What kinds of vulnerabilities does AVDS detect?
There are three scenarios in which a system can be vulnerable. The first way a system can be vulnerable is when operating systems or network applications are poorly coded thus allowing attackers to exploit software flaws. The second way a system can become vulnerable is when an operating system or an application in the system is infected with viruses, trojans or worms. In these instances, malicious code may open up a TCP port for unauthorized access from across the network. The third way a system can be vulnerable is when a system is mis-configured, such that it becomes vulnerable. One example could be that a default password was left in place for the administrative interface of an application. The AVDS can comprehensively detect vulnerabilities that are caused by the above three scenarios.