...
Deploying a Java application with the JVM Tool Interface enabled can allow an attacker to monitor or modify its behavior.
Recommendation Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ENV07- J | low | unlikely | medium | P2 | L3 |
...
...
Deploying a Java application with the JVM Tool Interface enabled can allow an attacker to monitor or modify its behavior.
Recommendation Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ENV07- J | low | unlikely | medium | P2 | L3 |
...