CVE-2013-3893

HIGH KEV

Microsoft Internet Explorer - Use After Free

Title source: rule

Description

Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.

Exploits (4)

metasploit WORKING POC NORMAL
by Unknown, sinn3r, Rich Lundeen · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_setmousecapture_uaf.rb
patchapalooza STUB
by travelworld · client-side
https://github.com/travelworld/cve_2013_3893_trigger.html
exploitdb WORKING POC
by SlidingWindow · javascriptlocalwindows
https://www.exploit-db.com/exploits/49872
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/28682

Scores

CVSS v3 8.8
EPSS 0.8121
EPSS Percentile 99.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2025-08-12
VulnCheck KEV 2013-09-21
ENISA EUVD EUVD-2013-3825

Classification

CWE
CWE-399 CWE-416
Status draft

Affected Products (7)

microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer
microsoft/internet_explorer

Timeline

Published Sep 18, 2013
KEV Added Aug 12, 2025
Tracked Since Feb 18, 2026