sentence_idx
int64
0
5.06k
word
sequence
pos
sequence
tag
sequence
1,968
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "kernel", "mode", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 5, 13, 13 ]
4,684
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,824
[ "These", "vulnerabilities", "require", "that", "a", "user", "open", "a", "specially", "crafted", "Publisher", "file", "with", "an", "affected", "version", "of", "Microsoft", "Publisher", "." ]
[ 6, 17, 31, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
1,060
[ "This", "security", "update", "resolves", "four", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Office", "." ]
[ 6, 14, 31, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
2,923
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,785
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "the", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
486
[ "This", "security", "update", "resolves", "publicly", "disclosed", "vulnerabilities", "in", "Microsoft", "Exchange", "Server", "WebReady", "Document", "Viewing", "." ]
[ 6, 14, 14, 17, 22, 30, 17, 9, 15, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,103
[ "An", "attacker", "who", "exploited", "this", "vulnerability", "could", "cause", "the", "affected", "system", "to", "stop", "responding", "and", "restart", "." ]
[ 6, 14, 34, 28, 6, 14, 13, 27, 6, 10, 14, 26, 27, 14, 4, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,865
[ "These", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 14, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
793
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,537
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
603
[ "A", "remote", "unauthenticated", "attacker", "could", "exploit", "this", "vulnerability", "by", "sending", "a", "sequence", "of", "specially", "crafted", "RAP", "packets", "to", "the", "target", "system", "." ]
[ 6, 10, 10, 14, 13, 27, 6, 14, 9, 29, 6, 14, 9, 22, 30, 15, 17, 26, 6, 14, 14, 2 ]
[ 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,356
[ "Customers", "who", "have", "not", "enabled", "automatic", "updating", "need", "to", "check", "for", "updates", "and", "install", "this", "update", "manually", "." ]
[ 17, 34, 31, 22, 30, 10, 29, 14, 26, 27, 9, 17, 4, 27, 6, 10, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,864
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
3,530
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
51
[ "Servers", "could", "also", "be", "at", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 22, 27, 9, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
498
[ "These", "vulnerabilities", "could", "allow", "remote", "code", "execution", "as", "Local", "System", "if", "a", "user", "views", "a", "specially", "crafted", "file", "through", "Outlook", "Web", "Access", "in", "a", "browser", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 10, 15, 9, 6, 10, 17, 6, 22, 30, 14, 9, 15, 15, 15, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
228
[ "An", "attacker", "could", "exploit", "the", "vulnerability", "by", "convincing", "a", "user", "to", "open", "a", "specially", "crafted", "briefcase", "." ]
[ 6, 14, 13, 27, 6, 14, 9, 29, 6, 14, 26, 27, 6, 22, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
189
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,207
[ "The", "security", "update", "addresses", "the", "vulnerability", "by", "correcting", "the", "manner", "in", "which", "the", ".NET", "Framework", "retrieves", "the", "default", "web", "proxy", "configuration", "settings", "." ]
[ 6, 14, 14, 32, 6, 14, 9, 29, 6, 14, 9, 33, 6, 14, 15, 32, 6, 14, 14, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 5, 13, 13 ]
3,854
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,283
[ "An", "attacker", "who", "successfully", "exploited", "the", "most", "severe", "of", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 24, 10, 9, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,788
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "designed", "to", "increase", "privileges", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 30, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 5, 13 ]
1,434
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,894
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
3,387
[ "These", "vulnerabilities", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 17, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
489
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
289
[ "Customers", "who", "have", "not", "enabled", "automatic", "updating", "need", "to", "check", "for", "updates", "and", "install", "this", "update", "manually", "." ]
[ 17, 34, 31, 22, 30, 10, 29, 14, 26, 27, 9, 17, 4, 27, 6, 10, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,154
[ "Known", "Issues", "." ]
[ 30, 15, 2 ]
[ 13, 13, 13 ]
2,583
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,956
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,789
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
96
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,390
[ "Recommendation", "." ]
[ 14, 2 ]
[ 13, 13 ]
5,005
[ "Workstations", "and", "servers", "that", "run", "Windows", ".NET", "Framework", "applications", "are", "primarily", "at", "risk", "from", "this", "vulnerability", "." ]
[ 17, 4, 17, 33, 31, 15, 15, 15, 17, 31, 22, 9, 14, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 3, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,564
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
407
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
4,401
[ "Windows", "2012", "Servers", "in", "an", "internet-facing", "deployment", "are", "primarily", "vulnerable", "." ]
[ 10, 5, 15, 9, 6, 10, 14, 31, 22, 10, 2 ]
[ 3, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
86
[ "The", "vulnerability", "could", "not", "be", "exploited", "remotely", "or", "by", "anonymous", "users", "." ]
[ 6, 14, 13, 22, 27, 30, 22, 4, 9, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,538
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,984
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,207
[ "This", "can", "also", "include", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 13, 22, 27, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,853
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
1,383
[ "This", "security", "update", "resolves", "four", "privately", "reported", "vulnerabilities", "in", "the", "Microsoft", ".NET", "Framework", "." ]
[ 6, 14, 31, 17, 5, 22, 30, 17, 9, 6, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 0, 9, 13 ]
3,415
[ "These", "vulnerabilities", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 17, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,310
[ "Microsoft", "Antimalware", "Improper", "Pathname", "Vulnerability", "Correct", "the", "Windows", "Defender", "image", "pathname", "on", "Windows", "8", "and", "Windows", "RT", "systems", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "Microsoft", "Visio", "Viewer", "handles", "memory", "when", "rendering", "specially", "crafted", "Visio", "files", "." ]
[ 15, 15, 15, 15, 15, 15, 6, 15, 15, 14, 14, 9, 15, 5, 4, 15, 15, 17, 15, 10, 14, 14, 14, 32, 9, 6, 14, 9, 15, 15, 15, 32, 14, 36, 29, 22, 30, 15, 17, 2 ]
[ 7, 13, 13, 13, 13, 13, 13, 3, 9, 13, 13, 13, 3, 13, 13, 3, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 9, 13, 5, 13, 13, 13, 13, 0, 5, 13 ]
5,006
[ "XML", "Digital", "Signature", "Spoofing", "Vulnerability", "Use", "a", "secure", "channel", "to", "transmit", "sensitive", "information", "A", "security", "feature", "bypass", "vulnerability", "exists", "in", "the", "way", "that", "the", "Microsoft", ".NET", "Framework", "improperly", "creates", "policy", "requirements", "for", "authentication", "when", "setting", "up", "custom", "WCF", "endpoint", "authentication", "." ]
[ 10, 15, 15, 15, 15, 15, 6, 14, 14, 26, 27, 10, 14, 15, 14, 14, 14, 14, 32, 9, 6, 14, 9, 6, 15, 15, 15, 22, 32, 14, 17, 9, 14, 36, 29, 25, 10, 15, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 9, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 5, 13 ]
3,225
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,877
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,325
[ "This", "vulnerability", "requires", "that", "a", "user", "open", "a", "specially", "crafted", "Visio", "file", "with", "an", "affected", "version", "of", "Microsoft", "Visio", "Viewer", "." ]
[ 6, 14, 32, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 9, 13 ]
4,383
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,001
[ "The", "security", "update", "addresses", "the", "vulnerabilities", "by", "modifying", "the", "way", "that", "Internet", "Explorer", "handles", "objects", "in", "memory", "." ]
[ 6, 14, 14, 32, 6, 17, 9, 29, 6, 14, 9, 15, 15, 32, 17, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 5, 13 ]
592
[ "Workstations", "are", "primarily", "at", "risk", "from", "this", "vulnerability", "." ]
[ 17, 31, 22, 9, 14, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,267
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,897
[ "Win32k", "Race", "Condition", "Vulnerability", "Microsoft", "has", "not", "identified", "any", "workarounds", "for", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 32, 22, 30, 6, 17, 9, 6, 14, 2 ]
[ 13, 5, 11, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,266
[ "The", "following", "mitigating", "factors", "may", "be", "helpful", "in", "your", "situation", ":", "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "local", "user", "." ]
[ 6, 10, 14, 17, 13, 27, 10, 9, 21, 14, 3, 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
5,052
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,287
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,123
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "run", "arbitrary", "code", "as", "LocalService", "on", "the", "affected", "Exchange", "server", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 9, 15, 9, 6, 10, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,446
[ "The", "security", "update", "addresses", "the", "vulnerabilities", "by", "modifying", "the", "way", "that", "Internet", "Explorer", "handles", "objects", "in", "memory", "." ]
[ 6, 14, 14, 32, 6, 17, 9, 29, 6, 14, 9, 15, 15, 32, 17, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 5, 13 ]
1,410
[ "Windows", ".NET", "applications", "Workstations", "and", "servers", "that", "run", "untrusted", "Windows", ".NET", "Framework", "applications", "are", "also", "at", "risk", "from", "this", "vulnerability", "." ]
[ 32, 10, 17, 17, 4, 17, 33, 31, 10, 15, 15, 15, 17, 31, 22, 9, 14, 9, 6, 14, 2 ]
[ 3, 8, 13, 13, 13, 13, 13, 13, 13, 3, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,319
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
85
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,051
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,966
[ "These", "vulnerabilities", "could", "be", "exploited", "when", "a", "user", "opens", "a", "specially", "crafted", "file", "." ]
[ 6, 17, 13, 27, 30, 36, 6, 14, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,540
[ "See", "the", "FAQ", "section", "for", "these", "vulnerabilities", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 17, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
3,744
[ "This", "security", "update", "resolves", "30", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 31, 32, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
1,040
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "view", "content", "from", "another", "domain", "or", "Internet", "Explorer", "zone", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 14, 9, 6, 14, 4, 15, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13 ]
4,997
[ "This", "security", "update", "resolves", "two", "privately", "reported", "vulnerabilities", "in", "the", ".NET", "Framework", "." ]
[ 6, 14, 10, 17, 5, 22, 30, 17, 9, 6, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
4,197
[ "The", "vulnerability", "could", "also", "be", "exploited", "if", "a", "user", "opens", "an", "attachment", "that", "is", "sent", "in", "an", "email", "message", "." ]
[ 6, 14, 13, 22, 27, 30, 9, 6, 14, 32, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,371
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,008
[ "This", "security", "update", "resolves", "two", "privately", "reported", "vulnerabilities", "in", "the", ".NET", "Framework", "." ]
[ 6, 14, 10, 17, 5, 22, 30, 17, 9, 6, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
526
[ "Exchange", "server", "systems", "are", "primarily", "at", "risk", "from", "these", "vulnerabilities", "." ]
[ 15, 10, 17, 31, 22, 9, 14, 9, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
785
[ "An", "attacker", "could", "exploit", "the", "vulnerability", "by", "constructing", "a", "specially", "crafted", "webpage", "that", "could", "allow", "information", "disclosure", "if", "a", "user", "viewed", "the", "webpage", "." ]
[ 6, 14, 13, 27, 6, 14, 9, 29, 6, 22, 30, 14, 33, 13, 27, 14, 14, 9, 6, 14, 28, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13, 13, 13 ]
2,392
[ "The", "transcoding", "service", "in", "Exchange", "that", "is", "used", "for", "WebReady", "Document", "Viewing", "is", "running", "in", "the", "LocalService", "account", "." ]
[ 6, 29, 14, 9, 15, 33, 32, 30, 9, 10, 15, 15, 32, 29, 9, 6, 15, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
1,957
[ "Workstations", "and", "terminal", "servers", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,095
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "logged-on", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,840
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "designed", "to", "increase", "privileges", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 30, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 5, 13 ]
2,954
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
384
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
687
[ "This", "security", "update", "resolves", "one", "publicly", "disclosed", "and", "five", "privately", "reported", "vulnerabilities", "in", "Microsoft", "SharePoint", "and", "Windows", "SharePoint", "Services", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 4, 5, 22, 30, 17, 9, 15, 15, 4, 15, 15, 16, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13, 3, 13, 13, 13 ]
3,025
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,010
[ "Most", "customers", "have", "automatic", "updating", "enabled", "and", "will", "not", "need", "to", "take", "any", "action", "because", "this", "security", "update", "will", "be", "downloaded", "and", "installed", "automatically", "." ]
[ 12, 17, 31, 10, 14, 30, 4, 13, 22, 27, 26, 27, 6, 14, 9, 6, 14, 14, 13, 27, 30, 4, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,328
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,031
[ "The", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "logs", "on", "to", "the", "system", "and", "runs", "a", "specially", "crafted", "application", "." ]
[ 6, 17, 13, 27, 14, 9, 14, 9, 6, 14, 17, 9, 26, 6, 14, 4, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
2,468
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,805
[ "None", "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 14, 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,822
[ "This", "security", "update", "resolves", "30", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 31, 32, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
2,033
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,434
[ "An", "attacker", "who", "successfully", "exploited", "the", "most", "severe", "of", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 24, 10, 9, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,968
[ "This", "security", "update", "resolves", "three", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 14, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
2,019
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,963
[ "Elevation", "of", "privilege", "vulnerabilities", "exist", "when", "the", "Windows", "kernel", "improperly", "handles", "objects", "in", "memory", "." ]
[ 14, 9, 14, 17, 31, 36, 6, 15, 28, 10, 17, 17, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 3, 5, 13, 13, 13, 13, 5, 13 ]
1,146
[ "This", "vulnerability", "requires", "that", "a", "user", "open", "a", "specially", "crafted", "Excel", "file", "with", "an", "affected", "version", "of", "Microsoft", "Excel", "." ]
[ 6, 14, 32, 9, 6, 14, 25, 6, 22, 10, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
1,423
[ "Known", "Issues", "." ]
[ 30, 15, 2 ]
[ 13, 13, 13 ]
4,459
[ "These", "vulnerabilities", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 17, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,783
[ "This", "security", "update", "resolves", "30", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 31, 32, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
1,092
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,495
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,998
[ "The", "more", "severe", "of", "the", "vulnerabilities", "could", "allow", "spoofing", "if", "a", ".NET", "application", "receives", "a", "specially", "crafted", "XML", "file", "." ]
[ 6, 23, 10, 9, 6, 17, 13, 27, 29, 9, 6, 10, 14, 32, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 8, 5, 13, 13, 13, 13, 13, 13, 13 ]