This document summarizes a 0day exploit that abuses the JAX-WS classes from a Java applet to execute arbitrary Java code outside the sandbox. The exploit affects Java 7u7 and earlier. It bypasses the Java security model using the GenericConstructor and ManagedObjectManagerFactory classes to dynamically load and instantiate a payload class without restrictions. The exploit source code is shown loading a payload from a byte array and executing it to achieve remote code execution on the target system.