sentence_idx
int64
0
5.08k
word
sequence
pos
sequence
tag
sequence
0
[ "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "affected", "components", "handle", "shared", "content", "that", "contains", "specially", "crafted", "TrueType", "fonts", "." ]
[ 6, 10, 14, 14, 14, 32, 9, 6, 14, 33, 28, 17, 27, 30, 14, 33, 32, 22, 30, 15, 17, 2 ]
[ 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1
[ "The", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "shared", "content", "that", "contains", "specially", "crafted", "TrueType", "fonts", "." ]
[ 6, 14, 13, 27, 10, 14, 14, 9, 6, 10, 17, 30, 14, 33, 32, 22, 30, 15, 17, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5
[ "This", "security", "update", "resolves", "one", "publicly", "disclosed", "vulnerability", "and", "three", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Lync", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 14, 4, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13 ]
6
[ "The", "most", "severe", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "shared", "content", "that", "contains", "specially", "crafted", "TrueType", "fonts", "." ]
[ 6, 24, 10, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 30, 14, 33, 32, 22, 30, 15, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
7
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
8
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "could", "take", "complete", "control", "of", "the", "affected", "system", "." ]
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
9
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
10
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
11
[ "An", "attacker", "could", "share", "content", "that", "contains", "specially", "crafted", "TrueType", "fonts", "." ]
[ 6, 14, 13, 14, 27, 9, 32, 22, 30, 15, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
12
[ "The", "vulnerability", "could", "be", "exploited", "when", "a", "user", "views", "the", "shared", "content", "that", "contains", "specially", "crafted", "TrueType", "fonts", "." ]
[ 6, 14, 13, 27, 30, 36, 6, 14, 32, 6, 30, 14, 33, 32, 22, 30, 15, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
13
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
14
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
15
[ "Workstations", "and", "terminal", "servers", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
16
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
17
[ "However", null, "best", "practices", "strongly", "discourage", "allowing", "this", "." ]
[ 22, 37, 12, 17, 22, 27, 29, 6, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
18
[ "TrueType", "Font", "Parsing", "Vulnerability", "This", "security", "update", "resolves", "one", "publicly", "disclosed", "vulnerability", "and", "three", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Lync", "." ]
[ 15, 15, 15, 15, 6, 14, 14, 32, 5, 22, 30, 14, 4, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13 ]
19
[ "The", "most", "severe", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "shared", "content", "that", "contains", "specially", "crafted", "TrueType", "fonts", "." ]
[ 6, 24, 10, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 30, 14, 33, 32, 22, 30, 15, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
20
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
21
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "could", "take", "complete", "control", "of", "the", "affected", "system", "." ]
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
22
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
23
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
24
[ "An", "attacker", "could", "share", "content", "that", "contains", "specially", "crafted", "TrueType", "fonts", "." ]
[ 6, 14, 13, 14, 27, 9, 32, 22, 30, 15, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
25
[ "The", "vulnerability", "could", "be", "exploited", "when", "a", "user", "views", "the", "shared", "content", "that", "contains", "specially", "crafted", "TrueType", "fonts", "." ]
[ 6, 14, 13, 27, 30, 36, 6, 14, 32, 6, 30, 14, 33, 32, 22, 30, 15, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
26
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
27
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
28
[ "Workstations", "are", "primarily", "at", "risk", "for", "this", "vulnerability", "." ]
[ 17, 31, 22, 9, 14, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
29
[ "TrueType", "Font", "Parsing", "Vulnerability", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "Windows", "handles", "file", "and", "directory", "names", "." ]
[ 15, 15, 15, 15, 15, 10, 14, 14, 14, 32, 9, 6, 14, 15, 32, 14, 4, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13 ]
30
[ "This", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "opens", "a", "file", "or", "directory", "with", "a", "specially", "crafted", "name", "." ]
[ 6, 14, 13, 27, 10, 14, 14, 9, 6, 14, 32, 6, 14, 4, 14, 9, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
31
[ "If", "a", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 9, 6, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
32
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
33
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
34
[ "This", "security", "update", "resolves", "one", "privately", "reported", "vulnerability", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
35
[ "The", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "opens", "a", "file", "or", "directory", "with", "a", "specially", "crafted", "name", "." ]
[ 6, 14, 13, 27, 10, 14, 14, 9, 6, 14, 32, 6, 14, 4, 14, 9, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
36
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
37
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
38
[ "If", "a", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 9, 6, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
39
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
40
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
41
[ "In", "an", "email", "attack", "scenario", null, "an", "attacker", "could", "exploit", "the", "vulnerability", "by", "sending", "a", "user", "an", "email", "message", "containing", "a", "file", "with", "a", "specially", "crafted", "name", "and", "convincing", "the", "user", "to", "open", "the", "file", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 14, 9, 29, 6, 14, 6, 10, 14, 29, 6, 14, 9, 6, 22, 30, 14, 4, 29, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
42
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "would", "have", "to", "host", "a", "website", "that", "contains", "a", "file", "with", "a", "specially", "crafted", "name", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 26, 27, 6, 14, 33, 32, 6, 14, 9, 6, 22, 30, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
43
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "could", "contain", "specially", "crafted", "content", "that", "could", "be", "used", "to", "exploit", "this", "vulnerability", "." ]
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 13, 27, 22, 30, 14, 33, 13, 27, 30, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
44
[ "An", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "a", "website", "hosting", "the", "file", "." ]
[ 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 10, 29, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
45
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "Instant", "Messenger", "message", "that", "directs", "them", "to", "the", "attacker's", "website", "." ]
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 15, 15, 14, 33, 32, 20, 26, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
46
[ "The", "vulnerability", "cannot", "be", "exploited", "automatically", "through", "email", "." ]
[ 6, 14, 14, 27, 30, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
47
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "email", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
48
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
49
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
50
[ "Workstations", "where", "users", "may", "open", "attachments", "from", "untrusted", "network", "locations", "." ]
[ 17, 36, 17, 13, 27, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
51
[ "Servers", "could", "also", "be", "at", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 22, 27, 9, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
52
[ "However", null, "best", "practices", "discourage", "allowing", "this", "." ]
[ 22, 37, 12, 17, 14, 29, 6, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13 ]
53
[ "Command", "Injection", "Vulnerability", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "Microsoft", "Word", "handles", "specially", "crafted", "Word", "files", "." ]
[ 15, 15, 15, 15, 10, 14, 14, 14, 32, 9, 6, 14, 9, 15, 15, 32, 22, 30, 15, 17, 2 ]
[ 13, 5, 11, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 13, 13, 0, 5, 13 ]
54
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
55
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
56
[ "This", "security", "update", "resolves", "two", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Office", "." ]
[ 6, 14, 10, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13 ]
57
[ "The", "more", "severe", "vulnerability", "could", "allow", "remote", "code", "execution", "if", "a", "user", "opens", "or", "previews", "a", "specially", "crafted", "RTF", "file", "." ]
[ 6, 23, 10, 14, 13, 27, 10, 14, 14, 9, 6, 14, 32, 4, 32, 6, 22, 30, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
58
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
59
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
60
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13 ]
61
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "could", "take", "complete", "control", "of", "the", "affected", "system", "." ]
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
62
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
63
[ "This", "vulnerability", "requires", "that", "a", "user", "open", "a", "specially", "crafted", "Word", "file", "with", "an", "affected", "version", "of", "Microsoft", "Word", "." ]
[ 6, 14, 32, 9, 6, 14, 25, 6, 22, 30, 15, 14, 9, 6, 10, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
64
[ "In", "an", "email", "attack", "scenario", null, "an", "attacker", "could", "exploit", "the", "vulnerability", "by", "sending", "a", "specially", "crafted", "Word", "file", "to", "the", "user", "and", "by", "convincing", "the", "user", "to", "open", "the", "file", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 14, 9, 29, 6, 22, 30, 15, 14, 26, 6, 14, 4, 9, 29, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
65
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "could", "host", "a", "website", "that", "contains", "a", "specially", "crafted", "Word", "file", "that", "is", "used", "to", "attempt", "to", "exploit", "this", "vulnerability", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 14, 33, 32, 6, 22, 30, 15, 14, 33, 32, 30, 26, 27, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
66
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
67
[ "An", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "a", "specially", "crafted", "website", "." ]
[ 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 22, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
68
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "that", "takes", "them", "to", "the", "attacker's", "site", null, "and", "then", "convince", "them", "to", "open", "the", "specially", "crafted", "Word", "file", "." ]
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 33, 32, 20, 26, 6, 14, 14, 37, 4, 22, 27, 20, 26, 27, 6, 22, 10, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 13, 13 ]
69
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
70
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
71
[ "The", "vulnerability", "cannot", "be", "exploited", "automatically", "through", "email", "." ]
[ 6, 14, 14, 27, 30, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
72
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "email", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
73
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "could", "host", "a", "website", "that", "contains", "a", "webpage", "that", "is", "used", "to", "exploit", "this", "vulnerability", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 14, 33, 32, 6, 14, 33, 32, 30, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
74
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
75
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "these", "websites", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
76
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "Instant", "Messenger", "message", "that", "takes", "users", "to", "the", "attacker’s", "website", null, "and", "then", "convince", "them", "to", "open", "the", "specially", "crafted", "Office", "file", "." ]
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 22, 27, 20, 26, 27, 6, 22, 10, 15, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
77
[ "Workstations", "and", "terminal", "servers", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
78
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
79
[ "However", null, "best", "practices", "strongly", "discourage", "allowing", "this", "." ]
[ 22, 37, 12, 17, 22, 27, 29, 6, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
80
[ "Word", "PAPX", "Section", "Corruption", "Vulnerability", "Use", "Microsoft", "Office", "File", "Block", "policy", "to", "block", "the", "opening", "of", "Office", "2003", "and", "earlier", "documents", "from", "unknown", "or", "untrusted", "sources", "and", "locations", "Use", "the", "Microsoft", "Office", "Isolated", "Conversion", "Environment", "(", "MOICE", ")", "when", "opening", "files", "from", "unknown", "or", "untrusted", "sources", "Do", "not", "open", "Office", "files", "that", "you", "receive", "from", "untrusted", "sources", "or", "that", "you", "receive", "unexpectedly", "from", "trusted", "sources", "An", "elevation", "of", "privilege", "vulnerability", "exists", "in", "the", "way", "that", "the", "Windows", "User", "Mode", "Scheduler", "handles", "system", "requests", "." ]
[ 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 14, 26, 27, 6, 14, 9, 15, 5, 4, 11, 17, 9, 10, 4, 10, 17, 4, 17, 31, 6, 15, 15, 15, 15, 15, 0, 15, 1, 36, 29, 17, 9, 10, 4, 10, 17, 31, 22, 27, 15, 17, 9, 20, 31, 9, 10, 17, 4, 9, 20, 31, 22, 9, 30, 17, 6, 14, 9, 14, 14, 32, 9, 6, 14, 9, 6, 15, 15, 15, 15, 32, 14, 17, 2 ]
[ 0, 13, 13, 13, 13, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 8, 12, 12, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 5, 13 ]
81
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "kernel", "mode", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 5, 13, 13 ]
82
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "administrative", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
83
[ "This", "security", "update", "resolves", "one", "privately", "reported", "vulnerability", "and", "one", "publicly", "disclosed", "vulnerability", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 14, 4, 5, 22, 30, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
84
[ "The", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "logs", "on", "to", "an", "affected", "system", "and", "runs", "a", "specially", "crafted", "application", "that", "exploits", "the", "vulnerability", "." ]
[ 6, 17, 13, 27, 14, 9, 14, 9, 6, 14, 17, 9, 26, 6, 10, 14, 4, 32, 6, 22, 30, 14, 33, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13 ]
85
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
86
[ "The", "vulnerability", "could", "not", "be", "exploited", "remotely", "or", "by", "anonymous", "users", "." ]
[ 6, 14, 13, 22, 27, 30, 22, 4, 9, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
87
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "kernel", "mode", "and", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 14, 14, 4, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
88
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "administrative", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
89
[ "To", "exploit", "this", "vulnerability", null, "an", "attacker", "would", "first", "have", "to", "log", "on", "to", "the", "system", "." ]
[ 26, 27, 6, 14, 37, 6, 14, 13, 22, 27, 26, 27, 9, 26, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
90
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "that", "could", "exploit", "the", "vulnerability", "and", "take", "complete", "control", "over", "the", "affected", "system", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 33, 13, 27, 6, 14, 4, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
91
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
92
[ "The", "vulnerability", "could", "not", "be", "exploited", "remotely", "or", "by", "anonymous", "users", "." ]
[ 6, 14, 13, 22, 27, 30, 22, 4, 9, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
93
[ "This", "vulnerability", "only", "affects", "Intel", "x64-based", "versions", "of", "Windows", "7", "and", "Windows", "Server", "2008", "R2", "." ]
[ 6, 14, 22, 32, 15, 10, 17, 9, 15, 5, 4, 15, 15, 5, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 3, 10, 13, 3, 10, 10, 8, 13 ]
94
[ "Systems", "with", "AMD", "or", "ARM-based", "CPUs", "are", "not", "affected", "by", "this", "vulnerability", "." ]
[ 16, 9, 15, 4, 10, 15, 31, 22, 30, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
95
[ "Workstations", "and", "terminal", "servers", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
96
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
97
[ "However", null, "best", "practices", "strongly", "discourage", "allowing", "this", "." ]
[ 22, 37, 12, 17, 22, 27, 29, 6, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
98
[ "User", "Mode", "Scheduler", "Memory", "Corruption", "Vulnerability", "An", "elevation", "of", "privilege", "vulnerability", "exists", "in", "the", "way", "that", "Windows", "handles", "BIOS", "memory", "." ]
[ 15, 15, 15, 15, 15, 15, 6, 14, 9, 14, 14, 32, 9, 6, 14, 33, 32, 32, 15, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 13, 13, 5, 13 ]
99
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "kernel", "mode", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 5, 13, 13 ]
README.md exists but content is empty.
Downloads last month
28