| attempt to interpret da… | 0.56 |
| be a security risk | 0.45 |
| capture screenshot | 0.38 |
| access encrypted data | 0.34 |
| exploit unknown bug | 0.34 |
| remain open | 0.30 |
| give full control of th… | 0.29 |
| remain undetected | 0.25 |
| access a computer system | 0.25 |
| ’ for good guys | 0.25 |
| More » |
| created | 0.66 |
| discovered | 0.64 |
| installed | 0.61 |
| exploited | 0.57 |
| put in place | 0.51 |
| installed by attacker | 0.46 |
| removed | 0.43 |
| exploited by criminal | 0.42 |
| inserted | 0.40 |
| written in delphi | 0.38 |
| More » |