sentence_idx
int64
0
5.08k
word
list
pos
list
tag
list
5,000
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "modify", "the", "contents", "of", "an", "XML", "file", "without", "invalidating", "the", "signature", "associated", "with", "the", "file", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 17, 9, 6, 15, 14, 9, 29, 6, 14, 30, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,001
[ "If", "a", ".NET", "application", "relies", "on", "the", "signature", "to", "be", "non-malicious", null, "the", "behavior", "of", "the", "application", "could", "become", "unpredictable", "." ]
[ 9, 6, 10, 14, 17, 9, 6, 14, 26, 27, 10, 37, 6, 14, 9, 6, 14, 13, 27, 10, 2 ]
[ 13, 13, 8, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
5,002
[ "In", "custom", "applications", null, "the", "security", "impact", "depends", "on", "the", "specific", "usage", "scenario", "." ]
[ 9, 14, 17, 37, 6, 14, 14, 32, 9, 6, 10, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,003
[ "In", "a", ".NET", "application", "attack", "scenario", null, "an", "attacker", "could", "modify", "the", "contents", "of", "an", "XML", "file", "without", "invalidating", "the", "signature", "associated", "with", "the", "file", "." ]
[ 9, 6, 10, 14, 14, 14, 37, 6, 14, 13, 27, 6, 17, 9, 6, 15, 14, 9, 29, 6, 14, 30, 9, 6, 14, 2 ]
[ 13, 13, 8, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,004
[ "Microsoft", "has", "not", "identified", "any", "mitigating", "factors", "for", "this", "vulnerability", "." ]
[ 15, 32, 22, 30, 6, 10, 17, 9, 6, 14, 2 ]
[ 7, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,005
[ "Workstations", "and", "servers", "that", "run", "Windows", ".NET", "Framework", "applications", "are", "primarily", "at", "risk", "from", "this", "vulnerability", "." ]
[ 17, 4, 17, 33, 31, 15, 15, 15, 17, 31, 22, 9, 14, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 3, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,006
[ "XML", "Digital", "Signature", "Spoofing", "Vulnerability", "Use", "a", "secure", "channel", "to", "transmit", "sensitive", "information", "A", "security", "feature", "bypass", "vulnerability", "exists", "in", "the", "way", "that", "the", "Microsoft", ".NET", "Fra...
[ 10, 15, 15, 15, 15, 15, 6, 14, 14, 26, 27, 10, 14, 15, 14, 14, 14, 14, 32, 9, 6, 14, 9, 6, 15, 15, 15, 22, 32, 14, 17, 9, 14, 36, 29, 25, 10, 15, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 9, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 5, 13 ]
5,007
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "would", "have", "access", "to", "the", "endpoint", "functions", "as", "if", "they", "were", "authenticated", null, "allowing", "an", "attacker", "to", "steal", "information", "or", "...
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 14, 26, 6, 14, 17, 9, 9, 20, 28, 30, 37, 29, 6, 14, 26, 27, 14, 4, 27, 6, 17, 9, 6, 14, 9, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
5,008
[ "This", "security", "update", "resolves", "two", "privately", "reported", "vulnerabilities", "in", "the", ".NET", "Framework", "." ]
[ 6, 14, 10, 17, 5, 22, 30, 17, 9, 6, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
5,009
[ "The", "more", "severe", "of", "the", "vulnerabilities", "could", "allow", "spoofing", "if", "a", ".NET", "application", "receives", "a", "specially", "crafted", "XML", "file", "." ]
[ 6, 23, 10, 9, 6, 17, 13, 27, 29, 9, 6, 10, 14, 32, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 8, 5, 13, 13, 13, 13, 13, 13, 13 ]
5,010
[ "An", "attacker", "who", "successfully", "exploited", "the", "vulnerabilities", "could", "modify", "the", "contents", "of", "an", "XML", "file", "without", "invalidating", "the", "file's", "signature", "and", "could", "gain", "access", "to", "endpoint", "functions...
[ 6, 14, 34, 22, 28, 6, 17, 13, 27, 6, 17, 9, 6, 15, 14, 9, 29, 6, 10, 14, 4, 13, 27, 14, 26, 27, 17, 9, 9, 20, 28, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
5,011
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "access", "to", "endpoint", "functions", "as", "if", "they", "were", "an", "authenticated", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 14, 26, 27, 17, 9, 9, 20, 28, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
5,012
[ "The", "context", "of", "the", "authentication", "bypass", "and", "the", "degree", "to", "which", "systems", "are", "impacted", "by", "the", "vulnerability", "is", "specific", "to", "each", "custom", "application", "." ]
[ 6, 14, 9, 6, 14, 14, 4, 6, 14, 26, 33, 17, 31, 30, 9, 6, 14, 32, 10, 26, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
5,013
[ "A", "program", "that", "validates", "the", "role", "and", "credentials", "of", "the", "user", "will", "be", "minimally", "impacted", "by", "the", "vulnerability", "by", "hindering", "an", "attacker's", "attempts", "to", "steal", "information", "or", "take", "...
[ 6, 14, 33, 32, 6, 14, 4, 17, 9, 6, 14, 13, 27, 22, 30, 9, 6, 14, 9, 29, 6, 14, 17, 26, 27, 14, 4, 27, 6, 17, 9, 6, 14, 9, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
5,014
[ "However", null, "programs", "that", "do", "not", "do", "these", "validation", "checks", "could", "allow", "an", "attacker", "to", "obtain", "information", "that", "is", "available", "only", "to", "authenticated", "users", "or", "could", "allow", "an", "attack...
[ 22, 37, 17, 33, 31, 22, 27, 6, 14, 17, 13, 27, 6, 14, 26, 27, 14, 33, 32, 10, 22, 26, 30, 17, 4, 13, 27, 6, 14, 26, 27, 14, 9, 14, 9, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
5,015
[ "In", "a", ".NET", "application", "attack", "scenario", null, "an", "attacker", "could", "send", "specially", "crafted", "queries", "to", "a", "WCF", "endpoint", "." ]
[ 9, 6, 10, 14, 14, 14, 37, 6, 14, 13, 27, 22, 30, 17, 26, 6, 15, 14, 2 ]
[ 13, 13, 8, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,016
[ "By", "default", "the", "WCF", "authentication", "mode", "is", "set", "to", null, "Windows", null, "in", "the", "userNamePasswordValidationMode", "property", null, "which", "is", "not", "vulnerable", "." ]
[ 9, 14, 6, 15, 14, 14, 32, 30, 26, 27, 15, 15, 9, 6, 10, 14, 37, 33, 32, 22, 10, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,017
[ "Workstations", "and", "servers", "that", "run", "Windows", "WCF", "services", "are", "primarily", "at", "risk", "from", "this", "vulnerability", "." ]
[ 17, 4, 17, 33, 31, 15, 15, 17, 31, 22, 9, 14, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,018
[ "Authentication", "Bypass", "Vulnerability", "-", "CVE-2013-1337", "Use", "netHttpBinding", "with", "TransportWithMessageCredential", "instead", "of", "netHttpsBinding", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "Internet",...
[ 15, 15, 15, 3, 10, 15, 14, 9, 15, 22, 9, 29, 15, 10, 14, 14, 14, 32, 9, 6, 14, 9, 15, 15, 32, 6, 14, 9, 14, 33, 32, 30, 30, 4, 32, 22, 30, 22, 30, 2 ]
[ 5, 5, 13, 13, 1, 13, 13, 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,019
[ "The", "vulnerability", "may", "corrupt", "memory", "in", "a", "way", "that", "could", "allow", "an", "attacker", "to", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "within", "Internet", "Explorer", "." ]
[ 6, 14, 13, 27, 14, 9, 6, 14, 33, 13, 27, 6, 14, 26, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
5,020
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "this", "vulnerability", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 14, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,021
[ "This", "security", "update", "resolves", "one", "publicly", "disclosed", "vulnerability", "in", "Internet", "Explorer", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
5,022
[ "The", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 14, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
5,023
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,024
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,025
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,026
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,027
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,028
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "this", "vulnerability", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 14, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,029
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,030
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,031
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "view", "the", "attacker-controlled", "content", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,032
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "take", "action", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "in", "an", "Instant", "Messenger", "messag...
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 9, 6, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 9, 29, 6, 14, 28, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,033
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,034
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,035
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "this", "vulnerability", "through", "Internet", "Explorer", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
5,036
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,037
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,038
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "view", "the", "attacker-controlled", "content", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,039
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "take", "action", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "in", "an", "Instant", "Messenger", "messag...
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 9, 6, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 9, 29, 6, 14, 28, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,040
[ "By", "default", null, "all", "supported", "versions", "of", "Microsoft", "Outlook", null, "Microsoft", "Outlook", "Express", null, "and", "Windows", "Mail", "open", "HTML", "email", "messages", "in", "the", "Restricted", "sites", "zone", "." ]
[ 9, 14, 37, 6, 28, 17, 9, 15, 15, 37, 15, 15, 15, 37, 4, 15, 15, 10, 15, 14, 17, 9, 6, 15, 32, 14, 2 ]
[ 13, 13, 13, 8, 8, 8, 13, 7, 13, 13, 7, 13, 13, 13, 13, 3, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,041
[ "The", "Restricted", "sites", "zone", null, "which", "disables", "script", "and", "ActiveX", "controls", null, "helps", "reduce", "the", "risk", "of", "an", "attacker", "being", "able", "to", "use", "this", "vulnerability", "to", "execute", "malicious", "code"...
[ 6, 15, 32, 5, 37, 33, 32, 14, 4, 15, 17, 37, 32, 27, 6, 14, 9, 6, 14, 29, 10, 26, 27, 6, 14, 26, 27, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 5, 13 ]
5,042
[ "If", "a", "user", "clicks", "a", "link", "in", "an", "email", "message", null, "the", "user", "could", "still", "be", "vulnerable", "to", "exploitation", "of", "this", "vulnerability", "through", "the", "web-based", "attack", "scenario", "." ]
[ 9, 6, 14, 32, 6, 14, 9, 6, 10, 14, 37, 6, 14, 13, 22, 27, 10, 26, 14, 9, 6, 14, 9, 6, 10, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
5,043
[ "By", "default", null, "Internet", "Explorer", "on", "Windows", "Server", "2003", null, "Windows", "Server", "2008", null, "Windows", "Server", "2008", "R2", null, "and", "Windows", "Server", "2012", "runs", "in", "a", "restricted", "mode", "that", "is", "...
[ 9, 14, 37, 15, 15, 9, 15, 15, 5, 37, 32, 15, 5, 37, 32, 15, 5, 15, 37, 4, 15, 15, 5, 32, 9, 6, 10, 14, 33, 32, 30, 9, 15, 15, 15, 2 ]
[ 13, 13, 13, 0, 9, 13, 3, 13, 13, 13, 3, 13, 13, 13, 3, 13, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
5,044
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
5,045
[ "See", "the", "FAQ", "section", "for", "the", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
5,046
[ "Systems", "where", "Internet", "Explorer", "is", "used", "frequently", null, "such", "as", "workstations", "or", "terminal", "servers", null, "are", "at", "the", "most", "risk", "from", "this", "vulnerability", "." ]
[ 16, 36, 15, 15, 32, 30, 22, 37, 10, 9, 17, 4, 10, 17, 37, 31, 9, 6, 24, 14, 9, 6, 14, 2 ]
[ 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,047
[ "Internet", "Explorer", "Use", "After", "Free", "Vulnerability", "Set", "Internet", "and", "Local", "intranet", "security", "zone", "settings", "to", null, "High", null, "to", "block", "ActiveX", "Controls", "and", "Active", "Scripting", "in", "these", "zones", ...
[ 15, 15, 15, 9, 15, 15, 15, 15, 4, 15, 14, 14, 14, 17, 26, 27, 15, 15, 26, 27, 15, 15, 4, 15, 15, 9, 6, 17, 15, 15, 15, 26, 27, 9, 29, 10, 15, 4, 26, 27, 10, 15, 9, 6, 15, 4, 15, 14, 14, 14, 15, 14, 14, 17, 31...
[ 0, 9, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 5, 5, 13, 13, 13,...
5,048
[ "These", "vulnerabilities", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 17, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,049
[ "This", "security", "update", "resolves", "eleven", "privately", "reported", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 14, 17, 22, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
5,050
[ "The", "most", "severe", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 24, 10, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
5,051
[ "An", "attacker", "who", "successfully", "exploited", "the", "most", "severe", "of", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 24, 10, 9, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,052
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,053
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,054
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "take", "complete", "control", "of", "an", "affected", "system", "....
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,055
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,056
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,057
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,058
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,059
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "view", "the", "attacker-controlled", "content", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,060
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "take", "action", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "in", "an", "Instant", "Messenger", "messag...
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 9, 6, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 9, 29, 20, 26, 27, 6, 14, 28, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,061
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a...
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,062
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,063
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,064
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "view", "the", "attacker-controlled", "content", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,065
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "take", "action", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "in", "an", "Instant", "Messenger", "messag...
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 9, 6, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 9, 29, 20, 26, 27, 6, 14, 28, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,066
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,067
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,068
[ "By", "default", null, "all", "supported", "versions", "of", "Microsoft", "Outlook", null, "Microsoft", "Outlook", "Express", null, "and", "Windows", "Mail", "open", "HTML", "email", "messages", "in", "the", "Restricted", "sites", "zone", "." ]
[ 9, 14, 37, 6, 28, 17, 9, 15, 15, 37, 15, 15, 15, 37, 4, 15, 15, 10, 15, 14, 17, 9, 6, 15, 32, 14, 2 ]
[ 13, 13, 13, 8, 8, 8, 13, 7, 13, 13, 7, 13, 13, 13, 13, 3, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,069
[ "The", "Restricted", "sites", "zone", null, "which", "disables", "script", "and", "ActiveX", "controls", null, "helps", "reduce", "the", "risk", "of", "an", "attacker", "being", "able", "to", "use", "these", "vulnerabilities", "to", "execute", "malicious", "co...
[ 6, 15, 32, 5, 37, 33, 32, 14, 4, 15, 17, 37, 32, 27, 6, 14, 9, 6, 14, 29, 10, 26, 27, 6, 17, 26, 27, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 5, 13 ]
5,070
[ "If", "a", "user", "clicks", "a", "link", "in", "an", "email", "message", null, "the", "user", "could", "still", "be", "vulnerable", "to", "exploitation", "of", "these", "vulnerabilities", "through", "the", "web-based", "attack", "scenario", "." ]
[ 9, 6, 14, 32, 6, 14, 9, 6, 10, 14, 37, 6, 14, 13, 22, 27, 10, 26, 14, 9, 6, 17, 9, 6, 10, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
5,071
[ "By", "default", null, "Internet", "Explorer", "on", "Windows", "Server", "2003", null, "Windows", "Server", "2008", null, "Windows", "Server", "2008", "R2", null, "and", "Windows", "Server", "2012", "runs", "in", "a", "restricted", "mode", "that", "is", "...
[ 9, 14, 37, 15, 15, 9, 15, 15, 5, 37, 32, 15, 5, 37, 32, 15, 5, 15, 37, 4, 15, 15, 5, 32, 9, 6, 10, 14, 33, 32, 30, 9, 15, 15, 15, 2 ]
[ 13, 13, 13, 0, 9, 13, 3, 13, 13, 13, 3, 13, 13, 13, 3, 13, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
5,072
[ "This", "mode", "mitigates", "these", "vulnerabilities", "." ]
[ 6, 14, 32, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
5,073
[ "See", "the", "FAQ", "section", "for", "these", "vulnerabilities", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 17, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
5,074
[ "Systems", "where", "Internet", "Explorer", "is", "used", "frequently", null, "such", "as", "workstations", "or", "terminal", "servers", null, "are", "at", "the", "most", "risk", "from", "these", "vulnerabilities", "." ]
[ 16, 36, 15, 15, 32, 30, 22, 37, 10, 9, 17, 4, 10, 17, 37, 31, 9, 6, 24, 14, 9, 6, 17, 2 ]
[ 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,075
[ "Internet", "Explorer", "Use", "After", "Free", "Vulnerability", "Set", "Internet", "and", "Local", "intranet", "security", "zone", "settings", "to", null, "High", null, "to", "block", "ActiveX", "Controls", "and", "Active", "Scripting", "in", "these", "zones", ...
[ 15, 15, 15, 9, 15, 15, 15, 15, 4, 15, 14, 14, 14, 17, 26, 27, 15, 15, 26, 27, 15, 15, 4, 15, 15, 9, 6, 17, 15, 15, 15, 26, 27, 9, 29, 10, 15, 4, 26, 27, 10, 15, 9, 6, 15, 4, 15, 14, 14, 14 ]
[ 0, 9, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13 ]