< prev index next >
src/java.management/share/classes/java/lang/management/ManagementPermission.java
Print this page
*** 34,51 ****
* provides a summary description of what the permission allows,
* and discusses the risks of granting code the permission.
*
* <table class="striped">
* <caption style="display:none">Table shows permission target name, what the permission allows, and associated risks</caption>
* <tr>
! * <th>Permission Target Name</th>
! * <th>What the Permission Allows</th>
! * <th>Risks of Allowing this Permission</th>
* </tr>
*
* <tr>
! * <td>control</td>
* <td>Ability to control the runtime characteristics of the Java virtual
* machine, for example, enabling and disabling the verbose output for
* the class loading or memory system, setting the threshold of a memory
* pool, and enabling and disabling the thread contention monitoring
* support. Some actions controlled by this permission can disclose
--- 34,54 ----
* provides a summary description of what the permission allows,
* and discusses the risks of granting code the permission.
*
* <table class="striped">
* <caption style="display:none">Table shows permission target name, what the permission allows, and associated risks</caption>
+ * <thead>
* <tr>
! * <th scope="col">Permission Target Name</th>
! * <th scope="col">What the Permission Allows</th>
! * <th scope="col">Risks of Allowing this Permission</th>
* </tr>
+ * </thead>
+ * <tbody style="text=align:left">
*
* <tr>
! * <th scope="row">control</th>
* <td>Ability to control the runtime characteristics of the Java virtual
* machine, for example, enabling and disabling the verbose output for
* the class loading or memory system, setting the threshold of a memory
* pool, and enabling and disabling the thread contention monitoring
* support. Some actions controlled by this permission can disclose
*** 57,75 ****
* attacker can also access some information related to the running
* application.
* </td>
* </tr>
* <tr>
! * <td>monitor</td>
* <td>Ability to retrieve runtime information about
* the Java virtual machine such as thread
* stack trace, a list of all loaded class names, and input arguments
* to the Java virtual machine.</td>
* <td>This allows malicious code to monitor runtime information and
* uncover vulnerabilities.</td>
* </tr>
*
* </table>
*
* <p>
* Programmers do not normally create ManagementPermission objects directly.
* Instead they are created by the security policy code based on reading
--- 60,79 ----
* attacker can also access some information related to the running
* application.
* </td>
* </tr>
* <tr>
! * <th scope="row">monitor</th>
* <td>Ability to retrieve runtime information about
* the Java virtual machine such as thread
* stack trace, a list of all loaded class names, and input arguments
* to the Java virtual machine.</td>
* <td>This allows malicious code to monitor runtime information and
* uncover vulnerabilities.</td>
* </tr>
*
+ * </tbody>
* </table>
*
* <p>
* Programmers do not normally create ManagementPermission objects directly.
* Instead they are created by the security policy code based on reading
< prev index next >