CVE-2013-1311
Microsoft Internet Explorer 8 - Use After Free
Title source: llmDescription
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Scott Bell · rubyremotewindows
https://www.exploit-db.com/exploits/25999
Scores
EPSS
0.4607
EPSS Percentile
97.6%
Details
CWE
CWE-416
Status
published
Products (1)
microsoft/internet_explorer
8
Published
May 15, 2013
Tracked Since
Feb 18, 2026