Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
No PoCs from references.
- https://github.com/Khal1d-AL1/Cyberdefenders-Malware-Traffic-Analysis-1
- https://github.com/Khal1d-AL1/Cyberdefenders-Malware-Traffic-Analysis-3
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/khaled190/Cyberdefenders-Malware-Traffic-Analysis-1
- https://github.com/whitfieldsdad/cisa_kev