Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Execution of untrusted code causes loss of privileges. When trusted code calls some untrusted code that attempts to perform some action requiring permissions withheld by the security policy, the action is forbiddennot allowed. However, privileged code may use a class that exists in an untrusted container and performs only unprivileged operations. If the attacker were to replace this class with a malicious implementation, the trusted code would retrieve incorrect results.

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="41e04cd676343fc3-29cfb37b-418b4ea6-bd0c850a-4b692da1612d141f9b812cf4"><ac:plain-text-body><![CDATA[

[[API 2006

AA. Bibliography#API 06]]

 

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="55f8fc8116547ff0-b6941c2c-44184b2c-942f846f-bf3cc6520bfa1d553f57dfe7"><ac:plain-text-body><![CDATA[

[[McGraw 1999

AA. Bibliography#Ware 99]]

Rule 7: If You Must Sign Your Code, Put It All in One Archive File (sic)

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="7f694a0187f28e77-ab9ca7cc-4c4d4dc5-b6309b20-c34b678e27dae44f4f18d58e"><ac:plain-text-body><![CDATA[

[[Ware 2008

AA. Bibliography#Ware 08]]

 

]]></ac:plain-text-body></ac:structured-macro>

...