sentence_idx
int64
0
5.06k
word
sequence
pos
sequence
tag
sequence
806
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
2,237
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,222
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
982
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,646
[ "These", "vulnerabilities", "cannot", "be", "exploited", "automatically", "through", "e-mail", "." ]
[ 6, 17, 31, 27, 30, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,281
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
90
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "that", "could", "exploit", "the", "vulnerability", "and", "take", "complete", "control", "over", "the", "affected", "system", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 33, 13, 27, 6, 14, 4, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
245
[ "Workstations", "where", "users", "may", "browse", "to", "untrusted", "network", "locations", "." ]
[ 17, 36, 17, 13, 27, 26, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,221
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "kernel", "mode", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 5, 13, 13 ]
421
[ "FAST", "Search", "2010", "for", "SharePoint", "servers", "with", "the", "Advanced", "Filter", "Pack", "installed", "that", "index", "sources", "with", "untrusted", "files", "." ]
[ 15, 15, 5, 9, 15, 17, 9, 6, 15, 15, 15, 28, 9, 14, 17, 9, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
450
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
3,204
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "the", "security", "context", "of", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 14, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,781
[ "Multiple", "remote", "code", "execution", "vulnerabilities", "exists", "in", "the", "way", "that", "Microsoft", "Publisher", "parses", "Publisher", "files", "." ]
[ 10, 10, 14, 14, 17, 32, 9, 6, 14, 9, 15, 15, 32, 15, 17, 2 ]
[ 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 0, 5, 13 ]
1,708
[ "An", "attacker", "who", "successfully", "exploited", "the", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
924
[ "The", "most", "severe", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 24, 10, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
3,955
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
1,598
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,058
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "the", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,289
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "execute", "arbitrary", "code", "in", "the", "security", "context", "of", "the", "LocalSystem", "account", "and", "take", "complete", "control", "of", "the", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 14, 14, 9, 6, 15, 14, 4, 27, 10, 14, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13 ]
466
[ "Exchange", "server", "systems", "are", "primarily", "at", "risk", "from", "these", "vulnerabilities", "." ]
[ 15, 10, 17, 31, 22, 9, 14, 9, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,345
[ "This", "security", "update", "resolves", "four", "privately", "reported", "vulnerabilities", "in", "Microsoft", "SharePoint", "and", "Microsoft", "SharePoint", "Foundation", "." ]
[ 6, 14, 31, 17, 5, 22, 30, 17, 9, 15, 15, 4, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13, 7, 0, 9, 13 ]
510
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
1,897
[ "Workstations", "and", "terminal", "servers", "that", "have", "affected", "versions", "of", "Microsoft", "Works", "installed", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 33, 31, 30, 17, 9, 15, 15, 28, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 13, 13, 13, 13, 13 ]
2,073
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
4,769
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,064
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,803
[ "Workstations", "and", "terminal", "servers", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,424
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,318
[ "The", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "opens", "a", "specially", "crafted", "Visio", "file", "." ]
[ 6, 14, 13, 27, 10, 14, 14, 9, 6, 14, 32, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13 ]
3,885
[ "Elevation", "of", "privilege", "vulnerabilities", "exist", "when", "the", "Windows", "kernel", "improperly", "handles", "objects", "in", "memory", "." ]
[ 14, 9, 14, 17, 31, 36, 6, 15, 28, 10, 17, 17, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 3, 5, 13, 13, 13, 13, 5, 13 ]
4,126
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "elevated", "privileges", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 17, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 5, 13, 13, 5, 13, 13, 5, 5, 13 ]
4,688
[ "Multiple", "remote", "code", "execution", "vulnerabilities", "exists", "in", "the", "way", "that", "Microsoft", "Publisher", "parses", "Publisher", "files", "." ]
[ 10, 10, 14, 14, 17, 32, 9, 6, 14, 9, 15, 15, 32, 15, 17, 2 ]
[ 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 0, 5, 13 ]
4,365
[ "See", "the", "FAQ", "section", "for", "these", "vulnerabilities", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 17, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
1,880
[ "This", "security", "update", "resolves", "a", "privately", "reported", "vulnerability", "in", "Microsoft", "Works", "." ]
[ 6, 14, 14, 32, 6, 22, 30, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
3,535
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,401
[ "The", "vulnerability", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 14, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,202
[ "This", "security", "update", "resolves", "four", "privately", "reported", "vulnerabilities", "in", "the", "Microsoft", ".NET", "Framework", "." ]
[ 6, 14, 31, 17, 5, 22, 30, 17, 9, 6, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 0, 9, 13 ]
2,503
[ "This", "security", "update", "resolves", "four", "privately", "reported", "vulnerabilities", "in", "the", ".NET", "Framework", "." ]
[ 6, 14, 31, 17, 5, 22, 30, 17, 9, 6, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
3,773
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
4,176
[ "Systems", "that", "are", "running", "an", "affected", "version", "of", "SharePoint", "Server", "are", "primarily", "at", "risk", "." ]
[ 16, 33, 31, 29, 6, 10, 14, 9, 15, 15, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13 ]
4,971
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "elevated", "privileges", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 17, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 5, 13, 13, 5, 13, 13, 5, 5, 13 ]
2,282
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,038
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "kernel", "mode", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 5, 13, 13 ]
1,161
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,790
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
353
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,321
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
606
[ "Workstations", "are", "primarily", "at", "risk", "from", "this", "vulnerability", "." ]
[ 17, 31, 22, 9, 14, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
941
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,252
[ "Known", "Issues", "." ]
[ 30, 15, 2 ]
[ 13, 13, 13 ]
3,545
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,102
[ "The", "vulnerability", "only", "affects", "Windows", "servers", "with", "the", "NFS", "role", "enabled", "." ]
[ 6, 14, 22, 32, 15, 17, 9, 6, 15, 14, 28, 2 ]
[ 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13, 13 ]
3,119
[ "Known", "Issues", "." ]
[ 30, 15, 2 ]
[ 13, 13, 13 ]
2,853
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
717
[ "An", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "a", "specially", "crafted", "website", "." ]
[ 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 22, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,827
[ "Recommendation.The", "majority", "of", "customers", "have", "automatic", "updating", "enabled", "and", "will", "not", "need", "to", "take", "any", "action", "because", "this", "security", "update", "will", "be", "downloaded", "and", "installed", "automatically", "." ]
[ 15, 14, 9, 17, 31, 10, 14, 30, 4, 13, 22, 27, 26, 27, 6, 14, 9, 6, 14, 14, 13, 27, 30, 4, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,342
[ "These", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
4,132
[ "Win32k", "Race", "Condition", "Vulnerability", "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 5, 11, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,122
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,607
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,678
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
3,725
[ "Workstations", "and", "terminal", "servers", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,983
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,820
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "run", "arbitrary", "code", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13 ]
561
[ "A", "remote", "unauthenticated", "attacker", "could", "exploit", "this", "vulnerability", "by", "sending", "a", "sequence", "of", "specially", "crafted", "RAP", "packets", "to", "the", "target", "system", "." ]
[ 6, 10, 10, 14, 13, 27, 6, 14, 9, 29, 6, 14, 9, 22, 30, 15, 17, 26, 6, 14, 14, 2 ]
[ 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,121
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "email", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
573
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
481
[ "Exchange", "server", "systems", "are", "primarily", "at", "risk", "from", "these", "vulnerabilities", "." ]
[ 15, 10, 17, 31, 22, 9, 14, 9, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,215
[ "Such", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 10, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,861
[ "The", "security", "update", "addresses", "the", "vulnerability", "by", "modifying", "how", "Windows", "checks", "the", "validity", "of", "certificates", "." ]
[ 6, 14, 14, 32, 6, 14, 9, 29, 36, 10, 32, 6, 14, 9, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13 ]
4,497
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,035
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "designed", "to", "increase", "privileges", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 30, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 5, 13 ]
4,483
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
4,407
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,104
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
4,802
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "e-mail", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,843
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,688
[ "System", "Center", "Operations", "Manager", "servers", "with", "users", "who", "are", "authorized", "to", "access", "System", "Center", "Operations", "Manager", "web", "consoles", "are", "primarily", "at", "risk", "." ]
[ 15, 15, 15, 15, 17, 9, 17, 34, 31, 30, 26, 14, 15, 15, 15, 15, 14, 17, 31, 22, 9, 14, 2 ]
[ 0, 9, 9, 9, 13, 13, 13, 13, 13, 13, 13, 5, 0, 9, 9, 9, 13, 13, 13, 13, 13, 13, 13 ]
3,939
[ "This", "security", "update", "resolves", "30", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 31, 32, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
3,377
[ "This", "security", "update", "resolves", "a", "privately", "reported", "vulnerability", "in", "Microsoft", "OneNote", "." ]
[ 6, 14, 14, 32, 6, 22, 30, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13 ]
4,956
[ "These", "vulnerabilities", "cannot", "be", "exploited", "automatically", "through", "e-mail", "." ]
[ 6, 17, 31, 27, 30, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,321
[ "XML", "External", "Entities", "Resolution", "Vulnerability", "Do", "not", "open", "Office", "files", "that", "you", "receive", "from", "untrusted", "sources", "or", "that", "you", "receive", "unexpectedly", "from", "trusted", "sources", "A", "remote", "code", "execution", "vulnerability", "exists", "when", "the", "Lync", "control", "attempts", "to", "access", "an", "object", "in", "memory", "that", "has", "been", "deleted", "." ]
[ 15, 15, 15, 15, 15, 15, 22, 27, 15, 17, 9, 20, 31, 9, 10, 17, 4, 9, 20, 31, 22, 9, 30, 17, 15, 14, 14, 14, 14, 32, 36, 6, 15, 14, 32, 26, 14, 6, 14, 9, 14, 33, 32, 30, 30, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 0, 13, 13, 13, 5, 13, 13, 13, 5, 13, 13, 13, 13, 13 ]
789
[ "An", "attacker", "who", "successfully", "exploited", "any", "of", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 9, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,920
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,392
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
2,552
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
517
[ "The", "vulnerabilities", "could", "allow", "remote", "code", "execution", "in", "the", "security", "context", "of", "the", "transcoding", "service", "on", "the", "Exchange", "server", "if", "a", "user", "previews", "a", "specially", "crafted", "file", "using", "Outlook", "Web", "App", "(", "OWA", ")", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 6, 14, 14, 9, 6, 29, 14, 9, 6, 15, 14, 9, 6, 14, 32, 6, 22, 30, 14, 29, 15, 15, 15, 0, 15, 1, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,070
[ "None", "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "as", "the", "current", "user", "." ]
[ 14, 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13 ]
623
[ "Known", "Issues", "." ]
[ 30, 15, 2 ]
[ 13, 13, 13 ]
3,873
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
2,971
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,401
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,892
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,210
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
3,993
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "the", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,034
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,706
[ "The", "vulnerability", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "." ]
[ 6, 14, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13 ]
1,242
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "that", "could", "exploit", "the", "vulnerability", "and", "take", "complete", "control", "over", "the", "affected", "system", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 33, 13, 27, 6, 14, 4, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
560
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "cause", "the", "service", "to", "stop", "responding", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 14, 26, 27, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
4,720
[ "An", "attacker", "who", "successfully", "exploited", "any", "of", "these", "vulnerabilities", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 9, 6, 17, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]