsa2024-33/
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2024-34/
ssvc Track https://www.mozilla.org/security/advisories/mfsa2024-34/
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2024-35/
ssvc Track https://www.mozilla.org/security/advisories/mfsa2024-35/
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2024-37/
ssvc Track https://www.mozilla.org/security/advisories/mfsa2024-37/
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2024-38/
ssvc Track https://www.mozilla.org/security/advisories/mfsa2024-38/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json
https://api.first.org/data/v1/epss?cve=CVE-2024-7527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2303144 https://bugzilla.redhat.com/show_bug.cgi?id=2303144
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:128.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:128.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:128.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:128.0.1:*:*:*:*:*:*:*
CVE-2024-7527 https://nvd.nist.gov/vuln/detail/CVE-2024-7527
mfsa2024-33 https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
mfsa2024-33 https://www.mozilla.org/security/advisories/mfsa2024-33/
mfsa2024-34 https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
mfsa2024-34 https://www.mozilla.org/security/advisories/mfsa2024-34/
mfsa2024-35 https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
mfsa2024-35 https://www.mozilla.org/security/advisories/mfsa2024-35/
mfsa2024-37 https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
mfsa2024-37 https://www.mozilla.org/security/advisories/mfsa2024-37/
mfsa2024-38 https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
mfsa2024-38 https://www.mozilla.org/security/advisories/mfsa2024-38/
RHSA-2024:5322 https://access.redhat.com/errata/RHSA-2024:5322
RHSA-2024:5323 https://access.redhat.com/errata/RHSA-2024:5323
RHSA-2024:5324 https://access.redhat.com/errata/RHSA-2024:5324
RHSA-2024:5325 https://access.redhat.com/errata/RHSA-2024:5325
RHSA-2024:5326 https://access.redhat.com/errata/RHSA-2024:5326
RHSA-2024:5327 https://access.redhat.com/errata/RHSA-2024:5327
RHSA-2024:5328 https://access.redhat.com/errata/RHSA-2024:5328
RHSA-2024:5329 https://access.redhat.com/errata/RHSA-2024:5329
RHSA-2024:5391 https://access.redhat.com/errata/RHSA-2024:5391
RHSA-2024:5392 https://access.redhat.com/errata/RHSA-2024:5392
RHSA-2024:5393 https://access.redhat.com/errata/RHSA-2024:5393
RHSA-2024:5394 https://access.redhat.com/errata/RHSA-2024:5394
RHSA-2024:5395 https://access.redhat.com/errata/RHSA-2024:5395
RHSA-2024:5396 https://access.redhat.com/errata/RHSA-2024:5396
RHSA-2024:5402 https://access.redhat.com/errata/RHSA-2024:5402
RHSA-2024:5527 https://access.redhat.com/errata/RHSA-2024:5527
RHSA-2024:5528 https://access.redhat.com/errata/RHSA-2024:5528
show_bug.cgi?id=1871303 https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
USN-6966-1 https://usn.ubuntu.com/6966-1/
USN-6995-1 https://usn.ubuntu.com/6995-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/ Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-7527
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2024-33/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/ Found at https://www.mozilla.org/security/advisories/mfsa2024-33/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2024-34/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/ Found at https://www.mozilla.org/security/advisories/mfsa2024-34/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2024-35/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/ Found at https://www.mozilla.org/security/advisories/mfsa2024-35/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2024-37/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/ Found at https://www.mozilla.org/security/advisories/mfsa2024-37/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2024-38/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/ Found at https://www.mozilla.org/security/advisories/mfsa2024-38/
Exploit Prediction Scoring System (EPSS)
Percentile 0.58104
EPSS Score 0.00371
Published At Aug. 5, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:09:04.549515+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2024/mfsa2024-34.yml 37.0.0