Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Deploying a Java application with the JVM Tool Interface enabled can allow an attacker to monitor or modify its behavior.

Recommendation Guideline

Severity

Likelihood

Remediation Cost

Priority

Level

ENV07- J

low

unlikely

medium

P2

L3

...