Java is an interpreted language that can run on a variety of platforms, also Java has a number of useful
features for network. Due to theses features of Java language, Java is used in various fields. In this paper,
we will talk about how the malware that threaten the Java Security Manager of the Java Virtual Machine
is using the vulnerability of the Java Virtual Machine. And for corresponding measures, this paper suggest
Constructing Java Vulnerable API List based on Java Access Permission Checking Tree
vulnerability analysis method of Java system class by using Java Call Graph and Java Access Permission
Checking Tree. By suggesting that, we want to lay groundwork for preventing Java security threats in
advance.