Skip to main content
Published Mar 06, 2013 | Updated Sep 15, 2017


Severe |Detected with Windows Defender Antivirus

Aliases: Exploit-FHV!CVE2013-1493 (McAfee) Exp/20131493-G (Sophos) Exp/20131493-A (Sophos) Exploit.Java.CVE-2013-1493.gen (Kaspersky) Java/CVE_2013_1493.NT!exploit (other)


Windows Defender detects and removes this threat.

This threat uses a Java vulnerability (CVE-2013-1493) to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and if you have a vulnerable version of Java.

The following versions of Java are vulnerable:

  • Oracle Java JDK and JRE 7 Update 15 and earlier
  • Oracle Java JDK and JRE 6 Update 41 and earlier
  • Oracle Java JDK and JRE 5 Update 40 and earlier

To check if you're running a vulnerable version of Java:

  1. In Control Panel, double-click Programs.
  2. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You might get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful. This doesn't mean that you have been hacked; it means someone has tried to hack into your PC.

Find out ways that malware can get on your PC.

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find other, hidden malware.

Update Java

Make sure you install all available Java updates. You can read more about this vulnerability and download software updates from these links:

You should remove older versions of Java, as keeping old and unsupported versions of Java on your PC is a serious security risk:

If you continue to get alerted about this threat, deleting your temporary Java files can help:

It's also important to keep your other software up to date:

Clear the cache

You should delete your temporary Internet files so your security software doesn't continue to detect this threat:

Get more help

You can also see our advanced troubleshooting page for more help.

If you’re using Windows XP, see our Windows XP end of support page.

Follow us