sentence_idx
int64 0
5.08k
| word
sequence | pos
sequence | tag
sequence |
---|---|---|---|
0 | [
"A",
"remote",
"code",
"execution",
"vulnerability",
"exists",
"in",
"the",
"way",
"that",
"affected",
"components",
"handle",
"shared",
"content",
"that",
"contains",
"specially",
"crafted",
"TrueType",
"fonts",
"."
] | [
6,
10,
14,
14,
14,
32,
9,
6,
14,
33,
28,
17,
27,
30,
14,
33,
32,
22,
30,
15,
17,
2
] | [
13,
5,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
1 | [
"The",
"vulnerability",
"could",
"allow",
"remote",
"code",
"execution",
"if",
"a",
"user",
"views",
"shared",
"content",
"that",
"contains",
"specially",
"crafted",
"TrueType",
"fonts",
"."
] | [
6,
14,
13,
27,
10,
14,
14,
9,
6,
10,
17,
30,
14,
33,
32,
22,
30,
15,
17,
2
] | [
13,
13,
13,
13,
5,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
2 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"take",
"complete",
"control",
"of",
"an",
"affected",
"system",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
3 | [
"An",
"attacker",
"could",
"then",
"install",
"programs",
";",
"view",
null,
"change",
null,
"or",
"delete",
"data",
";",
"or",
"create",
"new",
"accounts",
"with",
"full",
"user",
"rights",
"."
] | [
6,
14,
13,
22,
27,
17,
3,
14,
37,
14,
37,
4,
10,
17,
3,
4,
27,
10,
17,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
4 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
5 | [
"This",
"security",
"update",
"resolves",
"one",
"publicly",
"disclosed",
"vulnerability",
"and",
"three",
"privately",
"reported",
"vulnerabilities",
"in",
"Microsoft",
"Lync",
"."
] | [
6,
14,
14,
32,
5,
22,
30,
14,
4,
5,
22,
30,
17,
9,
15,
15,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
7,
13,
13
] |
6 | [
"The",
"most",
"severe",
"vulnerabilities",
"could",
"allow",
"remote",
"code",
"execution",
"if",
"a",
"user",
"views",
"shared",
"content",
"that",
"contains",
"specially",
"crafted",
"TrueType",
"fonts",
"."
] | [
6,
24,
10,
17,
13,
27,
10,
14,
14,
9,
6,
10,
17,
30,
14,
33,
32,
22,
30,
15,
17,
2
] | [
13,
13,
13,
13,
13,
13,
5,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
7 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"gain",
"the",
"same",
"user",
"rights",
"as",
"the",
"current",
"user",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
6,
10,
14,
17,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
8 | [
"If",
"the",
"current",
"user",
"is",
"logged",
"on",
"with",
"administrative",
"user",
"rights",
null,
"an",
"attacker",
"could",
"take",
"complete",
"control",
"of",
"the",
"affected",
"system",
"."
] | [
9,
6,
10,
14,
32,
30,
9,
9,
10,
14,
17,
37,
6,
14,
13,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
9 | [
"An",
"attacker",
"could",
"then",
"install",
"programs",
";",
"view",
null,
"change",
null,
"or",
"delete",
"data",
";",
"or",
"create",
"new",
"accounts",
"with",
"full",
"user",
"rights",
"."
] | [
6,
14,
13,
22,
27,
17,
3,
14,
37,
14,
37,
4,
10,
17,
3,
4,
27,
10,
17,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
10 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
11 | [
"An",
"attacker",
"could",
"share",
"content",
"that",
"contains",
"specially",
"crafted",
"TrueType",
"fonts",
"."
] | [
6,
14,
13,
14,
27,
9,
32,
22,
30,
15,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
12 | [
"The",
"vulnerability",
"could",
"be",
"exploited",
"when",
"a",
"user",
"views",
"the",
"shared",
"content",
"that",
"contains",
"specially",
"crafted",
"TrueType",
"fonts",
"."
] | [
6,
14,
13,
27,
30,
36,
6,
14,
32,
6,
30,
14,
33,
32,
22,
30,
15,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
13 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"gain",
"the",
"same",
"user",
"rights",
"as",
"the",
"current",
"user",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
6,
10,
14,
17,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
14 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
15 | [
"Workstations",
"and",
"terminal",
"servers",
"are",
"primarily",
"at",
"risk",
"."
] | [
17,
4,
10,
17,
31,
22,
9,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
16 | [
"Servers",
"could",
"be",
"at",
"more",
"risk",
"if",
"administrators",
"allow",
"users",
"to",
"log",
"on",
"to",
"servers",
"and",
"to",
"run",
"programs",
"."
] | [
17,
13,
27,
9,
11,
14,
9,
17,
31,
17,
26,
27,
9,
26,
17,
4,
26,
27,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
17 | [
"However",
null,
"best",
"practices",
"strongly",
"discourage",
"allowing",
"this",
"."
] | [
22,
37,
12,
17,
22,
27,
29,
6,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
18 | [
"TrueType",
"Font",
"Parsing",
"Vulnerability",
"This",
"security",
"update",
"resolves",
"one",
"publicly",
"disclosed",
"vulnerability",
"and",
"three",
"privately",
"reported",
"vulnerabilities",
"in",
"Microsoft",
"Lync",
"."
] | [
15,
15,
15,
15,
6,
14,
14,
32,
5,
22,
30,
14,
4,
5,
22,
30,
17,
9,
15,
15,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
7,
13,
13
] |
19 | [
"The",
"most",
"severe",
"vulnerabilities",
"could",
"allow",
"remote",
"code",
"execution",
"if",
"a",
"user",
"views",
"shared",
"content",
"that",
"contains",
"specially",
"crafted",
"TrueType",
"fonts",
"."
] | [
6,
24,
10,
17,
13,
27,
10,
14,
14,
9,
6,
10,
17,
30,
14,
33,
32,
22,
30,
15,
17,
2
] | [
13,
13,
13,
13,
13,
13,
5,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
20 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"gain",
"the",
"same",
"user",
"rights",
"as",
"the",
"current",
"user",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
6,
10,
14,
17,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
21 | [
"If",
"the",
"current",
"user",
"is",
"logged",
"on",
"with",
"administrative",
"user",
"rights",
null,
"an",
"attacker",
"could",
"take",
"complete",
"control",
"of",
"the",
"affected",
"system",
"."
] | [
9,
6,
10,
14,
32,
30,
9,
9,
10,
14,
17,
37,
6,
14,
13,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
22 | [
"An",
"attacker",
"could",
"then",
"install",
"programs",
";",
"view",
null,
"change",
null,
"or",
"delete",
"data",
";",
"or",
"create",
"new",
"accounts",
"with",
"full",
"user",
"rights",
"."
] | [
6,
14,
13,
22,
27,
17,
3,
14,
37,
14,
37,
4,
10,
17,
3,
4,
27,
10,
17,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
23 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
24 | [
"An",
"attacker",
"could",
"share",
"content",
"that",
"contains",
"specially",
"crafted",
"TrueType",
"fonts",
"."
] | [
6,
14,
13,
14,
27,
9,
32,
22,
30,
15,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
25 | [
"The",
"vulnerability",
"could",
"be",
"exploited",
"when",
"a",
"user",
"views",
"the",
"shared",
"content",
"that",
"contains",
"specially",
"crafted",
"TrueType",
"fonts",
"."
] | [
6,
14,
13,
27,
30,
36,
6,
14,
32,
6,
30,
14,
33,
32,
22,
30,
15,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
26 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"gain",
"the",
"same",
"user",
"rights",
"as",
"the",
"current",
"user",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
6,
10,
14,
17,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
27 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
28 | [
"Workstations",
"are",
"primarily",
"at",
"risk",
"for",
"this",
"vulnerability",
"."
] | [
17,
31,
22,
9,
14,
9,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
29 | [
"TrueType",
"Font",
"Parsing",
"Vulnerability",
"A",
"remote",
"code",
"execution",
"vulnerability",
"exists",
"in",
"the",
"way",
"Windows",
"handles",
"file",
"and",
"directory",
"names",
"."
] | [
15,
15,
15,
15,
15,
10,
14,
14,
14,
32,
9,
6,
14,
15,
32,
14,
4,
14,
17,
2
] | [
13,
13,
13,
13,
13,
5,
5,
13,
13,
13,
13,
13,
13,
3,
13,
13,
13,
13,
13,
13
] |
30 | [
"This",
"vulnerability",
"could",
"allow",
"remote",
"code",
"execution",
"if",
"a",
"user",
"opens",
"a",
"file",
"or",
"directory",
"with",
"a",
"specially",
"crafted",
"name",
"."
] | [
6,
14,
13,
27,
10,
14,
14,
9,
6,
14,
32,
6,
14,
4,
14,
9,
6,
22,
30,
14,
2
] | [
13,
13,
13,
13,
5,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
31 | [
"If",
"a",
"user",
"is",
"logged",
"on",
"with",
"administrative",
"user",
"rights",
null,
"an",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"take",
"complete",
"control",
"of",
"an",
"affected",
"system",
"."
] | [
9,
6,
14,
32,
30,
9,
9,
10,
14,
17,
37,
6,
14,
34,
22,
28,
6,
14,
13,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
32 | [
"An",
"attacker",
"could",
"then",
"install",
"programs",
";",
"view",
null,
"change",
null,
"or",
"delete",
"data",
";",
"or",
"create",
"new",
"accounts",
"with",
"full",
"user",
"rights",
"."
] | [
6,
14,
13,
22,
27,
17,
3,
14,
37,
14,
37,
4,
10,
17,
3,
4,
27,
10,
17,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
33 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
34 | [
"This",
"security",
"update",
"resolves",
"one",
"privately",
"reported",
"vulnerability",
"in",
"Microsoft",
"Windows",
"."
] | [
6,
14,
14,
32,
5,
22,
30,
14,
9,
15,
15,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
7,
3,
13
] |
35 | [
"The",
"vulnerability",
"could",
"allow",
"remote",
"code",
"execution",
"if",
"a",
"user",
"opens",
"a",
"file",
"or",
"directory",
"with",
"a",
"specially",
"crafted",
"name",
"."
] | [
6,
14,
13,
27,
10,
14,
14,
9,
6,
14,
32,
6,
14,
4,
14,
9,
6,
22,
30,
14,
2
] | [
13,
13,
13,
13,
5,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
36 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"gain",
"the",
"same",
"user",
"rights",
"as",
"the",
"current",
"user",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
6,
10,
14,
17,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
37 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
38 | [
"If",
"a",
"user",
"is",
"logged",
"on",
"with",
"administrative",
"user",
"rights",
null,
"an",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"take",
"complete",
"control",
"of",
"an",
"affected",
"system",
"."
] | [
9,
6,
14,
32,
30,
9,
9,
10,
14,
17,
37,
6,
14,
34,
22,
28,
6,
14,
13,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
39 | [
"An",
"attacker",
"could",
"then",
"install",
"programs",
";",
"view",
null,
"change",
null,
"or",
"delete",
"data",
";",
"or",
"create",
"new",
"accounts",
"with",
"full",
"user",
"rights",
"."
] | [
6,
14,
13,
22,
27,
17,
3,
14,
37,
14,
37,
4,
10,
17,
3,
4,
27,
10,
17,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
40 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
41 | [
"In",
"an",
"email",
"attack",
"scenario",
null,
"an",
"attacker",
"could",
"exploit",
"the",
"vulnerability",
"by",
"sending",
"a",
"user",
"an",
"email",
"message",
"containing",
"a",
"file",
"with",
"a",
"specially",
"crafted",
"name",
"and",
"convincing",
"the",
"user",
"to",
"open",
"the",
"file",
"."
] | [
9,
6,
10,
14,
14,
37,
6,
14,
13,
27,
6,
14,
9,
29,
6,
14,
6,
10,
14,
29,
6,
14,
9,
6,
22,
30,
14,
4,
29,
6,
14,
26,
27,
6,
14,
2
] | [
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
42 | [
"In",
"a",
"web-based",
"attack",
"scenario",
null,
"an",
"attacker",
"would",
"have",
"to",
"host",
"a",
"website",
"that",
"contains",
"a",
"file",
"with",
"a",
"specially",
"crafted",
"name",
"."
] | [
9,
6,
10,
14,
14,
37,
6,
14,
13,
27,
26,
27,
6,
14,
33,
32,
6,
14,
9,
6,
22,
30,
14,
2
] | [
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
43 | [
"In",
"addition",
null,
"compromised",
"websites",
"and",
"websites",
"that",
"accept",
"or",
"host",
"user-provided",
"content",
"could",
"contain",
"specially",
"crafted",
"content",
"that",
"could",
"be",
"used",
"to",
"exploit",
"this",
"vulnerability",
"."
] | [
9,
14,
37,
30,
17,
4,
32,
6,
14,
4,
14,
10,
14,
13,
27,
22,
30,
14,
33,
13,
27,
30,
26,
27,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
44 | [
"An",
"attacker",
"would",
"have",
"no",
"way",
"to",
"force",
"users",
"to",
"visit",
"a",
"website",
"hosting",
"the",
"file",
"."
] | [
6,
14,
13,
27,
6,
14,
26,
27,
17,
26,
27,
6,
10,
29,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
45 | [
"Instead",
null,
"an",
"attacker",
"would",
"have",
"to",
"convince",
"users",
"to",
"visit",
"the",
"website",
null,
"typically",
"by",
"getting",
"them",
"to",
"click",
"a",
"link",
"in",
"an",
"email",
"message",
"or",
"Instant",
"Messenger",
"message",
"that",
"directs",
"them",
"to",
"the",
"attacker's",
"website",
"."
] | [
22,
37,
6,
14,
13,
27,
26,
27,
17,
26,
27,
6,
14,
37,
22,
9,
29,
20,
26,
27,
6,
14,
9,
6,
10,
14,
4,
15,
15,
14,
33,
32,
20,
26,
6,
14,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
46 | [
"The",
"vulnerability",
"cannot",
"be",
"exploited",
"automatically",
"through",
"email",
"."
] | [
6,
14,
14,
27,
30,
22,
9,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
47 | [
"For",
"an",
"attack",
"to",
"be",
"successful",
"a",
"user",
"must",
"open",
"an",
"attachment",
"that",
"is",
"sent",
"in",
"an",
"email",
"message",
"."
] | [
9,
6,
14,
26,
27,
10,
6,
14,
13,
27,
6,
14,
33,
32,
30,
9,
6,
10,
14,
2
] | [
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
48 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"gain",
"the",
"same",
"user",
"rights",
"as",
"the",
"current",
"user",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
6,
10,
14,
17,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
49 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
50 | [
"Workstations",
"where",
"users",
"may",
"open",
"attachments",
"from",
"untrusted",
"network",
"locations",
"."
] | [
17,
36,
17,
13,
27,
17,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
51 | [
"Servers",
"could",
"also",
"be",
"at",
"risk",
"if",
"administrators",
"allow",
"users",
"to",
"log",
"on",
"to",
"servers",
"and",
"to",
"run",
"programs",
"."
] | [
17,
13,
22,
27,
9,
14,
9,
17,
31,
17,
26,
27,
9,
26,
17,
4,
26,
27,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
52 | [
"However",
null,
"best",
"practices",
"discourage",
"allowing",
"this",
"."
] | [
22,
37,
12,
17,
14,
29,
6,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13
] |
53 | [
"Command",
"Injection",
"Vulnerability",
"A",
"remote",
"code",
"execution",
"vulnerability",
"exists",
"in",
"the",
"way",
"that",
"Microsoft",
"Word",
"handles",
"specially",
"crafted",
"Word",
"files",
"."
] | [
15,
15,
15,
15,
10,
14,
14,
14,
32,
9,
6,
14,
9,
15,
15,
32,
22,
30,
15,
17,
2
] | [
13,
5,
11,
13,
5,
5,
13,
13,
13,
13,
13,
13,
13,
7,
0,
13,
13,
13,
0,
5,
13
] |
54 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"take",
"complete",
"control",
"of",
"an",
"affected",
"system",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
55 | [
"An",
"attacker",
"could",
"then",
"install",
"programs",
";",
"view",
null,
"change",
null,
"or",
"delete",
"data",
";",
"or",
"create",
"new",
"accounts",
"with",
"full",
"user",
"rights",
"."
] | [
6,
14,
13,
22,
27,
17,
3,
14,
37,
14,
37,
4,
10,
17,
3,
4,
27,
10,
17,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
56 | [
"This",
"security",
"update",
"resolves",
"two",
"privately",
"reported",
"vulnerabilities",
"in",
"Microsoft",
"Office",
"."
] | [
6,
14,
10,
17,
5,
22,
30,
17,
9,
15,
15,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
7,
13,
13
] |
57 | [
"The",
"more",
"severe",
"vulnerability",
"could",
"allow",
"remote",
"code",
"execution",
"if",
"a",
"user",
"opens",
"or",
"previews",
"a",
"specially",
"crafted",
"RTF",
"file",
"."
] | [
6,
23,
10,
14,
13,
27,
10,
14,
14,
9,
6,
14,
32,
4,
32,
6,
22,
30,
15,
14,
2
] | [
13,
13,
13,
13,
13,
13,
5,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
58 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"gain",
"the",
"same",
"user",
"rights",
"as",
"the",
"current",
"user",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
6,
10,
14,
17,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
59 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
60 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"run",
"arbitrary",
"code",
"as",
"the",
"current",
"user",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
5,
11,
13,
13,
13,
13,
13
] |
61 | [
"If",
"the",
"current",
"user",
"is",
"logged",
"on",
"with",
"administrative",
"user",
"rights",
null,
"an",
"attacker",
"could",
"take",
"complete",
"control",
"of",
"the",
"affected",
"system",
"."
] | [
9,
6,
10,
14,
32,
30,
9,
9,
10,
14,
17,
37,
6,
14,
13,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
62 | [
"An",
"attacker",
"could",
"then",
"install",
"programs",
";",
"view",
null,
"change",
null,
"or",
"delete",
"data",
";",
"or",
"create",
"new",
"accounts",
"with",
"full",
"user",
"rights",
"."
] | [
6,
14,
13,
22,
27,
17,
3,
14,
37,
14,
37,
4,
10,
17,
3,
4,
27,
10,
17,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
63 | [
"This",
"vulnerability",
"requires",
"that",
"a",
"user",
"open",
"a",
"specially",
"crafted",
"Word",
"file",
"with",
"an",
"affected",
"version",
"of",
"Microsoft",
"Word",
"."
] | [
6,
14,
32,
9,
6,
14,
25,
6,
22,
30,
15,
14,
9,
6,
10,
14,
9,
15,
15,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
0,
13,
13,
13,
13,
13,
13,
7,
0,
13
] |
64 | [
"In",
"an",
"email",
"attack",
"scenario",
null,
"an",
"attacker",
"could",
"exploit",
"the",
"vulnerability",
"by",
"sending",
"a",
"specially",
"crafted",
"Word",
"file",
"to",
"the",
"user",
"and",
"by",
"convincing",
"the",
"user",
"to",
"open",
"the",
"file",
"."
] | [
9,
6,
10,
14,
14,
37,
6,
14,
13,
27,
6,
14,
9,
29,
6,
22,
30,
15,
14,
26,
6,
14,
4,
9,
29,
6,
14,
26,
27,
6,
14,
2
] | [
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
0,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
65 | [
"In",
"a",
"web-based",
"attack",
"scenario",
null,
"an",
"attacker",
"could",
"host",
"a",
"website",
"that",
"contains",
"a",
"specially",
"crafted",
"Word",
"file",
"that",
"is",
"used",
"to",
"attempt",
"to",
"exploit",
"this",
"vulnerability",
"."
] | [
9,
6,
10,
14,
14,
37,
6,
14,
13,
27,
6,
14,
33,
32,
6,
22,
30,
15,
14,
33,
32,
30,
26,
27,
26,
27,
6,
14,
2
] | [
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
0,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
66 | [
"In",
"addition",
null,
"compromised",
"websites",
"and",
"websites",
"that",
"accept",
"or",
"host",
"user-provided",
"content",
"could",
"contain",
"specially",
"crafted",
"content",
"that",
"could",
"exploit",
"this",
"vulnerability",
"."
] | [
9,
14,
37,
30,
17,
4,
32,
6,
14,
4,
14,
10,
14,
13,
27,
22,
30,
14,
33,
13,
27,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
67 | [
"An",
"attacker",
"would",
"have",
"no",
"way",
"to",
"force",
"users",
"to",
"visit",
"a",
"specially",
"crafted",
"website",
"."
] | [
6,
14,
13,
27,
6,
14,
26,
27,
17,
26,
27,
6,
22,
30,
22,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
68 | [
"Instead",
null,
"an",
"attacker",
"would",
"have",
"to",
"convince",
"users",
"to",
"visit",
"the",
"website",
null,
"typically",
"by",
"getting",
"them",
"to",
"click",
"a",
"link",
"that",
"takes",
"them",
"to",
"the",
"attacker's",
"site",
null,
"and",
"then",
"convince",
"them",
"to",
"open",
"the",
"specially",
"crafted",
"Word",
"file",
"."
] | [
22,
37,
6,
14,
13,
27,
26,
27,
17,
26,
27,
6,
14,
37,
22,
9,
29,
20,
26,
27,
6,
14,
33,
32,
20,
26,
6,
14,
14,
37,
4,
22,
27,
20,
26,
27,
6,
22,
10,
15,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
0,
13,
13
] |
69 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"gain",
"the",
"same",
"user",
"rights",
"as",
"the",
"current",
"user",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
6,
10,
14,
17,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
70 | [
"Users",
"whose",
"accounts",
"are",
"configured",
"to",
"have",
"fewer",
"user",
"rights",
"on",
"the",
"system",
"could",
"be",
"less",
"impacted",
"than",
"users",
"who",
"operate",
"with",
"administrative",
"user",
"rights",
"."
] | [
17,
35,
17,
31,
30,
26,
27,
11,
14,
17,
9,
6,
14,
13,
27,
23,
10,
9,
17,
34,
31,
9,
10,
14,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
71 | [
"The",
"vulnerability",
"cannot",
"be",
"exploited",
"automatically",
"through",
"email",
"."
] | [
6,
14,
14,
27,
30,
22,
9,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
72 | [
"For",
"an",
"attack",
"to",
"be",
"successful",
"a",
"user",
"must",
"open",
"an",
"attachment",
"that",
"is",
"sent",
"in",
"an",
"email",
"message",
"."
] | [
9,
6,
14,
26,
27,
10,
6,
14,
13,
27,
6,
14,
33,
32,
30,
9,
6,
10,
14,
2
] | [
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
73 | [
"In",
"a",
"web-based",
"attack",
"scenario",
null,
"an",
"attacker",
"could",
"host",
"a",
"website",
"that",
"contains",
"a",
"webpage",
"that",
"is",
"used",
"to",
"exploit",
"this",
"vulnerability",
"."
] | [
9,
6,
10,
14,
14,
37,
6,
14,
13,
27,
6,
14,
33,
32,
6,
14,
33,
32,
30,
26,
27,
6,
14,
2
] | [
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
74 | [
"In",
"addition",
null,
"compromised",
"websites",
"and",
"websites",
"that",
"accept",
"or",
"host",
"user-provided",
"content",
"or",
"advertisements",
"could",
"contain",
"specially",
"crafted",
"content",
"that",
"could",
"exploit",
"this",
"vulnerability",
"."
] | [
9,
14,
37,
30,
17,
4,
32,
6,
14,
4,
14,
10,
14,
4,
17,
13,
27,
22,
30,
14,
33,
13,
27,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
75 | [
"In",
"all",
"cases",
null,
"however",
null,
"an",
"attacker",
"would",
"have",
"no",
"way",
"to",
"force",
"users",
"to",
"visit",
"these",
"websites",
"."
] | [
9,
6,
17,
37,
22,
37,
6,
14,
13,
27,
6,
14,
26,
27,
17,
26,
27,
6,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
76 | [
"Instead",
null,
"an",
"attacker",
"would",
"have",
"to",
"convince",
"users",
"to",
"visit",
"the",
"website",
null,
"typically",
"by",
"getting",
"them",
"to",
"click",
"a",
"link",
"in",
"an",
"email",
"message",
"or",
"Instant",
"Messenger",
"message",
"that",
"takes",
"users",
"to",
"the",
"attacker’s",
"website",
null,
"and",
"then",
"convince",
"them",
"to",
"open",
"the",
"specially",
"crafted",
"Office",
"file",
"."
] | [
22,
37,
6,
14,
13,
27,
26,
27,
17,
26,
27,
6,
14,
37,
22,
9,
29,
20,
26,
27,
6,
14,
9,
6,
10,
14,
4,
15,
15,
14,
33,
32,
17,
26,
6,
14,
14,
37,
4,
22,
27,
20,
26,
27,
6,
22,
10,
15,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
77 | [
"Workstations",
"and",
"terminal",
"servers",
"are",
"primarily",
"at",
"risk",
"."
] | [
17,
4,
10,
17,
31,
22,
9,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
78 | [
"Servers",
"could",
"be",
"at",
"more",
"risk",
"if",
"administrators",
"allow",
"users",
"to",
"log",
"on",
"to",
"servers",
"and",
"to",
"run",
"programs",
"."
] | [
17,
13,
27,
9,
11,
14,
9,
17,
31,
17,
26,
27,
9,
26,
17,
4,
26,
27,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
79 | [
"However",
null,
"best",
"practices",
"strongly",
"discourage",
"allowing",
"this",
"."
] | [
22,
37,
12,
17,
22,
27,
29,
6,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
80 | [
"Word",
"PAPX",
"Section",
"Corruption",
"Vulnerability",
"Use",
"Microsoft",
"Office",
"File",
"Block",
"policy",
"to",
"block",
"the",
"opening",
"of",
"Office",
"2003",
"and",
"earlier",
"documents",
"from",
"unknown",
"or",
"untrusted",
"sources",
"and",
"locations",
"Use",
"the",
"Microsoft",
"Office",
"Isolated",
"Conversion",
"Environment",
"(",
"MOICE",
")",
"when",
"opening",
"files",
"from",
"unknown",
"or",
"untrusted",
"sources",
"Do",
"not",
"open",
"Office",
"files",
"that",
"you",
"receive",
"from",
"untrusted",
"sources",
"or",
"that",
"you",
"receive",
"unexpectedly",
"from",
"trusted",
"sources",
"An",
"elevation",
"of",
"privilege",
"vulnerability",
"exists",
"in",
"the",
"way",
"that",
"the",
"Windows",
"User",
"Mode",
"Scheduler",
"handles",
"system",
"requests",
"."
] | [
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
14,
26,
27,
6,
14,
9,
15,
5,
4,
11,
17,
9,
10,
4,
10,
17,
4,
17,
31,
6,
15,
15,
15,
15,
15,
0,
15,
1,
36,
29,
17,
9,
10,
4,
10,
17,
31,
22,
27,
15,
17,
9,
20,
31,
9,
10,
17,
4,
9,
20,
31,
22,
9,
30,
17,
6,
14,
9,
14,
14,
32,
9,
6,
14,
9,
6,
15,
15,
15,
15,
32,
14,
17,
2
] | [
0,
13,
13,
13,
13,
13,
7,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
8,
12,
12,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
7,
13,
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
3,
13,
13,
13,
13,
13,
5,
13
] |
81 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"run",
"arbitrary",
"code",
"in",
"kernel",
"mode",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
10,
14,
9,
14,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
5,
11,
13,
5,
13,
13
] |
82 | [
"An",
"attacker",
"could",
"then",
"install",
"programs",
";",
"view",
null,
"change",
null,
"or",
"delete",
"data",
";",
"or",
"create",
"new",
"accounts",
"with",
"full",
"administrative",
"rights",
"."
] | [
6,
14,
13,
22,
27,
17,
3,
14,
37,
14,
37,
4,
10,
17,
3,
4,
27,
10,
17,
9,
10,
10,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
83 | [
"This",
"security",
"update",
"resolves",
"one",
"privately",
"reported",
"vulnerability",
"and",
"one",
"publicly",
"disclosed",
"vulnerability",
"in",
"Microsoft",
"Windows",
"."
] | [
6,
14,
14,
32,
5,
22,
30,
14,
4,
5,
22,
30,
14,
9,
15,
15,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
7,
3,
13
] |
84 | [
"The",
"vulnerabilities",
"could",
"allow",
"elevation",
"of",
"privilege",
"if",
"an",
"attacker",
"logs",
"on",
"to",
"an",
"affected",
"system",
"and",
"runs",
"a",
"specially",
"crafted",
"application",
"that",
"exploits",
"the",
"vulnerability",
"."
] | [
6,
17,
13,
27,
14,
9,
14,
9,
6,
14,
17,
9,
26,
6,
10,
14,
4,
32,
6,
22,
30,
14,
33,
32,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13
] |
85 | [
"An",
"attacker",
"must",
"have",
"valid",
"logon",
"credentials",
"and",
"be",
"able",
"to",
"log",
"on",
"locally",
"to",
"exploit",
"this",
"vulnerability",
"."
] | [
6,
14,
13,
27,
10,
14,
17,
4,
27,
10,
26,
27,
9,
22,
26,
27,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
86 | [
"The",
"vulnerability",
"could",
"not",
"be",
"exploited",
"remotely",
"or",
"by",
"anonymous",
"users",
"."
] | [
6,
14,
13,
22,
27,
30,
22,
4,
9,
10,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
87 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"run",
"arbitrary",
"code",
"in",
"kernel",
"mode",
"and",
"take",
"complete",
"control",
"of",
"an",
"affected",
"system",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
10,
14,
9,
14,
14,
4,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
5,
11,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
88 | [
"An",
"attacker",
"could",
"then",
"install",
"programs",
";",
"view",
null,
"change",
null,
"or",
"delete",
"data",
";",
"or",
"create",
"new",
"accounts",
"with",
"full",
"administrative",
"rights",
"."
] | [
6,
14,
13,
22,
27,
17,
3,
14,
37,
14,
37,
4,
10,
17,
3,
4,
27,
10,
17,
9,
10,
10,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
89 | [
"To",
"exploit",
"this",
"vulnerability",
null,
"an",
"attacker",
"would",
"first",
"have",
"to",
"log",
"on",
"to",
"the",
"system",
"."
] | [
26,
27,
6,
14,
37,
6,
14,
13,
22,
27,
26,
27,
9,
26,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
90 | [
"An",
"attacker",
"could",
"then",
"run",
"a",
"specially",
"crafted",
"application",
"that",
"could",
"exploit",
"the",
"vulnerability",
"and",
"take",
"complete",
"control",
"over",
"the",
"affected",
"system",
"."
] | [
6,
14,
13,
22,
27,
6,
22,
30,
14,
33,
13,
27,
6,
14,
4,
27,
10,
14,
9,
6,
10,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
91 | [
"An",
"attacker",
"must",
"have",
"valid",
"logon",
"credentials",
"and",
"be",
"able",
"to",
"log",
"on",
"locally",
"to",
"exploit",
"this",
"vulnerability",
"."
] | [
6,
14,
13,
27,
10,
14,
17,
4,
27,
10,
26,
27,
9,
22,
26,
27,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
92 | [
"The",
"vulnerability",
"could",
"not",
"be",
"exploited",
"remotely",
"or",
"by",
"anonymous",
"users",
"."
] | [
6,
14,
13,
22,
27,
30,
22,
4,
9,
10,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
93 | [
"This",
"vulnerability",
"only",
"affects",
"Intel",
"x64-based",
"versions",
"of",
"Windows",
"7",
"and",
"Windows",
"Server",
"2008",
"R2",
"."
] | [
6,
14,
22,
32,
15,
10,
17,
9,
15,
5,
4,
15,
15,
5,
15,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
3,
10,
13,
3,
10,
10,
8,
13
] |
94 | [
"Systems",
"with",
"AMD",
"or",
"ARM-based",
"CPUs",
"are",
"not",
"affected",
"by",
"this",
"vulnerability",
"."
] | [
16,
9,
15,
4,
10,
15,
31,
22,
30,
9,
6,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
95 | [
"Workstations",
"and",
"terminal",
"servers",
"are",
"primarily",
"at",
"risk",
"."
] | [
17,
4,
10,
17,
31,
22,
9,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
96 | [
"Servers",
"could",
"be",
"at",
"more",
"risk",
"if",
"administrators",
"allow",
"users",
"to",
"log",
"on",
"to",
"servers",
"and",
"to",
"run",
"programs",
"."
] | [
17,
13,
27,
9,
11,
14,
9,
17,
31,
17,
26,
27,
9,
26,
17,
4,
26,
27,
17,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
97 | [
"However",
null,
"best",
"practices",
"strongly",
"discourage",
"allowing",
"this",
"."
] | [
22,
37,
12,
17,
22,
27,
29,
6,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13
] |
98 | [
"User",
"Mode",
"Scheduler",
"Memory",
"Corruption",
"Vulnerability",
"An",
"elevation",
"of",
"privilege",
"vulnerability",
"exists",
"in",
"the",
"way",
"that",
"Windows",
"handles",
"BIOS",
"memory",
"."
] | [
15,
15,
15,
15,
15,
15,
6,
14,
9,
14,
14,
32,
9,
6,
14,
33,
32,
32,
15,
14,
2
] | [
13,
13,
13,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
3,
13,
13,
5,
13
] |
99 | [
"An",
"attacker",
"who",
"successfully",
"exploited",
"this",
"vulnerability",
"could",
"run",
"arbitrary",
"code",
"in",
"kernel",
"mode",
"."
] | [
6,
14,
34,
22,
28,
6,
14,
13,
27,
10,
14,
9,
14,
14,
2
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
5,
11,
13,
5,
13,
13
] |
End of preview. Expand
in Dataset Viewer.
README.md exists but content is empty.
- Downloads last month
- 28