This document discusses the concept of 'reproduced' vulnerabilities in software, which occur when a vulnerability is copied into another codebase, often due to code sharing practices. It outlines a detection method based on similarity calculations of assembly code, utilizing techniques from bioinformatics to identify potential vulnerabilities in binary executables. The research aims to address the risks associated with delayed patch distributions and the knowledge attackers may gain from unpatched vulnerabilities.