From f53d6f7ad6fe689cd9e7be396c28d9ca9d33c439 Mon Sep 17 00:00:00 2001 From: Brent Cook <busterb@gmail.com> Date: Fri, 15 Mar 2019 21:08:19 -0500 Subject: [PATCH] Update java/javapayload/README.md Co-Authored-By: wvu-r7 <wvu-r7@users.noreply.github.com> --- java/javapayload/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/java/javapayload/README.md b/java/javapayload/README.md index 352f0044..4aac9a3a 100644 --- a/java/javapayload/README.md +++ b/java/javapayload/README.md @@ -38,7 +38,7 @@ Alternatively, the main class can of course be called from other classes, like `metasploit.Payload.main(null);`, as the arguments parameter is ignored. Note that in a sandboxed environment the caller needs to have all permissions, and also the *Payload* class has to be -loaded with all permissions. In case there is untrusted code on the +loaded with all permissions. In case there is untrusted code in the stack trace (but the direct caller has all permissions), the call has to be wrapped in a [doPrivileged](http://download.oracle.com/javase/1.4.2/docs/api/java/security/AccessController.html#doPrivileged\(java.security.PrivilegedExceptionAction\))