CVE-2013-3893
HIGH KEVMicrosoft Internet Explorer - Use After Free
Title source: ruleDescription
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
Exploits (4)
metasploit
WORKING POC
NORMAL
by Unknown, sinn3r, Rich Lundeen · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_setmousecapture_uaf.rb
patchapalooza
STUB
by travelworld · client-side
https://github.com/travelworld/cve_2013_3893_trigger.html
exploitdb
WORKING POC
by SlidingWindow · javascriptlocalwindows
https://www.exploit-db.com/exploits/49872
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/28682
References (12)
Scores
CVSS v3
8.8
EPSS
0.8121
EPSS Percentile
99.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2025-08-12
VulnCheck KEV
2013-09-21
ENISA EUVD
EUVD-2013-3825
Classification
CWE
CWE-399
CWE-416
Status
draft
Affected Products (7)
microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer
Timeline
Published
Sep 18, 2013
KEV Added
Aug 12, 2025
Tracked Since
Feb 18, 2026