Oracle Java JMX Remote Code Execution Exploit Update

The default Java security properties configuration does not restrict access to certain objects in the com.sun.jmx.mbeanserver packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. This update adds support for Mac OS X 10.7.4 (i386).
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Tuesday, October 29, 2013 - 00:00