| Similarity | Rank | |
|---|---|---|
| exploited | 0.776 | 14651 |
| exploit | 0.768 | 9896 |
| vulnerabilities | 0.712 | 18881 |
| exploiting | 0.695 | 20299 |
| untrusted | 0.677 | 88583 |
| vulnerability | 0.653 | 11458 |
| untested | 0.637 | 39322 |
| Exploit | 0.632 | 80399 |
| exploitation | 0.632 | 10671 |
| non-trivial | 0.624 | 70962 |
| unrecoverable | 0.623 | 99077 |
| inaccessible | 0.616 | 21472 |
| XSS | 0.613 | 84911 |
| malware | 0.612 | 12409 |
| infeasible | 0.608 | 96897 |
| obfuscated | 0.608 | 93284 |
| executables | 0.607 | 72615 |
| hackers | 0.603 | 14353 |
| vulnerable | 0.602 | 4501 |
| unmanaged | 0.600 | 66642 |
| trivially | 0.594 | 95028 |
| exploiters | 0.594 | 86425 |
| Win32 | 0.591 | 47010 |
| resource-rich | 0.588 | 98441 |
| insecure | 0.588 | 16879 |