This page demonstrates the exploit. The small square below contains an applet that should
load a default payload and should open calc.exe on Windows and place a file in the
users home directory with the name you_have_been_exploited.txt
.
When embedding the applet in a real page, use width=0 and height=0!