sentence_idx
int64
0
5.06k
word
sequence
pos
sequence
tag
sequence
2,113
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
2,707
[ "This", "security", "update", "resolves", "one", "privately", "reported", "vulnerability", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
2,794
[ "This", "security", "update", "resolves", "thirteen", "privately", "disclosed", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 14, 17, 31, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
2,302
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
644
[ "An", "attacker", "could", "exploit", "the", "vulnerability", "by", "constructing", "a", "specially", "crafted", "document", "or", "webpage", "." ]
[ 6, 14, 13, 27, 6, 14, 9, 29, 6, 22, 30, 14, 4, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,234
[ "The", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "logs", "on", "to", "the", "system", "and", "runs", "a", "specially", "crafted", "application", "." ]
[ 6, 17, 13, 27, 14, 9, 14, 9, 6, 14, 17, 9, 26, 6, 14, 4, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
3,184
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,308
[ "The", "majority", "of", "customers", "have", "automatic", "updating", "enabled", "and", "will", "not", "need", "to", "take", "any", "action", "because", "this", "security", "update", "will", "be", "downloaded", "and", "installed", "automatically", "." ]
[ 6, 14, 9, 17, 31, 10, 14, 30, 4, 13, 22, 27, 26, 27, 6, 14, 9, 6, 14, 14, 13, 27, 30, 4, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
652
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,439
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
4,399
[ "Firewall", "best", "practices", "and", "standard", "default", "firewall", "configurations", "can", "help", "protect", "networks", "from", "attacks", "that", "originate", "outside", "the", "enterprise", "perimeter", "." ]
[ 15, 12, 17, 4, 10, 14, 10, 17, 13, 27, 27, 17, 9, 17, 33, 31, 9, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,726
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,142
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,830
[ "These", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 14, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
3,034
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
3,809
[ "This", "security", "update", "resolves", "30", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 31, 32, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
14
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
207
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "this", "vulnerability", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 14, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
172
[ "This", "security", "update", "resolves", "two", "privately", "reported", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 10, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
3,717
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
1,758
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
655
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,717
[ "Publisher", "Corrupt", "Interface", "Pointer", "Vulnerability", "Do", "not", "open", "Publisher", "files", "that", "you", "receive", "from", "untrusted", "sources", "or", "that", "you", "receive", "unexpectedly", "from", "trusted", "sources", "." ]
[ 14, 15, 15, 15, 15, 15, 22, 27, 15, 17, 9, 20, 31, 9, 10, 17, 4, 9, 20, 31, 22, 9, 30, 17, 2 ]
[ 0, 13, 13, 13, 13, 13, 13, 13, 0, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,542
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,728
[ "This", "security", "update", "resolves", "thirteen", "privately", "disclosed", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 14, 17, 31, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
3,942
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
810
[ "This", "security", "update", "resolves", "one", "publicly", "disclosed", "and", "twelve", "privately", "reported", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 4, 27, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
3,081
[ "Customers", "who", "have", "not", "enabled", "automatic", "updating", "need", "to", "check", "for", "updates", "and", "install", "this", "update", "manually", "." ]
[ 17, 34, 31, 22, 30, 10, 29, 14, 26, 27, 9, 17, 4, 27, 6, 10, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,551
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
669
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,371
[ "The", "following", "mitigating", "factors", "may", "be", "helpful", "in", "your", "situation", ":", "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "local", "user", "." ]
[ 6, 10, 14, 17, 13, 27, 10, 9, 21, 14, 3, 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
354
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,669
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
109
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,035
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "view", "content", "from", "another", "domain", "or", "Internet", "Explorer", "zone", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 14, 9, 6, 14, 4, 15, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13 ]
3,612
[ "This", "could", "allow", "the", "attacker", "to", "confirm", "that", "the", "targeted", "email", "account", "is", "valid", "and", "that", "the", "specially", "crafted", "email", "has", "been", "read", "." ]
[ 6, 13, 27, 6, 14, 26, 27, 9, 6, 10, 14, 14, 32, 10, 4, 9, 6, 22, 30, 14, 32, 30, 30, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,893
[ "The", "vulnerability", "cannot", "be", "exploited", "automatically", "through", "email", "." ]
[ 6, 14, 14, 27, 30, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
624
[ "None", "." ]
[ 14, 2 ]
[ 13, 13 ]
3,523
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
333
[ "None", "." ]
[ 14, 2 ]
[ 13, 13 ]
1,653
[ "The", "most", "severe", "of", "these", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "opens", "a", "specially", "crafted", "document", "or", "visits", "a", "malicious", "webpage", "that", "embeds", "TrueType", "font", "files", "." ]
[ 6, 24, 10, 9, 6, 17, 13, 27, 10, 14, 14, 9, 6, 14, 32, 6, 22, 30, 14, 4, 32, 6, 10, 14, 33, 32, 15, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
423
[ "These", "vulnerabilities", "could", "allow", "remote", "code", "execution", "as", "Local", "System", "if", "a", "user", "views", "a", "specially", "crafted", "file", "through", "Outlook", "Web", "Access", "in", "a", "browser", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 10, 15, 9, 6, 10, 17, 6, 22, 30, 14, 9, 15, 15, 15, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
1,807
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
4,240
[ "Workstations", "and", "terminal", "servers", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,999
[ "An", "attacker", "who", "successfully", "exploited", "the", "vulnerabilities", "could", "modify", "the", "contents", "of", "an", "XML", "file", "without", "invalidating", "the", "file's", "signature", "and", "could", "gain", "access", "to", "endpoint", "functions", "as", "if", "they", "were", "an", "authenticated", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 17, 13, 27, 6, 17, 9, 6, 15, 14, 9, 29, 6, 10, 14, 4, 13, 27, 14, 26, 27, 17, 9, 9, 20, 28, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
1,690
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "inject", "a", "client-side", "script", "in", "the", "user's", "browser", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 13 ]
3,659
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,121
[ "Memory", "Consumption", "Vulnerability", "An", "elevation", "of", "privilege", "vulnerability", "exists", "when", "the", "Windows", "kernel-mode", "driver", "improperly", "handles", "objects", "in", "memory", "." ]
[ 14, 15, 15, 6, 14, 9, 14, 14, 32, 36, 6, 15, 14, 14, 22, 32, 17, 9, 14, 2 ]
[ 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 5, 13, 13, 13, 13, 13, 5, 13 ]
4,965
[ "Publisher", "Buffer", "Underflow", "Vulnerability", "Do", "not", "open", "Publisher", "files", "that", "you", "receive", "from", "untrusted", "sources", "or", "that", "you", "receive", "unexpectedly", "from", "trusted", "sources", "." ]
[ 14, 15, 15, 15, 15, 22, 27, 15, 17, 9, 20, 31, 9, 10, 17, 4, 9, 20, 31, 22, 9, 30, 17, 2 ]
[ 0, 13, 5, 13, 13, 13, 13, 0, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,130
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,691
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
2,969
[ "This", "security", "update", "resolves", "thirteen", "privately", "disclosed", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 14, 17, 31, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
576
[ "Firewall", "best", "practices", "and", "standard", "default", "firewall", "configurations", "can", "help", "protect", "networks", "from", "attacks", "that", "originate", "outside", "the", "enterprise", "perimeter", "." ]
[ 15, 12, 17, 4, 10, 14, 10, 17, 13, 27, 27, 17, 9, 17, 33, 31, 9, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,366
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "this", "vulnerability", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 14, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,263
[ "This", "security", "update", "resolves", "a", "privately", "reported", "vulnerability", "in", "Windows", "Remote", "Desktop", "Client", "." ]
[ 6, 14, 14, 32, 6, 22, 30, 14, 9, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 5, 13, 13, 13 ]
2,359
[ "This", "security", "update", "resolves", "three", "privately", "reported", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 14, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
4,417
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,301
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13 ]
3,583
[ "These", "vulnerabilities", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 17, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,797
[ "The", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "logs", "on", "to", "the", "system", "and", "runs", "a", "specially", "crafted", "application", "." ]
[ 6, 17, 13, 27, 14, 9, 14, 9, 6, 14, 17, 9, 26, 6, 14, 4, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
704
[ "The", "most", "severe", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "a", "user", "clicks", "a", "specially", "crafted", "URL", "that", "takes", "the", "user", "to", "a", "targeted", "SharePoint", "site", "." ]
[ 6, 24, 10, 17, 13, 27, 14, 9, 14, 9, 6, 14, 32, 6, 22, 30, 15, 33, 32, 6, 14, 26, 6, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,406
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,036
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
209
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
905
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,616
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,774
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,178
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,938
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
2,259
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,762
[ "These", "vulnerabilities", "require", "that", "a", "user", "open", "a", "specially", "crafted", "Publisher", "file", "with", "an", "affected", "version", "of", "Microsoft", "Publisher", "." ]
[ 6, 17, 31, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
2,958
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,555
[ "These", "vulnerabilities", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 17, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,268
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,215
[ "An", "elevation", "of", "privilege", "vulnerability", "exists", "when", "the", "NTFS", "kernel-mode", "driver", "improperly", "handles", "objects", "in", "memory", "." ]
[ 6, 14, 9, 14, 14, 32, 36, 6, 15, 14, 14, 22, 32, 17, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 5, 13 ]
3,697
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "designed", "to", "increase", "privileges", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 30, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 5, 13 ]
4,753
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,249
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,307
[ "The", "most", "severe", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 24, 10, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
2,230
[ "Web", "browsing", "scenario", "Successful", "exploitation", "of", "this", "vulnerability", "requires", "that", "a", "user", "is", "logged", "on", "and", "is", "visiting", "websites", "using", "a", "web", "browser", "capable", "of", "instantiating", "XBAPs", "." ]
[ 15, 29, 14, 15, 14, 9, 6, 14, 32, 9, 6, 14, 32, 30, 9, 4, 32, 29, 17, 29, 6, 14, 14, 10, 9, 29, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,163
[ "Excel", "SST", "Invalid", "Length", "Use", "After", "Free", "Vulnerability", "Use", "Microsoft", "Office", "File", "Block", "policy", "to", "block", "the", "opening", "of", "Office", "2003", "and", "earlier", "documents", "from", "unknown", "or", "untrusted", "sources", "and", "locations", "Use", "the", "Microsoft", "Office", "Isolated", "Conversion", "Environment", "(", "MOICE", ")", "when", "opening", "files", "from", "unknown", "or", "untrusted", "sources", "Do", "not", "open", "Excel", "files", "that", "you", "receive", "from", "untrusted", "sources", "or", "that", "you", "receive", "unexpectedly", "from", "trusted", "sources", "This", "is", "a", "remote", "code", "execution", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 9, 15, 15, 15, 15, 15, 15, 15, 14, 26, 27, 6, 14, 9, 15, 5, 4, 11, 17, 9, 10, 4, 10, 17, 4, 17, 31, 6, 15, 15, 15, 15, 15, 0, 15, 1, 36, 29, 17, 9, 10, 4, 10, 17, 31, 22, 27, 15, 17, 9, 20, 31, 9, 10, 17, 4, 9, 20, 31, 22, 9, 30, 17, 6, 32, 6, 10, 14, 14, 14, 2 ]
[ 0, 13, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 13, 13, 13, 13, 13, 13, 13, 0, 8, 12, 12, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 0, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13 ]
3,912
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
57
[ "The", "more", "severe", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "opens", "or", "previews", "a", "specially", "crafted", "RTF", "file", "." ]
[ 6, 23, 10, 14, 13, 27, 10, 14, 14, 9, 6, 14, 32, 4, 32, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,193
[ "Visio", "DXF", "File", "Format", "Buffer", "Overflow", "Do", "not", "open", "Office", "files", "that", "you", "receive", "from", "untrusted", "sources", "or", "that", "you", "receive", "unexpectedly", "from", "trusted", "sources", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "Microsoft", "XML", "Core", "Services", "handles", "objects", "in", "memory", "." ]
[ 15, 15, 15, 15, 15, 15, 15, 22, 27, 15, 17, 9, 20, 31, 9, 10, 17, 4, 9, 20, 31, 22, 9, 30, 17, 15, 14, 14, 14, 14, 32, 9, 6, 14, 9, 15, 15, 15, 16, 32, 17, 9, 14, 2 ]
[ 0, 13, 13, 13, 5, 11, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 9, 9, 13, 13, 13, 5, 13 ]
244
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "email", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,403
[ "The", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 14, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
2,210
[ "The", "majority", "of", "customers", "have", "automatic", "updating", "enabled", "and", "will", "not", "need", "to", "take", "any", "action", "because", "this", "security", "update", "will", "be", "downloaded", "and", "installed", "automatically", "." ]
[ 6, 14, 9, 17, 31, 10, 14, 30, 4, 13, 22, 27, 26, 27, 6, 14, 9, 6, 14, 14, 13, 27, 30, 4, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,759
[ "This", "security", "update", "resolves", "thirteen", "privately", "disclosed", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 14, 17, 31, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
2,849
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,671
[ "The", "Operational", "log", "for", "IIS", "is", "not", "enabled", "by", "default", "." ]
[ 6, 15, 14, 9, 15, 32, 22, 30, 9, 14, 2 ]
[ 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13 ]
794
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,427
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
359
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,112
[ "This", "security", "update", "resolves", "a", "privately", "reported", "vulnerability", "in", "Active", "Directory", "." ]
[ 6, 14, 14, 32, 6, 22, 30, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
2,560
[ "Windows", ".NET", "applications", "Workstations", "and", "servers", "that", "run", "untrusted", "Windows", ".NET", "Framework", "applications", "are", "also", "at", "risk", "from", "this", "vulnerability", "." ]
[ 32, 10, 17, 17, 4, 17, 33, 31, 10, 15, 15, 15, 17, 31, 22, 9, 14, 9, 6, 14, 2 ]
[ 3, 8, 13, 13, 13, 13, 13, 13, 13, 3, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
702
[ "An", "attacker", "could", "view", "or", "tamper", "with", "other", "users", "'", "search", "scopes", "." ]
[ 6, 14, 13, 27, 4, 27, 9, 10, 17, 19, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,930
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
4,288
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,704
[ "System", "Center", "Operations", "Manager", "servers", "with", "users", "who", "are", "authorized", "to", "access", "System", "Center", "Operations", "Manager", "web", "consoles", "are", "primarily", "at", "risk", "." ]
[ 15, 15, 15, 15, 17, 9, 17, 34, 31, 30, 26, 14, 15, 15, 15, 15, 14, 17, 31, 22, 9, 14, 2 ]
[ 0, 9, 9, 9, 13, 13, 13, 13, 13, 13, 13, 5, 0, 9, 9, 9, 13, 13, 13, 13, 13, 13, 13 ]
3,841
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]