< prev index next >

src/java.base/share/classes/java/lang/reflect/ReflectPermission.java

Print this page

        

*** 34,61 **** * * <table class="striped"> * <caption style="display:none">Table shows permission target name, what the permission allows, and associated risks</caption> * <thead> * <tr> ! * <th>Permission Target Name</th> ! * <th>What the Permission Allows</th> ! * <th>Risks of Allowing this Permission</th> * </tr> * </thead> * <tbody> * * <tr> ! * <td>suppressAccessChecks</td> * <td>ability to suppress the standard Java language access checks * on fields and methods in a class; allow access not only public members * but also allow access to default (package) access, protected, * and private members.</td> * <td>This is dangerous in that information (possibly confidential) and * methods normally unavailable would be accessible to malicious code.</td> * </tr> * <tr> ! * <td>newProxyInPackage.{package name}</td> * <td>ability to create a proxy instance in the specified package of which * the non-public interface that the proxy class implements.</td> * <td>This gives code access to classes in packages to which it normally * does not have access and the dynamic proxy class is in the system * protection domain. Malicious code may use these classes to --- 34,61 ---- * * <table class="striped"> * <caption style="display:none">Table shows permission target name, what the permission allows, and associated risks</caption> * <thead> * <tr> ! * <th scope="col">Permission Target Name</th> ! * <th scope="col">What the Permission Allows</th> ! * <th scope="col">Risks of Allowing this Permission</th> * </tr> * </thead> * <tbody> * * <tr> ! * <th scope="row">suppressAccessChecks</th> * <td>ability to suppress the standard Java language access checks * on fields and methods in a class; allow access not only public members * but also allow access to default (package) access, protected, * and private members.</td> * <td>This is dangerous in that information (possibly confidential) and * methods normally unavailable would be accessible to malicious code.</td> * </tr> * <tr> ! * <th scope="row">newProxyInPackage.{package name}</th> * <td>ability to create a proxy instance in the specified package of which * the non-public interface that the proxy class implements.</td> * <td>This gives code access to classes in packages to which it normally * does not have access and the dynamic proxy class is in the system * protection domain. Malicious code may use these classes to
< prev index next >