Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Privileges are lost as soon as untrusted code is executed. Even if trusted code calls some untrusted code that attempts to perform some action requiring permissions not granted by the security policy, the action is not allowed. However, privileged code may attempt to use a class that exists in an untrusted container and performs only unprivileged operations. If the attacker replaces this class with a malicious implementation, the application can be exploitedtrusted code will retrieve incorrect results.

Wiki Markup
According to the Java API \[[JarSpec 08|AA. Java References#JarSpec 08]\], {{JAR}} file specification:

...