| Typicality: | 0.469 |
| Saliency: | 0.592 |
| in software | 17 | other |
| in its operating system | 11 | location |
| in the code | 8 | location |
| hacker → find → vulnerability | 148 |
| hacker → discover → vulnerability | 33 |
| hacker → find → the vulnerability | 9 |
| hacker → locate → vulnerability | 6 |
| hacker → found → vulnerability | 6 |
| hacker → uncover → vulnerability | 5 |
| hacker → discover → the vulnerability | 4 |
| hacker → discovered → vulnerability | 4 |
| hacker → uncover → the vulnerability | 3 |
| hacker → discover → a security vulnerability | 3 |
| hacker → discover → this vulnerability | 3 |
| negative | neutral | positive |
| 0.493 | 0.450 | 0.058 |
| Raw frequency | 224 |
| Normalized frequency | 0.592 |
| Modifier score | 0.667 |
| Perplexity | 207.054 |