sentence_idx
int64
0
5.06k
word
sequence
pos
sequence
tag
sequence
4,609
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,055
[ "Remote", "code", "execution", "vulnerabilities", "exist", "in", "Microsoft", "Exchange", "Server", "through", "the", "WebReady", "Document", "Viewing", "feature", "." ]
[ 15, 14, 14, 17, 31, 9, 15, 15, 15, 9, 6, 15, 15, 15, 14, 2 ]
[ 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,377
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
981
[ "An", "attacker", "who", "successfully", "exploited", "any", "of", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 9, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,825
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
2,747
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,640
[ "This", "security", "update", "resolves", "publicly", "disclosed", "vulnerabilities", "in", "Microsoft", "Exchange", "Server", "." ]
[ 6, 14, 14, 17, 22, 30, 17, 9, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,716
[ "The", "vulnerability", "could", "be", "exploited", "when", "the", "specially", "crafted", "RTF", "email", "message", "is", "previewed", "or", "opened", "in", "Outlook", "while", "using", "Microsoft", "Word", "as", "the", "email", "viewer", "." ]
[ 6, 14, 13, 27, 30, 36, 6, 22, 30, 15, 10, 14, 32, 30, 4, 30, 9, 15, 9, 29, 15, 15, 9, 6, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 13, 13, 13, 13 ]
1,380
[ "Windows", ".NET", "applications", "Workstations", "and", "servers", "that", "run", "untrusted", "Windows", ".NET", "Framework", "applications", "are", "also", "at", "risk", "from", "this", "vulnerability", "." ]
[ 32, 10, 17, 17, 4, 17, 33, 31, 10, 15, 15, 15, 17, 31, 22, 9, 14, 9, 6, 14, 2 ]
[ 3, 8, 13, 13, 13, 13, 13, 13, 13, 3, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,496
[ "See", "the", "FAQ", "section", "for", "these", "vulnerabilities", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 17, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
3,658
[ "An", "attacker", "could", "host", "a", "specially", "crafted", "website", "that", "is", "designed", "to", "exploit", "these", "vulnerabilities", "through", "Internet", "Explorer", "and", "then", "convince", "a", "user", "to", "view", "the", "website", "." ]
[ 6, 14, 13, 27, 6, 22, 30, 14, 33, 32, 30, 26, 27, 6, 17, 9, 15, 15, 4, 22, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,792
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
471
[ "This", "security", "update", "resolves", "publicly", "disclosed", "vulnerabilities", "in", "Microsoft", "Exchange", "Server", "WebReady", "Document", "Viewing", "." ]
[ 6, 14, 14, 17, 22, 30, 17, 9, 15, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,100
[ "The", "vulnerability", "could", "allow", "denial", "of", "service", "if", "an", "attacker", "attempts", "a", "file", "operation", "on", "a", "read", "only", "share", "." ]
[ 6, 14, 13, 27, 14, 9, 14, 9, 6, 14, 32, 6, 14, 14, 9, 6, 14, 22, 14, 2 ]
[ 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,750
[ "Multiple", "remote", "code", "execution", "vulnerabilities", "exists", "in", "the", "way", "that", "Microsoft", "Publisher", "parses", "Publisher", "files", "." ]
[ 10, 10, 14, 14, 17, 32, 9, 6, 14, 9, 15, 15, 32, 15, 17, 2 ]
[ 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 0, 5, 13 ]
555
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "cause", "some", "of", "the", "Windows", "networking", "component", "to", "stop", "responding", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 9, 6, 15, 14, 14, 26, 27, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 13, 13, 13, 13, 13, 13 ]
413
[ "The", "vulnerabilities", "could", "allow", "remote", "code", "execution", "in", "the", "security", "context", "of", "a", "user", "account", "with", "a", "restricted", "token", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 6, 14, 14, 9, 6, 14, 14, 9, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13 ]
1,740
[ "Customers", "who", "have", "automatic", "updating", "enabled", "and", "configured", "to", "check", "online", "for", "updates", "from", "Microsoft", "Update", "typically", "will", "not", "need", "to", "take", "any", "action", "because", "this", "security", "update", "will", "be", "downloaded", "and", "installed", "automatically", "." ]
[ 17, 34, 31, 10, 14, 28, 4, 28, 26, 27, 14, 9, 17, 9, 15, 15, 22, 13, 22, 27, 26, 27, 6, 14, 9, 6, 14, 14, 13, 27, 30, 4, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,441
[ "The", "vulnerability", "could", "allow", "elevation", "of", "privilege", "if", "an", "attacker", "sends", "specially", "crafted", "content", "to", "a", "user", "." ]
[ 6, 14, 13, 27, 14, 9, 14, 9, 6, 14, 32, 22, 30, 14, 26, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,020
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
3,806
[ "Win32k", "Race", "Condition", "Vulnerability", "Microsoft", "has", "not", "identified", "any", "workarounds", "for", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 32, 22, 30, 6, 17, 9, 6, 14, 2 ]
[ 13, 5, 11, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,910
[ "None", "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 14, 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,607
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,042
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,488
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,029
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "increased", "privilege", "and", "read", "arbitrary", "amounts", "of", "kernel", "memory", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 4, 31, 10, 17, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 5, 5, 13 ]
2,976
[ "Customers", "who", "have", "not", "enabled", "automatic", "updating", "need", "to", "check", "for", "updates", "and", "install", "this", "update", "manually", "." ]
[ 17, 34, 31, 22, 30, 10, 29, 14, 26, 27, 9, 17, 4, 27, 6, 10, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,656
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
483
[ "These", "vulnerabilities", "could", "allow", "remote", "code", "execution", "as", "Local", "System", "if", "a", "user", "views", "a", "specially", "crafted", "file", "through", "Outlook", "Web", "Access", "in", "a", "browser", "." ]
[ 6, 17, 13, 27, 10, 14, 14, 9, 10, 15, 9, 6, 10, 17, 6, 22, 30, 14, 9, 15, 15, 15, 9, 6, 14, 2 ]
[ 13, 13, 13, 13, 5, 5, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13 ]
4,768
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,761
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,010
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,138
[ "An", "attacker", "who", "successfully", "exploited", "these", "vulnerabilities", "could", "run", "arbitrary", "code", "in", "the", "context", "of", "a", "user", "account", "with", "a", "restricted", "token", "." ]
[ 6, 14, 34, 22, 30, 6, 17, 13, 27, 10, 14, 9, 6, 14, 9, 6, 14, 14, 9, 6, 30, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13 ]
677
[ "This", "security", "update", "resolves", "one", "publicly", "disclosed", "vulnerability", "and", "three", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Lync", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 14, 4, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13 ]
3,201
[ "This", "vulnerability", "requires", "that", "a", "user", "be", "logged", "on", "and", "visiting", "a", "website", "for", "any", "malicious", "action", "to", "occur", "." ]
[ 6, 14, 32, 9, 6, 14, 27, 30, 9, 4, 29, 6, 14, 9, 6, 10, 14, 26, 27, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,008
[ "Known", "Issues", "." ]
[ 30, 15, 2 ]
[ 13, 13, 13 ]
49
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,668
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
23
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,812
[ "Multiple", "remote", "code", "execution", "vulnerabilities", "exists", "in", "the", "way", "that", "Microsoft", "Publisher", "parses", "Publisher", "files", "." ]
[ 10, 10, 14, 14, 17, 32, 9, 6, 14, 9, 15, 15, 32, 15, 17, 2 ]
[ 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 13, 0, 5, 13 ]
4,761
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,933
[ "These", "vulnerabilities", "may", "corrupt", "memory", "in", "such", "a", "way", "that", "an", "attacker", "could", "execute", "arbitrary", "code", "in", "the", "context", "of", "the", "current", "user", "." ]
[ 6, 17, 13, 27, 14, 9, 10, 6, 14, 9, 6, 14, 13, 27, 10, 14, 9, 6, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 11, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,179
[ "The", "vulnerability", "could", "cause", "the", "computer", "to", "stop", "responding", "and", "restart", "." ]
[ 6, 14, 13, 27, 6, 14, 26, 27, 14, 4, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,985
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
16
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,867
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "and", "be", "able", "to", "log", "on", "locally", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 4, 27, 10, 26, 27, 9, 22, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,311
[ "An", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "a", "specially", "crafted", "website", "." ]
[ 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 22, 30, 22, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
428
[ "The", "transcoding", "service", "in", "Exchange", "that", "is", "used", "for", "WebReady", "Document", "Viewing", "is", "running", "in", "the", "LocalService", "account", "." ]
[ 6, 29, 14, 9, 15, 33, 32, 30, 9, 10, 15, 15, 32, 29, 9, 6, 15, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
4,850
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,030
[ "This", "security", "update", "resolves", "30", "privately", "reported", "vulnerabilities", "in", "Microsoft", "Windows", "." ]
[ 6, 14, 31, 32, 5, 22, 30, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 7, 3, 13 ]
2,712
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "take", "complete", "control", "of", "an", "affected", "system", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,989
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "Web", "sites", "and", "Web", "sites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 15, 17, 4, 15, 32, 9, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,031
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
5,033
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,740
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "e-mail", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,136
[ "FAST", "Search", "Server", "for", "SharePoint", "is", "only", "affected", "by", "this", "issue", "when", "Advanced", "Filter", "Pack", "is", "enabled", "." ]
[ 15, 15, 15, 9, 15, 32, 22, 30, 9, 6, 14, 36, 15, 15, 15, 32, 30, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,063
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,266
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,957
[ "For", "an", "attack", "to", "be", "successful", "a", "user", "must", "open", "an", "attachment", "that", "is", "sent", "in", "an", "e-mail", "message", "." ]
[ 9, 6, 14, 26, 27, 10, 6, 14, 13, 27, 6, 14, 33, 32, 30, 9, 6, 10, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,839
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
503
[ "The", "transcoding", "service", "in", "Exchange", "that", "is", "used", "for", "WebReady", "Document", "Viewing", "is", "running", "in", "the", "LocalService", "account", "." ]
[ 6, 29, 14, 9, 15, 33, 32, 30, 9, 10, 15, 15, 32, 29, 9, 6, 15, 14, 2 ]
[ 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13 ]
365
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,736
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "designed", "to", "increase", "privileges", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 30, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 5, 13 ]
4,128
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "designed", "to", "increase", "privileges", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 30, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 5, 13 ]
1,388
[ "The", "security", "update", "addresses", "the", "vulnerability", "by", "correcting", "the", "manner", "in", "which", "the", ".NET", "Framework", "retrieves", "the", "default", "web", "proxy", "configuration", "settings", "." ]
[ 6, 14, 14, 32, 6, 14, 9, 29, 6, 14, 9, 33, 6, 14, 15, 32, 6, 14, 14, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13, 13, 13, 13, 13, 5, 13, 13 ]
3,000
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
2,292
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,614
[ "The", "vulnerability", "could", "be", "exploited", "when", "the", "user", "previews", "or", "opens", "the", "email", "message", "." ]
[ 6, 14, 13, 27, 30, 36, 6, 14, 14, 4, 32, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,362
[ "SharePoint", "XSS", "Vulnerability", "An", "elevation", "of", "privilege", "exists", "in", "Microsoft", "SharePoint", "Server", "." ]
[ 15, 15, 15, 6, 14, 9, 14, 17, 9, 15, 15, 15, 2 ]
[ 13, 5, 13, 13, 13, 13, 13, 13, 13, 7, 0, 9, 13 ]
2,979
[ "Known", "Issues", "." ]
[ 30, 15, 2 ]
[ 13, 13, 13 ]
370
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,030
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "this", "vulnerability", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,076
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,796
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,280
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "gain", "the", "same", "user", "rights", "as", "the", "current", "user", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 6, 10, 14, 17, 9, 6, 10, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
4,184
[ "There", "are", "multiple", "means", "that", "could", "allow", "an", "attacker", "to", "exploit", "this", "vulnerability", "." ]
[ 7, 31, 10, 17, 33, 13, 27, 6, 14, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,778
[ "This", "security", "update", "is", "rated", "Critical", "for", "all", "supported", "versions", "of", "Internet", "Explorer", "." ]
[ 6, 14, 14, 32, 30, 15, 9, 6, 10, 17, 9, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 8, 8, 8, 13, 0, 9, 13 ]
4,009
[ "An", "attacker", "could", "then", "run", "a", "specially", "crafted", "application", "designed", "to", "increase", "privileges", "." ]
[ 6, 14, 13, 22, 27, 6, 22, 30, 14, 30, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 5, 13 ]
3,412
[ "See", "the", "FAQ", "section", "for", "these", "vulnerabilities", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 17, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
1,883
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,031
[ "cloneNode", "Use", "After", "Free", "Vulnerability", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "affected", "components", "handle", "a", "specially", "crafted", "TrueType", "font", "file", "." ]
[ 14, 15, 9, 15, 15, 15, 10, 14, 14, 14, 32, 9, 6, 14, 33, 28, 17, 27, 6, 22, 30, 15, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
5,024
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
2,410
[ "The", "attacker", "could", "also", "take", "advantage", "of", "compromised", "websites", "and", "websites", "that", "accept", "or", "host", "user-provided", "content", "or", "advertisements", "." ]
[ 6, 14, 13, 22, 27, 14, 9, 10, 17, 4, 32, 6, 14, 4, 14, 10, 14, 4, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
613
[ "." ]
[ 2 ]
[ 11 ]
1,567
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,780
[ "Win32k", "Race", "Condition", "Vulnerability", "Microsoft", "has", "not", "identified", "any", "workarounds", "for", "this", "vulnerability", "." ]
[ 15, 15, 15, 15, 15, 32, 22, 30, 6, 17, 9, 6, 14, 2 ]
[ 13, 5, 11, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,297
[ "An", "attacker", "must", "have", "valid", "logon", "credentials", "to", "exploit", "this", "vulnerability", "." ]
[ 6, 14, 13, 27, 10, 14, 17, 26, 27, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13 ]
2,454
[ "None", "." ]
[ 14, 2 ]
[ 13, 13 ]
506
[ "The", "LocalService", "account", "has", "minimum", "privileges", "on", "the", "local", "computer", "and", "presents", "anonymous", "credentials", "on", "the", "network", "An", "attacker", "could", "send", "an", "email", "message", "containing", "a", "specially", "crafted", "file", "to", "a", "user", "on", "an", "affected", "version", "of", "Exchange", "." ]
[ 6, 15, 14, 32, 30, 17, 9, 6, 10, 14, 4, 17, 10, 17, 9, 6, 14, 6, 14, 13, 27, 6, 10, 14, 29, 6, 22, 30, 14, 26, 6, 14, 9, 6, 10, 14, 9, 15, 2 ]
[ 13, 13, 5, 13, 13, 5, 13, 13, 5, 13, 13, 13, 13, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
3,713
[ "Servers", "could", "be", "at", "more", "risk", "if", "administrators", "allow", "users", "to", "log", "on", "to", "servers", "and", "to", "run", "programs", "." ]
[ 17, 13, 27, 9, 11, 14, 9, 17, 31, 17, 26, 27, 9, 26, 17, 4, 26, 27, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,965
[ "This", "security", "update", "resolves", "one", "publicly", "disclosed", "vulnerability", "and", "one", "privately", "reported", "vulnerability", "in", "Windows", "." ]
[ 6, 14, 14, 32, 5, 22, 30, 14, 4, 5, 22, 30, 14, 9, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 3, 13 ]
2,784
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
224
[ "See", "the", "FAQ", "section", "for", "this", "vulnerability", "for", "more", "information", "about", "Internet", "Explorer", "Enhanced", "Security", "Configuration", "." ]
[ 27, 6, 15, 14, 9, 6, 14, 9, 11, 14, 9, 15, 15, 15, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 13, 0, 9, 13, 13, 5, 13 ]
44
[ "An", "attacker", "would", "have", "no", "way", "to", "force", "users", "to", "visit", "a", "website", "hosting", "the", "file", "." ]
[ 6, 14, 13, 27, 6, 14, 26, 27, 17, 26, 27, 6, 10, 29, 6, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,702
[ "Reflected", "XSS", "Vulnerability", "Enable", "Internet", "Explorer", "8", "and", "Internet", "Explorer", "9", "XSS", "filter", "in", "the", "Local", "intranet", "security", "zone", "A", "remote", "code", "execution", "vulnerability", "exists", "in", "the", "way", "that", "affected", "Microsoft", "Office", "software", "parses", "specially", "crafted", "Rich", "Text", "Format", "(", "RTF", ")", "data", "." ]
[ 30, 10, 15, 15, 15, 15, 5, 4, 15, 15, 5, 15, 14, 9, 6, 10, 14, 14, 14, 15, 14, 14, 14, 14, 32, 9, 6, 14, 33, 28, 15, 15, 14, 32, 22, 30, 15, 15, 15, 0, 15, 1, 14, 2 ]
[ 13, 5, 13, 13, 0, 9, 13, 13, 0, 9, 13, 5, 13, 13, 13, 5, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 7, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
1,008
[ "The", "most", "severe", "vulnerabilities", "could", "allow", "remote", "code", "execution", "if", "a", "user", "views", "a", "specially", "crafted", "webpage", "using", "Internet", "Explorer", "." ]
[ 6, 24, 10, 17, 13, 27, 10, 14, 14, 9, 6, 10, 17, 6, 22, 30, 14, 29, 15, 15, 2 ]
[ 13, 13, 13, 13, 13, 13, 5, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 0, 9, 13 ]
3,654
[ "Users", "whose", "accounts", "are", "configured", "to", "have", "fewer", "user", "rights", "on", "the", "system", "could", "be", "less", "impacted", "than", "users", "who", "operate", "with", "administrative", "user", "rights", "." ]
[ 17, 35, 17, 31, 30, 26, 27, 11, 14, 17, 9, 6, 14, 13, 27, 23, 10, 9, 17, 34, 31, 9, 10, 14, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
81
[ "An", "attacker", "who", "successfully", "exploited", "this", "vulnerability", "could", "run", "arbitrary", "code", "in", "kernel", "mode", "." ]
[ 6, 14, 34, 22, 28, 6, 14, 13, 27, 10, 14, 9, 14, 14, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 5, 11, 13, 5, 13, 13 ]
2,536
[ "The", "vulnerabilities", "could", "also", "be", "used", "by", "Windows", ".NET", "applications", "to", "bypass", "Code", "Access", "Security", "(", "CAS", ")", "restrictions", "." ]
[ 6, 17, 13, 22, 27, 30, 9, 15, 15, 17, 26, 27, 15, 15, 15, 0, 15, 1, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 3, 8, 13, 13, 5, 5, 5, 13, 13, 13, 13, 13, 13 ]
3,397
[ "These", "websites", "could", "contain", "specially", "crafted", "content", "that", "could", "exploit", "these", "vulnerabilities", "." ]
[ 6, 17, 13, 27, 22, 30, 14, 33, 13, 27, 6, 17, 2 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
31
Edit dataset card