Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-3893

KEV EPSS 82.61% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-3893

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Internet Explorer 远程代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Internet Explorer(IE)是美国微软(Microsoft)公司开发的一款Web浏览器,是Windows操作系统附带的默认浏览器。 Microsoft IE 6至11版本中的mshtml.dll文件中的SetMouseCapture功能实现中存在远程代码执行漏洞,该漏洞源于程序访问内存中已被删除或尚未正确分配的对象。攻击者可借助特制的网站并诱使用户查看该网站,利用该漏洞在IE中的当前用户的上下文中执行任意代码,可造成内存损坏。成功利用此漏洞的攻击者可获得与当前用户相同的用户权限。如果当前用户
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-3893

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-3893

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-09-18 · 20 CVEs total

CVE-2013-1727Mozilla Firefox 跨站脚本漏洞
CVE-2013-1738Mozilla Firefox/Thunderbird/SeaMonkey 释放后重用漏洞
CVE-2013-1737Mozilla Firefox/Thunderbird/SeaMonkey DOM代理权限许可和访问控制漏洞
CVE-2013-1736Mozilla Firefox/Thunderbird/SeaMonkey 内存损坏漏洞
CVE-2013-1735Mozilla Firefox/Thunderbird/SeaMonkey 释放后重用漏洞
CVE-2013-1732Mozilla Firefox/Thunderbird/SeaMonkey 缓冲区溢出漏洞
CVE-2013-1731Mozilla Firefox GL跟踪功能不可信搜索路径漏洞
CVE-2013-1730Mozilla Firefox/Thunderbird/SeaMonkey 缓冲区溢出漏洞
CVE-2013-1729Mozilla Firefox WebGL信息泄露漏洞
CVE-2013-1728Mozilla Firefox/Thunderbird/SeaMonkey IonMonkey JavaScript引擎缓冲区溢出漏洞
CVE-2013-1718Mozilla Firefox/Thunderbird/SeaMonkey 浏览器引擎多个内存损坏漏洞
CVE-2013-1726Mozilla Firefox/Thunderbird/SeaMonkey 权限许可和访问控制漏洞
CVE-2013-1725Mozilla Firefox/Thunderbird/SeaMonkey 缓冲区溢出漏洞
CVE-2013-1724Mozilla Firefox/Thunderbird/SeaMonkey 释放后重用漏洞
CVE-2013-1723Mozilla Firefox/Thunderbird/SeaMonkey NativeKey窗口部件缓冲区溢出漏洞
CVE-2013-1722Mozilla Firefox/Thunderbird/SeaMonkey Animation Manager 释放后重用漏洞
CVE-2013-1721Mozilla Firefox/SeaMonkey ANGLE 整数溢出漏洞
CVE-2013-1720Mozilla Firefox/Thunderbird/SeaMonkey 缓冲区溢出漏洞
CVE-2013-1719Mozilla Firefox/Thunderbird/SeaMonkey 浏览器引擎多个安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2013-3893

No comments yet


Leave a comment