Oracle Java 7U11 JMX Remote Code Execution Exploit

The default Java security properties configuration does not restrict access to certain objects in the com.sun.jmx.mbeanserver packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
2013 R1
Released Date: 
Thursday, March 7, 2013 - 00:00