Oracle Java JAX-WS Remote Code Execution Exploit

The default Java security properties configuration did not restrict access to certain com.sun.org.glassfish packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user.
Exploit Platform
Exploit Type
Product Name