sentence_idx
int64
0
5.08k
word
list
pos
list
tag
list
4,900
[ "Systems", "where", "Microsoft", "Publisher", "is", "used", null, "including", "workstations", "and", "terminal", "servers", null, "are", "primarily", "at", "risk", "." ]
[ 16, 36, 15, 15, 32, 30, 37, 29, 17, 4, 10, 17, 37, 31, 22, 9, 14, 2 ]
[ 13, 13, 7, 0, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,901
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,902
[ "However", null, "best", "practices", "strongly", "discourage", "allowing", "this", "." ]
[ 22, 37, 12, 17, 22, 27, 29, 6, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,903
[ "Publisher", "Signed", "Integer", "Vulnerability", "Do", "not", "open", "Publisher", "files", "that", "you", "receive", "from", "untrusted", "sources", "or", "that", "you", "receive", "unexpectedly", "from", "trusted", "sources", "." ]
[ 14, 28, 15, 15, 15, 22, 27, 15, 17, 9, 20, 31, 9, 10, 17, 4, 9, 20, 31, 22, 9, 30, 17, 2 ]
[ 0, 13, 5, 13, 13, 13, 13, 0, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,904
[ "These", "vulnerabilities", "could", "be", "exploited", "when", "a", "user", "opens", "a", "specially", "crafted", "file", "." ]
[ 6, 17, 13, 27, 30, 36, 6, 14, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,905
[ "Multiple", "remote", "code", "execution", "vulnerabilities", "exists", "in", "the", "way", "that", "Microsoft", "Publisher", "parses", "Publisher", "files", "." ]
[ 10, 10, 14, 14, 17, 32, 9, 6, 14, 9, 15, 15, 32, 15, 17, 2 ]
[ 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 0, 5, 13 ]
4,906
[ "An", "attacker", "who", "successfully", "exploited", "any", "of", "these", "vulnerabilities", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 9, 6, 17, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,907
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,908
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,909
[ "This", "security", "update", "resolves", "eleven", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Office", "." ]
[ 6, 14, 14, 17, 22, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13 ]
4,910
[ "The", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "open", "a", "specially", "crafted", "Publisher", "file", "with", "an", "affected", "version", "of", "Microsoft", "Publisher", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
4,911
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,912
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,913
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "run", "arbitrary", "code", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13 ]
4,914
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "could", "take", "complete", "control", "of", "the", "affected", "system", "." ]
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,915
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,916
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,917
[ "These", "vulnerabilities", "require", "that", "a", "user", "open", "a", "specially", "crafted", "Publisher", "file", "with", "an", "affected", "version", "of", "Microsoft", "Publisher", "." ]
[ 6, 17, 31, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
4,918
[ "In", "an", "email", "attack", "scenario", null, "an", "attacker", "could", "exploit", "the", "vulnerabilities", "by", "sending", "a", "specially", "crafted", "Publisher", "file", "to", "the", "user", "and", "then", "convincing", "the", "user", "to", "open", ...
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 17, 9, 29, 6, 22, 30, 15, 14, 26, 6, 14, 4, 22, 29, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,919
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "would", "have", "to", "host", "a", "website", "that", "contains", "a", "Publisher", "file", "that", "is", "used", "to", "attempt", "to", "exploit", "these", "vulnerabilities", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 26, 27, 6, 14, 33, 32, 6, 14, 14, 33, 32, 30, 26, 27, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,920
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,921
[ "An", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "a", "specially", "crafted", "website", "." ]
[ 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 22, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,922
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "them", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "Instant", "Messenger", "message", ...
[ 22, 37, 6, 14, 13, 27, 26, 27, 20, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 15, 15, 14, 33, 32, 20, 26, 6, 14, 14, 37, 4, 22, 27, 20, 26, 27, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13 ]
4,923
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,924
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,925
[ "These", "vulnerabilities", "cannot", "be", "exploited", "automatically", "through", "e-mail", "." ]
[ 6, 17, 31, 27, 30, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,926
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "e-mail", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,927
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "could", "host", "a", "website", "that", "contains", "a", "webpage", "that", "is", "used", "to", "exploit", "these", "vulnerabilities", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 14, 33, 32, 6, 14, 33, 32, 30, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,928
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "...
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,929
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "these", "websites", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,930
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "Instant", "Messenger", "message", ...
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 22, 27, 20, 26, 27, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13 ]
4,931
[ "Systems", "where", "Microsoft", "Publisher", "is", "used", null, "including", "workstations", "and", "terminal", "servers", null, "are", "primarily", "at", "risk", "." ]
[ 16, 36, 15, 15, 32, 30, 37, 29, 17, 4, 10, 17, 37, 31, 22, 9, 14, 2 ]
[ 13, 13, 7, 0, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,932
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,933
[ "However", null, "best", "practices", "strongly", "discourage", "allowing", "this", "." ]
[ 22, 37, 12, 17, 22, 27, 29, 6, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,934
[ "Publisher", "Pointer", "Handling", "Vulnerability", "Do", "not", "open", "Publisher", "files", "that", "you", "receive", "from", "untrusted", "sources", "or", "that", "you", "receive", "unexpectedly", "from", "trusted", "sources", "." ]
[ 4, 15, 15, 15, 15, 22, 27, 15, 17, 9, 20, 31, 9, 10, 17, 4, 9, 20, 31, 22, 9, 30, 17, 2 ]
[ 0, 13, 13, 13, 13, 13, 13, 0, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,935
[ "These", "vulnerabilities", "could", "be", "exploited", "when", "a", "user", "opens", "a", "specially", "crafted", "file", "." ]
[ 6, 17, 13, 27, 30, 36, 6, 14, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,936
[ "Multiple", "remote", "code", "execution", "vulnerabilities", "exists", "in", "the", "way", "that", "Microsoft", "Publisher", "parses", "Publisher", "files", "." ]
[ 10, 10, 14, 14, 17, 32, 9, 6, 14, 9, 15, 15, 32, 15, 17, 2 ]
[ 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 0, 5, 13 ]
4,937
[ "An", "attacker", "who", "successfully", "exploited", "any", "of", "these", "vulnerabilities", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 9, 6, 17, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,938
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,939
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,940
[ "This", "security", "update", "resolves", "eleven", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Office", "." ]
[ 6, 14, 14, 17, 22, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13 ]
4,941
[ "The", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "open", "a", "specially", "crafted", "Publisher", "file", "with", "an", "affected", "version", "of", "Microsoft", "Publisher", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
4,942
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,943
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,944
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "run", "arbitrary", "code", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13 ]
4,945
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "could", "take", "complete", "control", "of", "the", "affected", "system", "." ]
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,946
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,947
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,948
[ "These", "vulnerabilities", "require", "that", "a", "user", "open", "a", "specially", "crafted", "Publisher", "file", "with", "an", "affected", "version", "of", "Microsoft", "Publisher", "." ]
[ 6, 17, 31, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
4,949
[ "In", "an", "email", "attack", "scenario", null, "an", "attacker", "could", "exploit", "the", "vulnerabilities", "by", "sending", "a", "specially", "crafted", "Publisher", "file", "to", "the", "user", "and", "then", "convincing", "the", "user", "to", "open", ...
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 17, 9, 29, 6, 22, 30, 15, 14, 26, 6, 14, 4, 22, 29, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,950
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "would", "have", "to", "host", "a", "website", "that", "contains", "a", "Publisher", "file", "that", "is", "used", "to", "attempt", "to", "exploit", "these", "vulnerabilities", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 26, 27, 6, 14, 33, 32, 6, 14, 14, 33, 32, 30, 26, 27, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,951
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,952
[ "An", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "a", "specially", "crafted", "website", "." ]
[ 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 22, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,953
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "them", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "Instant", "Messenger", "message", ...
[ 22, 37, 6, 14, 13, 27, 26, 27, 20, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 15, 15, 14, 33, 32, 20, 26, 6, 14, 14, 37, 4, 22, 27, 20, 26, 27, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13 ]
4,954
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,955
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,956
[ "These", "vulnerabilities", "cannot", "be", "exploited", "automatically", "through", "e-mail", "." ]
[ 6, 17, 31, 27, 30, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,957
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "e-mail", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,958
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "could", "host", "a", "website", "that", "contains", "a", "webpage", "that", "is", "used", "to", "exploit", "these", "vulnerabilities", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 14, 33, 32, 6, 14, 33, 32, 30, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,959
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "...
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,960
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "these", "websites", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,961
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "Instant", "Messenger", "message", ...
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 22, 27, 20, 26, 27, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13 ]
4,962
[ "Systems", "where", "Microsoft", "Publisher", "is", "used", null, "including", "workstations", "and", "terminal", "servers", null, "are", "primarily", "at", "risk", "." ]
[ 16, 36, 15, 15, 32, 30, 37, 29, 17, 4, 10, 17, 37, 31, 22, 9, 14, 2 ]
[ 13, 13, 7, 0, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,963
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,964
[ "However", null, "best", "practices", "strongly", "discourage", "allowing", "this", "." ]
[ 22, 37, 12, 17, 22, 27, 29, 6, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,965
[ "Publisher", "Buffer", "Underflow", "Vulnerability", "Do", "not", "open", "Publisher", "files", "that", "you", "receive", "from", "untrusted", "sources", "or", "that", "you", "receive", "unexpectedly", "from", "trusted", "sources", "." ]
[ 14, 15, 15, 15, 15, 22, 27, 15, 17, 9, 20, 31, 9, 10, 17, 4, 9, 20, 31, 22, 9, 30, 17, 2 ]
[ 0, 13, 5, 13, 13, 13, 13, 0, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,966
[ "These", "vulnerabilities", "could", "be", "exploited", "when", "a", "user", "opens", "a", "specially", "crafted", "file", "." ]
[ 6, 17, 13, 27, 30, 36, 6, 14, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,967
[ "An", "elevation", "of", "privilege", "vulnerability", "exists", "when", "the", "Microsoft", "DirectX", "graphics", "kernel", "subsystem", "(", "dxgkrnl.sys", ")", "improperly", "handles", "objects", "in", "memory", "." ]
[ 6, 14, 9, 14, 14, 32, 36, 6, 15, 15, 17, 31, 14, 0, 14, 1, 22, 32, 17, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
4,968
[ "This", "security", "update", "resolves", "three", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 14, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
4,969
[ "The", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "logs", "on", "to", "the", "system", "and", "runs", "a", "specially", "crafted", "application", "." ]
[ 6, 17, 13, 27, 14, 9, 14, 9, 6, 14, 17, 9, 26, 6, 14, 4, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
4,970
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "these", "vulnerabilities", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,971
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "elevated", "privileges", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 17, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 5, 13, 13, 5, 13, 13, 5, 5, 13 ]
4,972
[ "To", "exploit", "this", "vulnerability", null, "an", "attacker", "would", "first", "have", "to", "log", "on", "to", "the", "system", "." ]
[ 26, 27, 6, 14, 37, 6, 14, 13, 22, 27, 26, 27, 9, 26, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,973
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "designed", "to", "increase", "privileges", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 30, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 5, 13 ]
4,974
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,975
[ "Workstations", "and", "terminal", "servers", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,976
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,977
[ "However", null, "best", "practices", "strongly", "discourage", "allowing", "this", "." ]
[ 22, 37, 12, 17, 22, 27, 29, 6, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,978
[ "DirectX", "Graphics", "Kernel", "Subsystem", "Double", "Fetch", "Vulnerability", "Microsoft", "has", "not", "identified", "any", "workarounds", "for", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 15, 15, 15, 32, 22, 30, 6, 17, 9, 6, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,979
[ "This", "security", "update", "resolves", "three", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 14, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
4,980
[ "The", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "logs", "on", "to", "the", "system", "and", "runs", "a", "specially", "crafted", "application", "." ]
[ 6, 17, 13, 27, 14, 9, 14, 9, 6, 14, 17, 9, 26, 6, 14, 4, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
4,981
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "these", "vulnerabilities", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,982
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "elevated", "privileges", "and", "cause", "system", "instability", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 17, 4, 14, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 5, 13, 13, 13, 13, 13 ]
4,983
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,984
[ "Workstations", "are", "primarily", "at", "risk", "." ]
[ 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
4,985
[ "Win32k", "Buffer", "Overflow", "Vulnerability", "Microsoft", "has", "not", "identified", "any", "workarounds", "for", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 32, 22, 30, 6, 17, 9, 6, 14, 2 ]
[ 13, 5, 11, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,986
[ "This", "security", "update", "resolves", "three", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 14, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
4,987
[ "The", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "logs", "on", "to", "the", "system", "and", "runs", "a", "specially", "crafted", "application", "." ]
[ 6, 17, 13, 27, 14, 9, 14, 9, 6, 14, 17, 9, 26, 6, 14, 4, 32, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
4,988
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "these", "vulnerabilities", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,989
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "processes", "in", "an", "elevated", "context", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,990
[ "To", "exploit", "this", "vulnerability", null, "an", "attacker", "would", "first", "have", "to", "log", "on", "to", "the", "system", "." ]
[ 26, 27, 6, 14, 37, 6, 14, 13, 22, 27, 26, 27, 9, 26, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,991
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "designed", "to", "increase", "privileges", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 30, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 5, 13 ]
4,992
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,993
[ "Workstations", "are", "primarily", "at", "risk", "." ]
[ 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
4,994
[ "Win32k", "Window", "Handle", "Vulnerability", "Microsoft", "has", "not", "identified", "any", "workarounds", "for", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 32, 22, 30, 6, 17, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,995
[ "A", "spoofing", "vulnerability", "exists", "when", "the", "Microsoft", ".NET", "Framework", "fails", "to", "properly", "validate", "the", "signature", "of", "a", "specially", "crafted", "XML", "file", "." ]
[ 6, 10, 14, 32, 36, 6, 15, 15, 15, 32, 26, 27, 27, 6, 14, 9, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 7, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,996
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "modify", "the", "contents", "of", "an", "XML", "file", "without", "invalidating", "the", "signature", "associated", "with", "the", "file", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 17, 9, 6, 15, 14, 9, 29, 6, 14, 30, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,997
[ "This", "security", "update", "resolves", "two", "privately", "reported", "vulnerabilities", "in", "the", ".NET", "Framework", "." ]
[ 6, 14, 10, 17, 5, 22, 30, 17, 9, 6, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
4,998
[ "The", "more", "severe", "of", "the", "vulnerabilities", "could", "allow", "spoofing", "if", "a", ".NET", "application", "receives", "a", "specially", "crafted", "XML", "file", "." ]
[ 6, 23, 10, 9, 6, 17, 13, 27, 29, 9, 6, 10, 14, 32, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 8, 5, 13, 13, 13, 13, 13, 13, 13 ]
4,999
[ "An", "attacker", "who", "successfully", "exploited", "the", "vulnerabilities", "could", "modify", "the", "contents", "of", "an", "XML", "file", "without", "invalidating", "the", "file's", "signature", "and", "could", "gain", "access", "to", "endpoint", "functions...
[ 6, 14, 34, 22, 28, 6, 17, 13, 27, 6, 17, 9, 6, 15, 14, 9, 29, 6, 10, 14, 4, 13, 27, 14, 26, 27, 17, 9, 9, 20, 28, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]