attempt to interpret da… | 0.56 |
be a security risk | 0.45 |
capture screenshot | 0.38 |
access encrypted data | 0.34 |
exploit unknown bug | 0.34 |
remain open | 0.30 |
give full control of th… | 0.29 |
remain undetected | 0.25 |
access a computer system | 0.25 |
’ for good guys | 0.25 |
More » |
created | 0.66 |
discovered | 0.64 |
installed | 0.61 |
exploited | 0.57 |
put in place | 0.51 |
installed by attacker | 0.46 |
removed | 0.43 |
exploited by criminal | 0.42 |
inserted | 0.40 |
written in delphi | 0.38 |
More » |