sentence_idx
int64
0
5.08k
word
sequence
pos
sequence
tag
sequence
100
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "administrative", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
101
[ "This", "security", "update", "resolves", "one", "privately", "reported", "vulnerability", "and", "one", "publicly", "disclosed", "vulnerability", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 14, 4, 5, 22, 30, 14, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 13 ]
102
[ "The", "vulnerabilities", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "logs", "on", "to", "an", "affected", "system", "and", "runs", "a", "specially", "crafted", "application", "that", "exploits", "the", "vulnerability", "." ]
[ 6, 17, 13, 27, 14, 9, 14, 9, 6, 14, 17, 9, 26, 6, 10, 14, 4, 32, 6, 22, 30, 14, 33, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13 ]
103
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
104
[ "The", "vulnerability", "could", "not", "be", "exploited", "remotely", "or", "by", "anonymous", "users", "." ]
[ 6, 14, 13, 22, 27, 30, 22, 4, 9, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
105
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "kernel", "mode", "and", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 14, 14, 4, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
106
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "administrative", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
107
[ "To", "exploit", "this", "vulnerability", null, "an", "attacker", "would", "first", "have", "to", "log", "on", "to", "the", "system", "." ]
[ 26, 27, 6, 14, 37, 6, 14, 13, 22, 27, 26, 27, 9, 26, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
108
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "that", "could", "exploit", "the", "vulnerability", "and", "take", "complete", "control", "over", "the", "affected", "system", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 33, 13, 27, 6, 14, 4, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
109
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
110
[ "The", "vulnerability", "could", "not", "be", "exploited", "remotely", "or", "by", "anonymous", "users", "." ]
[ 6, 14, 13, 22, 27, 30, 22, 4, 9, 10, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
111
[ "Workstations", "and", "terminal", "servers", "are", "primarily", "at", "risk", "." ]
[ 17, 4, 10, 17, 31, 22, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
112
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
113
[ "However", null, "best", "practices", "strongly", "discourage", "allowing", "this", "." ]
[ 22, 37, 12, 17, 22, 27, 29, 6, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
114
[ "BIOS", "ROM", "Corruption", "Vulnerability", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "Internet", "Explorer", "accesses", "an", "object", "that", "has", "been", "deleted", "." ]
[ 15, 15, 15, 15, 15, 10, 14, 14, 14, 32, 9, 6, 14, 9, 15, 15, 32, 6, 14, 33, 32, 30, 30, 2 ]
[ 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13 ]
115
[ "The", "vulnerability", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 14, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
116
[ "This", "security", "update", "resolves", "two", "privately", "reported", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 10, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
117
[ "The", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
118
[ "An", "attacker", "who", "successfully", "exploited", "any", "of", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 9, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
119
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
120
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
121
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
122
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
123
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "this", "vulnerability", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 14, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
124
[ "An", "attacker", "could", "also", "embed", "an", "ActiveX", "control", "marked", null, "safe", "for", "initialization", null, "in", "an", "application", "or", "Microsoft", "Office", "document", "that", "hosts", "the", "IE", "rendering", "engine", "." ]
[ 6, 14, 13, 22, 27, 6, 15, 14, 28, 15, 10, 9, 14, 14, 9, 6, 14, 4, 15, 15, 14, 33, 32, 6, 15, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 7, 13, 13, 13, 13, 13, 0, 13, 13, 13 ]
125
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
126
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
127
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "view", "the", "attacker-controlled", "content", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
128
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "take", "action", null, "typically", "by", "clicking", "a", "link", "in", "an", "email", "message", "or", "in", "an", "Instant", "Messenger", "message", "that", "takes", "users", "to", "the", "attacker's", "website", null, "or", "by", "opening", "an", "attachment", "sent", "through", "email", "." ]
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 14, 37, 22, 9, 29, 6, 14, 9, 6, 10, 14, 4, 9, 6, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 9, 29, 6, 14, 28, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
129
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "could", "host", "a", "website", "that", "contains", "a", "webpage", "that", "is", "used", "to", "exploit", "this", "vulnerability", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 14, 33, 32, 6, 14, 33, 32, 30, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
130
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
131
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "these", "websites", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
132
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "Instant", "Messenger", "message", "that", "takes", "users", "to", "the", "attacker's", "website", "." ]
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
133
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
134
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
135
[ "By", "default", null, "all", "supported", "versions", "of", "Microsoft", "Outlook", null, "Microsoft", "Outlook", "Express", null, "and", "Windows", "Mail", "open", "HTML", "email", "messages", "in", "the", "Restricted", "sites", "zone", "." ]
[ 9, 14, 37, 6, 28, 17, 9, 15, 15, 37, 15, 15, 15, 37, 4, 15, 15, 10, 15, 14, 17, 9, 6, 15, 32, 14, 2 ]
[ 13, 13, 13, 8, 8, 8, 13, 7, 13, 13, 7, 13, 13, 13, 13, 3, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13 ]
136
[ "The", "Restricted", "sites", "zone", null, "which", "disables", "script", "and", "ActiveX", "controls", null, "helps", "reduce", "the", "risk", "of", "an", "attacker", "being", "able", "to", "use", "this", "vulnerability", "to", "execute", "malicious", "code", "." ]
[ 6, 15, 32, 5, 37, 33, 32, 14, 4, 15, 17, 37, 32, 27, 6, 14, 9, 6, 14, 29, 10, 26, 27, 6, 14, 26, 27, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 5, 13 ]
137
[ "If", "a", "user", "clicks", "a", "link", "in", "an", "email", "message", null, "the", "user", "could", "still", "be", "vulnerable", "to", "exploitation", "of", "this", "vulnerability", "through", "the", "web-based", "attack", "scenario", "." ]
[ 9, 6, 14, 32, 6, 14, 9, 6, 10, 14, 37, 6, 14, 13, 22, 27, 10, 26, 14, 9, 6, 14, 9, 6, 10, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
138
[ "By", "default", null, "Internet", "Explorer", "on", "Windows", "Server", "2003", null, "Windows", "Server", "2008", null, "and", "Windows", "Server", "2008", "R2", "runs", "in", "a", "restricted", "mode", "that", "is", "known", "as", "Enhanced", "Security", "Configuration", "." ]
[ 9, 14, 37, 15, 15, 9, 15, 15, 5, 37, 32, 15, 5, 37, 4, 15, 15, 5, 15, 32, 9, 6, 10, 14, 33, 32, 30, 9, 15, 15, 15, 2 ]
[ 13, 13, 13, 0, 9, 13, 3, 13, 13, 13, 3, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
139
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
140
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
141
[ "Systems", "where", "Internet", "Explorer", "is", "used", "frequently", null, "such", "as", "workstations", "or", "terminal", "servers", null, "are", "at", "the", "most", "risk", "from", "this", "vulnerability", "." ]
[ 16, 36, 15, 15, 32, 30, 22, 37, 10, 9, 17, 4, 10, 17, 37, 31, 9, 6, 24, 14, 9, 6, 14, 2 ]
[ 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
142
[ "Cached", "Object", "Remote", "Code", "Execution", "Vulnerability", "Set", "Internet", "and", "Local", "intranet", "security", "zone", "settings", "to", null, "High", null, "to", "block", "ActiveX", "Controls", "and", "Active", "Scripting", "in", "these", "zones", "Configure", "Internet", "Explorer", "to", "prompt", "before", "running", "Active", "Scripting", "or", "to", "disable", "Active", "Scripting", "in", "the", "Internet", "and", "Local", "intranet", "security", "zone", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "Internet", "Explorer", "accesses", "an", "object", "that", "has", "been", "deleted", "." ]
[ 15, 15, 15, 15, 15, 15, 15, 15, 4, 15, 14, 14, 14, 17, 26, 27, 15, 15, 26, 27, 15, 15, 4, 15, 15, 9, 6, 17, 15, 15, 15, 26, 27, 9, 29, 10, 15, 4, 26, 27, 10, 15, 9, 6, 15, 4, 15, 14, 14, 14, 15, 14, 14, 14, 14, 32, 9, 6, 14, 9, 15, 15, 32, 6, 14, 33, 32, 30, 30, 2 ]
[ 13, 13, 5, 5, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13 ]
143
[ "The", "vulnerability", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 14, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
144
[ "This", "security", "update", "resolves", "one", "publicly", "disclosed", "and", "twelve", "privately", "reported", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 4, 27, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
145
[ "The", "most", "severe", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 24, 10, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
146
[ "An", "attacker", "who", "successfully", "exploited", "any", "of", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 9, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
147
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
148
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
149
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
150
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
151
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "this", "vulnerability", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 14, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
152
[ "An", "attacker", "could", "also", "embed", "an", "ActiveX", "control", "marked", null, "safe", "for", "initialization", null, "in", "an", "application", "or", "Microsoft", "Office", "document", "that", "hosts", "the", "IE", "rendering", "engine", "." ]
[ 6, 14, 13, 22, 27, 6, 15, 14, 28, 15, 10, 9, 14, 14, 9, 6, 14, 4, 15, 15, 14, 33, 32, 6, 15, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 7, 13, 13, 13, 13, 13, 0, 13, 13, 13 ]
153
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
154
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
155
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "view", "the", "attacker-controlled", "content", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
156
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "take", "action", null, "typically", "by", "clicking", "a", "link", "in", "an", "email", "message", "or", "in", "an", "Instant", "Messenger", "message", "that", "takes", "users", "to", "the", "attacker's", "website", null, "or", "by", "opening", "an", "attachment", "sent", "through", "email", "." ]
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 14, 37, 22, 9, 29, 6, 14, 9, 6, 10, 14, 4, 9, 6, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 9, 29, 6, 14, 28, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
157
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "could", "host", "a", "website", "that", "contains", "a", "webpage", "that", "is", "used", "to", "exploit", "this", "vulnerability", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 14, 33, 32, 6, 14, 33, 32, 30, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
158
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
159
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "these", "websites", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
160
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "Instant", "Messenger", "message", "that", "takes", "users", "to", "the", "attacker's", "website", "." ]
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
161
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
162
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
163
[ "By", "default", null, "all", "supported", "versions", "of", "Microsoft", "Outlook", null, "Microsoft", "Outlook", "Express", null, "and", "Windows", "Mail", "open", "HTML", "email", "messages", "in", "the", "Restricted", "sites", "zone", "." ]
[ 9, 14, 37, 6, 28, 17, 9, 15, 15, 37, 15, 15, 15, 37, 4, 15, 15, 10, 15, 14, 17, 9, 6, 15, 32, 14, 2 ]
[ 13, 13, 13, 8, 8, 8, 13, 7, 13, 13, 7, 13, 13, 13, 13, 3, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13 ]
164
[ "The", "Restricted", "sites", "zone", null, "which", "disables", "script", "and", "ActiveX", "controls", null, "helps", "reduce", "the", "risk", "of", "an", "attacker", "being", "able", "to", "use", "this", "vulnerability", "to", "execute", "malicious", "code", "." ]
[ 6, 15, 32, 5, 37, 33, 32, 14, 4, 15, 17, 37, 32, 27, 6, 14, 9, 6, 14, 29, 10, 26, 27, 6, 14, 26, 27, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 5, 13 ]
165
[ "If", "a", "user", "clicks", "a", "link", "in", "an", "email", "message", null, "the", "user", "could", "still", "be", "vulnerable", "to", "exploitation", "of", "this", "vulnerability", "through", "the", "web-based", "attack", "scenario", "." ]
[ 9, 6, 14, 32, 6, 14, 9, 6, 10, 14, 37, 6, 14, 13, 22, 27, 10, 26, 14, 9, 6, 14, 9, 6, 10, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
166
[ "By", "default", null, "Internet", "Explorer", "on", "Windows", "Server", "2003", null, "Windows", "Server", "2008", null, "and", "Windows", "Server", "2008", "R2", "runs", "in", "a", "restricted", "mode", "that", "is", "known", "as", "Enhanced", "Security", "Configuration", "." ]
[ 9, 14, 37, 15, 15, 9, 15, 15, 5, 37, 32, 15, 5, 37, 4, 15, 15, 5, 15, 32, 9, 6, 10, 14, 33, 32, 30, 9, 15, 15, 15, 2 ]
[ 13, 13, 13, 0, 9, 13, 3, 13, 13, 13, 3, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
167
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
168
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
169
[ "Systems", "where", "Internet", "Explorer", "is", "used", "frequently", null, "such", "as", "workstations", "or", "terminal", "servers", null, "are", "at", "the", "most", "risk", "from", "this", "vulnerability", "." ]
[ 16, 36, 15, 15, 32, 30, 22, 37, 10, 9, 17, 4, 10, 17, 37, 31, 9, 6, 24, 14, 9, 6, 14, 2 ]
[ 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
170
[ "Center", "Element", "Remote", "Code", "Execution", "Vulnerability", "Set", "Internet", "and", "Local", "intranet", "security", "zone", "settings", "to", null, "High", null, "to", "block", "ActiveX", "Controls", "and", "Active", "Scripting", "in", "these", "zones", "Configure", "Internet", "Explorer", "to", "prompt", "before", "running", "Active", "Scripting", "or", "to", "disable", "Active", "Scripting", "in", "the", "Internet", "and", "Local", "intranet", "security", "zone", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "Internet", "Explorer", "accesses", "an", "object", "that", "has", "been", "deleted", "." ]
[ 15, 15, 15, 15, 15, 15, 15, 15, 4, 15, 14, 14, 14, 17, 26, 27, 15, 15, 26, 27, 15, 15, 4, 15, 15, 9, 6, 17, 15, 15, 15, 26, 27, 9, 29, 10, 15, 4, 26, 27, 10, 15, 9, 6, 15, 4, 15, 14, 14, 14, 15, 14, 14, 14, 14, 32, 9, 6, 14, 9, 15, 15, 32, 6, 14, 33, 32, 30, 30, 2 ]
[ 13, 13, 5, 5, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13 ]
171
[ "The", "vulnerability", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 14, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
172
[ "This", "security", "update", "resolves", "two", "privately", "reported", "vulnerabilities", "in", "Internet", "Explorer", "." ]
[ 6, 14, 10, 17, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
173
[ "The", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
174
[ "An", "attacker", "who", "successfully", "exploited", "any", "of", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 9, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
175
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
176
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
177
[ "If", "the", "current", "user", "is", "logged", "on", "with", "administrative", "user", "rights", null, "an", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 9, 6, 10, 14, 32, 30, 9, 9, 10, 14, 17, 37, 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
178
[ "An", "attacker", "could", "then", "install", "programs", ";", "view", null, "change", null, "or", "delete", "data", ";", "or", "create", "new", "accounts", "with", "full", "user", "rights", "." ]
[ 6, 14, 13, 22, 27, 17, 3, 14, 37, 14, 37, 4, 10, 17, 3, 4, 27, 10, 17, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
179
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "this", "vulnerability", "through", "Internet", "Explorer", null, "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 14, 9, 15, 15, 37, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
180
[ "An", "attacker", "could", "also", "embed", "an", "ActiveX", "control", "marked", null, "safe", "for", "initialization", null, "in", "an", "application", "or", "Microsoft", "Office", "document", "that", "hosts", "the", "IE", "rendering", "engine", "." ]
[ 6, 14, 13, 22, 27, 6, 15, 14, 28, 15, 10, 9, 14, 14, 9, 6, 14, 4, 15, 15, 14, 33, 32, 6, 15, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 7, 13, 13, 13, 13, 13, 0, 13, 13, 13 ]
181
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
182
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
183
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "view", "the", "attacker-controlled", "content", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
184
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "take", "action", null, "typically", "by", "clicking", "a", "link", "in", "an", "email", "message", "or", "in", "an", "Instant", "Messenger", "message", "that", "takes", "users", "to", "the", "attacker's", "website", null, "or", "by", "opening", "an", "attachment", "sent", "through", "email", "." ]
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 14, 37, 22, 9, 29, 6, 14, 9, 6, 10, 14, 4, 9, 6, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 37, 4, 9, 29, 6, 14, 28, 9, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
185
[ "In", "a", "web-based", "attack", "scenario", null, "an", "attacker", "could", "host", "a", "website", "that", "contains", "a", "webpage", "that", "is", "used", "to", "exploit", "this", "vulnerability", "." ]
[ 9, 6, 10, 14, 14, 37, 6, 14, 13, 27, 6, 14, 33, 32, 6, 14, 33, 32, 30, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
186
[ "In", "addition", null, "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 9, 14, 37, 30, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
187
[ "In", "all", "cases", null, "however", null, "an", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "these", "websites", "." ]
[ 9, 6, 17, 37, 22, 37, 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
188
[ "Instead", null, "an", "attacker", "would", "have", "to", "convince", "users", "to", "visit", "the", "website", null, "typically", "by", "getting", "them", "to", "click", "a", "link", "in", "an", "email", "message", "or", "Instant", "Messenger", "message", "that", "takes", "users", "to", "the", "attacker's", "website", "." ]
[ 22, 37, 6, 14, 13, 27, 26, 27, 17, 26, 27, 6, 14, 37, 22, 9, 29, 20, 26, 27, 6, 14, 9, 6, 10, 14, 4, 15, 15, 14, 33, 32, 17, 26, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
189
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
190
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
191
[ "By", "default", null, "all", "supported", "versions", "of", "Microsoft", "Outlook", null, "Microsoft", "Outlook", "Express", null, "and", "Windows", "Mail", "open", "HTML", "email", "messages", "in", "the", "Restricted", "sites", "zone", "." ]
[ 9, 14, 37, 6, 28, 17, 9, 15, 15, 37, 15, 15, 15, 37, 4, 15, 15, 10, 15, 14, 17, 9, 6, 15, 32, 14, 2 ]
[ 13, 13, 13, 8, 8, 8, 13, 7, 13, 13, 7, 13, 13, 13, 13, 3, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13 ]
192
[ "The", "Restricted", "sites", "zone", null, "which", "disables", "script", "and", "ActiveX", "controls", null, "helps", "reduce", "the", "risk", "of", "an", "attacker", "being", "able", "to", "use", "this", "vulnerability", "to", "execute", "malicious", "code", "." ]
[ 6, 15, 32, 5, 37, 33, 32, 14, 4, 15, 17, 37, 32, 27, 6, 14, 9, 6, 14, 29, 10, 26, 27, 6, 14, 26, 27, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 5, 13 ]
193
[ "If", "a", "user", "clicks", "a", "link", "in", "an", "email", "message", null, "the", "user", "could", "still", "be", "vulnerable", "to", "exploitation", "of", "this", "vulnerability", "through", "the", "web-based", "attack", "scenario", "." ]
[ 9, 6, 14, 32, 6, 14, 9, 6, 10, 14, 37, 6, 14, 13, 22, 27, 10, 26, 14, 9, 6, 14, 9, 6, 10, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13 ]
194
[ "By", "default", null, "Internet", "Explorer", "on", "Windows", "Server", "2003", null, "Windows", "Server", "2008", null, "and", "Windows", "Server", "2008", "R2", "runs", "in", "a", "restricted", "mode", "that", "is", "known", "as", "Enhanced", "Security", "Configuration", "." ]
[ 9, 14, 37, 15, 15, 9, 15, 15, 5, 37, 32, 15, 5, 37, 4, 15, 15, 5, 15, 32, 9, 6, 10, 14, 33, 32, 30, 9, 15, 15, 15, 2 ]
[ 13, 13, 13, 0, 9, 13, 3, 13, 13, 13, 3, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
195
[ "This", "mode", "mitigates", "this", "vulnerability", "." ]
[ 6, 14, 32, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13 ]
196
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
197
[ "Systems", "where", "Internet", "Explorer", "is", "used", "frequently", null, "such", "as", "workstations", "or", "terminal", "servers", null, "are", "at", "the", "most", "risk", "from", "this", "vulnerability", "." ]
[ 16, 36, 15, 15, 32, 30, 22, 37, 10, 9, 17, 4, 10, 17, 37, 31, 9, 6, 24, 14, 9, 6, 14, 2 ]
[ 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
198
[ "Attribute", "Remove", "Remote", "Code", "Execution", "Vulnerability", "Set", "Internet", "and", "Local", "intranet", "security", "zone", "settings", "to", null, "High", null, "to", "block", "ActiveX", "Controls", "and", "Active", "Scripting", "in", "these", "zones", "Configure", "Internet", "Explorer", "to", "prompt", "before", "running", "Active", "Scripting", "or", "to", "disable", "Active", "Scripting", "in", "the", "Internet", "and", "Local", "intranet", "security", "zone", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "Internet", "Explorer", "accesses", "an", "object", "that", "has", "not", "been", "correctly", "initialized", "or", "has", "been", "deleted", "." ]
[ 15, 15, 15, 15, 15, 15, 15, 15, 4, 15, 14, 14, 14, 17, 26, 27, 15, 15, 26, 27, 15, 15, 4, 15, 15, 9, 6, 17, 15, 15, 15, 26, 27, 9, 29, 10, 15, 4, 26, 27, 10, 15, 9, 6, 15, 4, 15, 14, 14, 14, 15, 14, 14, 14, 14, 32, 9, 6, 14, 9, 15, 15, 32, 6, 14, 33, 32, 22, 30, 22, 30, 4, 32, 30, 30, 2 ]
[ 13, 13, 5, 5, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
199
[ "The", "vulnerability", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 14, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]