Sun Java Web SOCKS Proxy Authentication Exploit

After successful exploitation an agent will be deployed. This agent will inherit the user identity and capabilities of the abused service, usually root.
Exploit Platform
Exploit Type
Product Name