Description
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
Published: 2013-03-11
Score: 8.8 High
EPSS: 91.3% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Oct 2025 01:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Fri, 07 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-03-28'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Microsoft Internet Explorer Windows 7 Windows 8 Windows Rt Windows Server 2003 Windows Server 2008 Windows Server 2012 Windows Vista Windows Xp
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-22T00:05:43.584Z

Reserved: 2013-03-10T00:00:00.000Z

Link: CVE-2013-2551

cve-icon Vulnrichment

Updated: 2024-08-06T15:44:32.085Z

cve-icon NVD

Status : Deferred

Published: 2013-03-11T10:55:01.070

Modified: 2025-10-22T01:15:49.670

Link: CVE-2013-2551

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses