Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Failing to appreciate that a Java application can be monitored and modified via the JVM Tool Interface may lead to an application being deployed that is vulnerable toa ttack to attack via this route.

Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

MSC02-J

low

unlikely

medium

P2

L3

...