Oracle Java Applet2ClassLoader Remote Code Execution Exploit

The sun.plugin2.applet.Applet2ClassLoader class of Oracle Java does not properly validate if the URL of a Java class file matches the "codebase" parameter while loading applets. This vulnerability allows an applet to execute arbitrary code outside the sandbox without restrictions, which can be exploited to install an agent on the target machine.
Exploit type: 
Vulnerabilty ID: 
Released Date: 
Monday, April 4, 2011 - 19:00