< prev index next >

src/java.management/share/classes/java/lang/management/ManagementPermission.java

Print this page

        

*** 34,51 **** * provides a summary description of what the permission allows, * and discusses the risks of granting code the permission. * * <table class="striped"> * <caption style="display:none">Table shows permission target name, what the permission allows, and associated risks</caption> * <tr> ! * <th>Permission Target Name</th> ! * <th>What the Permission Allows</th> ! * <th>Risks of Allowing this Permission</th> * </tr> * * <tr> ! * <td>control</td> * <td>Ability to control the runtime characteristics of the Java virtual * machine, for example, enabling and disabling the verbose output for * the class loading or memory system, setting the threshold of a memory * pool, and enabling and disabling the thread contention monitoring * support. Some actions controlled by this permission can disclose --- 34,54 ---- * provides a summary description of what the permission allows, * and discusses the risks of granting code the permission. * * <table class="striped"> * <caption style="display:none">Table shows permission target name, what the permission allows, and associated risks</caption> + * <thead> * <tr> ! * <th scope="col">Permission Target Name</th> ! * <th scope="col">What the Permission Allows</th> ! * <th scope="col">Risks of Allowing this Permission</th> * </tr> + * </thead> + * <tbody style="text=align:left"> * * <tr> ! * <th scope="row">control</th> * <td>Ability to control the runtime characteristics of the Java virtual * machine, for example, enabling and disabling the verbose output for * the class loading or memory system, setting the threshold of a memory * pool, and enabling and disabling the thread contention monitoring * support. Some actions controlled by this permission can disclose
*** 57,75 **** * attacker can also access some information related to the running * application. * </td> * </tr> * <tr> ! * <td>monitor</td> * <td>Ability to retrieve runtime information about * the Java virtual machine such as thread * stack trace, a list of all loaded class names, and input arguments * to the Java virtual machine.</td> * <td>This allows malicious code to monitor runtime information and * uncover vulnerabilities.</td> * </tr> * * </table> * * <p> * Programmers do not normally create ManagementPermission objects directly. * Instead they are created by the security policy code based on reading --- 60,79 ---- * attacker can also access some information related to the running * application. * </td> * </tr> * <tr> ! * <th scope="row">monitor</th> * <td>Ability to retrieve runtime information about * the Java virtual machine such as thread * stack trace, a list of all loaded class names, and input arguments * to the Java virtual machine.</td> * <td>This allows malicious code to monitor runtime information and * uncover vulnerabilities.</td> * </tr> * + * </tbody> * </table> * * <p> * Programmers do not normally create ManagementPermission objects directly. * Instead they are created by the security policy code based on reading
< prev index next >