⚠ Actively exploited
Added to CISA KEV on 2025-08-12. Federal agencies required to patch by 2025-09-02. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2013-3893 — Use After Free in Microsoft Internet Explorer
Severity
8.8HIGHNVD
EPSS
81.2%
top 0.83%
CISA KEV
KEV
Added 2025-08-12
Due 2025-09-02
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 18
KEV addedAug 12
KEV dueSep 2
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages1 packages
🔴Vulnerability Details
2💥Exploits & PoCs
5Exploit-DB
▶