CVE-2013-1311

Microsoft Internet Explorer 8 - Use After Free

Title source: llm

Description

Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."

Exploits (1)

exploitdb WORKING POC VERIFIED
by Scott Bell · rubyremotewindows
https://www.exploit-db.com/exploits/25999

Scores

EPSS 0.4607
EPSS Percentile 97.6%

Details

CWE
CWE-416
Status published
Products (1)
microsoft/internet_explorer 8
Published May 15, 2013
Tracked Since Feb 18, 2026