Oracle Java JAX-WS Remote Code Execution Exploit

The default Java security properties configuration did not restrict access to certain com.sun.org.glassfish packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this moduleis not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2012-5076
Product Version: 
12.5
Released Date: 
Thursday, November 29, 2012 - 00:00