sentence_idx
int64
0
5.06k
word
sequence
pos
sequence
tag
sequence
3,146
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,104
[ "None", "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "as", "the", "current", "user", "." ]
[ 14, 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13 ]
1,236
[ "The", "majority", "of", "customers", "have", "automatic", "updating", "enabled", "and", "will", "not", "need", "to", "take", "any", "action", "because", "this", "security", "update", "will", "be", "downloaded", "and", "installed", "automatically", "." ]
[ 6, 14, 9, 17, 31, 10, 14, 30, 4, 13, 22, 27, 26, 27, 6, 14, 9, 6, 14, 14, 13, 27, 30, 4, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
313
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
1,125
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "email", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,870
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
983
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,580
[ "Firewall", "best", "practices", "and", "standard", "default", "firewall", "configurations", "can", "help", "protect", "networks", "from", "attacks", "that", "originate", "outside", "the", "enterprise", "perimeter", "." ]
[ 15, 12, 17, 4, 10, 14, 10, 17, 13, 27, 27, 17, 9, 17, 33, 31, 9, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,061
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "logged-on", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,202
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "logged-on", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,830
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,900
[ "These", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 14, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
3,908
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,592
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "kernel", "mode", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 5, 13, 13 ]
3,804
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,003
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
2,634
[ "An", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "such", "a", "website", "." ]
[ 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 18, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,378
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
217
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,787
[ "Known", "Issues", "." ]
[ 30, 15, 2 ]
[ 13, 13, 13 ]
4,981
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "these", "vulnerabilities", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,508
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,293
[ "This", "security", "update", "resolves", "a", "privately", "reported", "vulnerability", "in", "the", "Microsoft", "Antimalware", "Client", "." ]
[ 6, 14, 14, 32, 6, 22, 30, 14, 9, 6, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13, 13 ]
1,717
[ "An", "attacker", "could", "also", "exploit", "the", "vulnerability", "by", "sending", "a", "specially", "crafted", "RTF", "file", "as", "an", "attachment", "and", "convincing", "the", "user", "to", "open", "the", "specially", "crafted", "RTF", "file", "." ]
[ 6, 14, 13, 22, 27, 6, 14, 9, 29, 6, 22, 30, 15, 14, 9, 6, 14, 4, 29, 6, 14, 26, 27, 6, 22, 10, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,627
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
4,474
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,665
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,888
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,095
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,591
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,586
[ "Remote", "Desktop", "Protocol", "Vulnerability", "Block", "TCP", "port", "3389", "at", "the", "enterprise", "perimeter", "firewall", "Disable", "Remote", "Desktop", "feature", "if", "no", "longer", "required", "An", "elevation", "of", "privilege", "vulnerability", "exists", "when", "the", "Windows", "kernel-mode", "driver", "improperly", "handles", "objects", "in", "memory", "." ]
[ 15, 15, 15, 15, 15, 15, 14, 5, 9, 6, 14, 14, 14, 15, 15, 15, 14, 9, 6, 14, 28, 6, 14, 9, 14, 14, 32, 36, 6, 15, 14, 14, 22, 32, 17, 9, 14, 2 ]
[ 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 5, 13, 13, 13, 13, 13, 5, 13 ]
2,119
[ "This", "security", "update", "resolves", "publicly", "disclosed", "vulnerabilities", "in", "Microsoft", "Exchange", "Server", "WebReady", "Document", "Viewing", "." ]
[ 6, 14, 14, 17, 22, 30, 17, 9, 15, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,802
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,709
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,630
[ "RTF", "File", "listid", "Use-After-Free", "Vulnerability", "Read", "emails", "in", "plain", "text", "Use", "Microsoft", "Office", "File", "Block", "policy", "to", "block", "the", "opening", "of", "RTF", "documents", "from", "unknown", "or", "untrusted", "sources", "and", "locations", "An", "elevation", "of", "privilege", "vulnerability", "exists", "when", "the", "Windows", "kernel", "improperly", "handles", "objects", "in", "memory", "." ]
[ 15, 15, 32, 10, 15, 15, 32, 9, 14, 14, 15, 15, 15, 15, 15, 14, 26, 27, 6, 14, 9, 15, 17, 9, 10, 4, 10, 17, 4, 17, 6, 14, 9, 14, 14, 32, 36, 6, 15, 28, 10, 17, 17, 9, 14, 2 ]
[ 13, 13, 13, 5, 11, 13, 13, 13, 13, 13, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 5, 13, 13, 13, 13, 5, 13 ]
2,758
[ "These", "vulnerabilities", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 17, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
250
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "execute", "arbitrary", "code", "in", "the", "security", "context", "of", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 14, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
153
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,211
[ "Customers", "who", "have", "not", "enabled", "automatic", "updating", "need", "to", "check", "for", "updates", "and", "install", "this", "update", "manually", "." ]
[ 17, 34, 31, 22, 30, 10, 29, 14, 26, 27, 9, 17, 4, 27, 6, 10, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,848
[ "The", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "open", "a", "specially", "crafted", "Publisher", "file", "with", "an", "affected", "version", "of", "Microsoft", "Publisher", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
429
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
1,484
[ "This", "security", "update", "resolves", "four", "privately", "reported", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 31, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
2,239
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,057
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,810
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,137
[ "Customers", "can", "configure", "automatic", "updating", "to", "check", "online", "for", "updates", "from", "Microsoft", "Update", "by", "using", "the", "Microsoft", "Update", "service", "." ]
[ 17, 13, 27, 10, 14, 26, 27, 14, 9, 17, 9, 15, 15, 9, 29, 6, 15, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13, 13, 13, 7, 13, 5, 13 ]
253
[ "An", "attacker", "who", "successfully", "exploited", "the", "vulnerabilities", "could", "run", "arbitrary", "code", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 17, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13 ]
3,458
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,011
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "access", "to", "endpoint", "functions", "as", "if", "they", "were", "an", "authenticated", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 14, 26, 27, 17, 9, 9, 20, 28, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
168
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
91
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,175
[ "New", "My", "Sites", "created", "with", "clean", "installations", "of", "SharePoint", "Server", "2013", "are", "not", "subject", "to", "exploitation", "from", "this", "vulnerability", "." ]
[ 15, 15, 15, 28, 9, 10, 17, 9, 15, 15, 5, 31, 22, 10, 26, 14, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 8, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,044
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
3,890
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
455
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
3,913
[ "This", "security", "update", "resolves", "30", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 31, 32, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
408
[ "This", "vulnerability", "requires", "that", "a", "user", "be", "logged", "on", "and", "visiting", "a", "website", "for", "any", "malicious", "action", "to", "occur", "." ]
[ 6, 14, 32, 9, 6, 14, 27, 30, 9, 4, 29, 6, 14, 9, 6, 10, 14, 26, 27, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,604
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,624
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
997
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,523
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
571
[ "Systems", "that", "do", "not", "have", "RDP", "enabled", "are", "not", "at", "risk", "." ]
[ 16, 33, 31, 22, 27, 15, 30, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,479
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,709
[ "Firewall", "best", "practices", "and", "standard", "default", "firewall", "configurations", "can", "help", "protect", "networks", "from", "attacks", "that", "originate", "outside", "the", "enterprise", "perimeter", "." ]
[ 15, 12, 17, 4, 10, 14, 10, 17, 13, 27, 27, 17, 9, 17, 33, 31, 9, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,114
[ "Exchange", "server", "systems", "are", "primarily", "at", "risk", "from", "these", "vulnerabilities", "." ]
[ 15, 10, 17, 31, 22, 9, 14, 9, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,369
[ "SharePoint", "XSS", "Vulnerability", "A", "denial", "of", "service", "vulnerability", "exists", "in", "Microsoft", "SharePoint", "Server", "." ]
[ 15, 15, 15, 15, 14, 9, 14, 14, 32, 9, 15, 15, 15, 2 ]
[ 13, 5, 13, 13, 5, 11, 11, 13, 13, 13, 7, 0, 9, 13 ]
2,739
[ "None", "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "view", "content", "from", "another", "domain", "or", "Internet", "Explorer", "zone", "." ]
[ 14, 6, 14, 34, 22, 28, 6, 14, 13, 27, 14, 9, 6, 14, 4, 15, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13 ]
2,286
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,580
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,700
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,669
[ "An", "attacker", "could", "then", "view", "the", "unprotected", "log", "file", "." ]
[ 6, 14, 13, 22, 27, 6, 10, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,845
[ "Win32k", "Race", "Condition", "Vulnerability", "Microsoft", "has", "not", "identified", "any", "workarounds", "for", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 32, 22, 30, 6, 17, 9, 6, 14, 2 ]
[ 13, 5, 11, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,929
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
2,092
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
4,271
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
63
[ "This", "vulnerability", "requires", "that", "a", "user", "open", "a", "specially", "crafted", "Word", "file", "with", "an", "affected", "version", "of", "Microsoft", "Word", "." ]
[ 6, 14, 32, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
322
[ "This", "security", "update", "resolves", "one", "privately", "reported", "vulnerability", "in", "Windows", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 14, 9, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 13 ]
4,978
[ "DirectX", "Graphics", "Kernel", "Subsystem", "Double", "Fetch", "Vulnerability", "Microsoft", "has", "not", "identified", "any", "workarounds", "for", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 15, 15, 15, 32, 22, 30, 6, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,870
[ "Most", "customers", "have", "automatic", "updating", "enabled", "and", "will", "not", "need", "to", "take", "any", "action", "because", "this", "security", "update", "will", "be", "downloaded", "and", "installed", "automatically", "." ]
[ 12, 17, 31, 10, 14, 30, 4, 13, 22, 27, 26, 27, 6, 14, 9, 6, 14, 14, 13, 27, 30, 4, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,593
[ "The", "vulnerability", "could", "cause", "the", "server", "or", "service", "to", "stop", "responding", "and", "restart", "." ]
[ 6, 14, 13, 27, 6, 14, 4, 14, 26, 27, 14, 4, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13 ]
458
[ "The", "transcoding", "service", "in", "Exchange", "that", "is", "used", "for", "WebReady", "Document", "Viewing", "is", "running", "in", "the", "LocalService", "account", "." ]
[ 6, 29, 14, 9, 15, 33, 32, 30, 9, 10, 15, 15, 32, 29, 9, 6, 15, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
4,988
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "these", "vulnerabilities", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,798
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
12
[ "The", "vulnerability", "could", "be", "exploited", "when", "a", "user", "views", "the", "shared", "content", "that", "contains", "specially", "crafted", "TrueType", "fonts", "." ]
[ 6, 14, 13, 27, 30, 36, 6, 14, 32, 6, 30, 14, 33, 32, 22, 30, 15, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,574
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,832
[ "These", "vulnerabilities", "cannot", "be", "exploited", "automatically", "through", "e-mail", "." ]
[ 6, 17, 31, 27, 30, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,608
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "cause", "arbitrary", "code", "to", "run", "in", "the", "security", "context", "of", "the", "user", "who", "opens", "a", "specially", "crafted", "RTF", "file", "or", "previews", "or", "opens", "a", "specially", "crafted", "RTF", "email", "message", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 26, 27, 9, 6, 14, 14, 9, 6, 14, 34, 32, 6, 22, 30, 15, 14, 4, 17, 4, 32, 6, 22, 30, 15, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,133
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,914
[ "The", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "logs", "on", "to", "the", "system", "and", "runs", "a", "specially", "crafted", "application", "." ]
[ 6, 17, 13, 27, 14, 9, 14, 9, 6, 14, 17, 9, 26, 6, 14, 4, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
3,936
[ "Win32k", "Race", "Condition", "Vulnerability", "Microsoft", "has", "not", "identified", "any", "workarounds", "for", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 32, 22, 30, 6, 17, 9, 6, 14, 2 ]
[ 13, 5, 11, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,903
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
327
[ "Recommendation.The", "majority", "of", "customers", "have", "automatic", "updating", "enabled", "and", "will", "not", "need", "to", "take", "any", "action", "because", "this", "security", "update", "will", "be", "downloaded", "and", "installed", "automatically", "." ]
[ 15, 14, 9, 17, 31, 10, 14, 30, 4, 13, 22, 27, 26, 27, 6, 14, 9, 6, 14, 14, 13, 27, 30, 4, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
913
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,724
[ "Any", "systems", "that", "send", "and", "receive", "SSL/TLS", "encrypted", "traffic", "are", "at", "the", "most", "risk", "from", "this", "vulnerability", "." ]
[ 6, 17, 33, 31, 4, 31, 15, 28, 14, 31, 9, 6, 24, 14, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
950
[ "The", "vulnerability", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 14, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,898
[ "Elevation", "of", "privilege", "vulnerabilities", "exist", "when", "the", "Windows", "kernel", "improperly", "handles", "objects", "in", "memory", "." ]
[ 14, 9, 14, 17, 31, 36, 6, 15, 28, 10, 17, 17, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 3, 5, 13, 13, 13, 13, 5, 13 ]
476
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "An", "attacker", "could", "send", "an", "email", "message", "containing", "a", "specially", "crafted", "file", "to", "a", "user", "on", "an", "affected", "version", "of", "Exchange", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 6, 14, 13, 27, 6, 10, 14, 29, 6, 22, 30, 14, 26, 6, 14, 9, 6, 10, 14, 9, 15, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,893
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
731
[ "There", "they", "can", "be", "redirected", "to", "an", "external", "URL", "." ]
[ 7, 20, 13, 27, 30, 26, 6, 10, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,808
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]