task
stringlengths 12
101
| input
stringlengths 0
6.4k
| output
stringlengths 1
6.03k
| options
list | pageTitle
stringlengths 0
632
| outputColName
stringlengths 1
710
| url
stringlengths 15
288
| wdcFile
stringlengths 66
75
|
---|---|---|---|---|---|---|---|
5194eaa9_music_chart_for_November__1994__Song | [#] 23 [Artist] Spearhead [Album] Home [Song] | Positive | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 22 [Artist] Pizzicato Five [Album] Made In USA [Song] | Twiggy Twiggy | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 21 [Artist] Beck [Album] Mellow Gold [Song] | Beercan | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 20 [Artist] Portishead [Album] Dummy [Song] | Numb | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 19 [Artist] Dick Dale [Album] Unknown Territory [Song] | Scalped | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 18 [Artist] Sam Phillips [Album] Martinis & Bikinis [Song] | Strawberry Road | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 17 [Artist] Dag [Album] Righteous [Song] | Your Mama's Eyes | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 16 [Artist] Tindersticks [Album] Tindersticks [Song] | The Not Knowing | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 15 [Artist] Public Enemy [Album] Muse Sick-N-Hour Mess Age [Song] | Ain't Nuttin Butter Song | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 14 [Artist] Latin Playboys [Album] Latin Playboys [Song] | Ten Believers | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 13 [Artist] Built To Spill [Album] There's Nothing Wrong With Love [Song] | Big Dipper | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 12 [Artist] Mark Lanegan [Album] Whiskey For The Holy Ghost [Song] | Borracho | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 11 [Artist] Ted Hawkins [Album] The Next Hundred Years [Song] | The Good & The Bad | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 10 [Artist] Jeff Buckley [Album] Grace [Song] | So Real | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 9 [Artist] Beastie Boys [Album] Ill Communication [Song] | Sabotage | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 8 [Artist] Iris Dement [Album] My Life [Song] | Sweet Is The Melody | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 7 [Artist] Johnny Cash [Album] American Recordings [Song] | Man Who Wouldn't Cry | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 6 [Artist] Hector Zazou [Album] Sahara Blue [Song] | I'll Strangle You | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 5 [Artist] Lisa Germano [Album] Geek the Girl [Song] | A Psychopath | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 4 [Artist] Nirvana [Album] Unplugged In NY [Song] | Where Did You Sleep Last Night | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 3 [Artist] Sky Cries Mary [Album] This Timeless Turning [Song] | Shipwrecked | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 2 [Artist] MC Solaar [Album] Prose Combat [Song] | Nouveau Western | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
5194eaa9_music_chart_for_November__1994__Song | [#] 1 [Artist] G. Love & Special Sauce [Album] G. Love & Special Sauce [Song] | Baby's Got Sauce | []
| KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994 | Song | http://www.kexp.org/charts/top90/1994/11 | 44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 07.16.2007 [Title] Zenturi ProgramChecker ActiveX Exploit [Vulnerabilty] CVE-2007-2987 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a vulnerability in the sasatl.dll control included in the Zenturi ProgramChecker ActiveX application. The exploit is triggered when the DebugMsgLog() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 07.16.2007 [Title] EnjoySAP ActiveX Exploit [Vulnerabilty] CVE-2007-3605 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a vulnerability in the kwedit.dll control included in the EnjoySAP application. The exploit is triggered when the PrepareToPostHTML() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 07.16.2007 [Title] NeoTrace ActiveX Exploit [Vulnerabilty] CVE-2006-6707 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a vulnerability in the NeoTraceExplorer ActiveX Control (NeoTraceExplorer.dll). The exploit is triggered when a long string argument is processed by the TraceTarget() method resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 07.12.2007 [Title] Asterisk T.38 buffer overflow exploit [Vulnerabilty] CVE-2007-2293 [Category] Exploits/Remote [Platform] Linux [Description] | This module exploits a buffer overflow vulnerability in the T38FaxRateManagement parameter when parsing SIP/SDP requests in 1.4.x prior to 1.4.3. After successful exploitation a agent will be installed. The process being exploited is usually run as root. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 07.12.2007 [Title] mDNSResponder buffer overflow exploit [Vulnerabilty] CVE-2007-2386 [Category] Exploits/Remote [Platform] Mac OS X [Description] | This module exploits a buffer overflow vulnerability in the mDNSResponder service running on certain versions of Apple Mac OS X. The vulnerability is exploited remotely by sending a specially crafted UPnP Internet Gateway Device (IGD) packet and installing an agent. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 07.02.2007 [Title] TrueCrypt Privilege Escalation Exploit [Vulnerabilty] CVE-2007-1738 [Category] Exploits/Local [Platform] Linux [Description] | This module exploits a vulnerability in TrueCrypt 4.x when the software is installed with setuid root. An attacker can exploit this vulnerability to obtain root privileges. This exploit mounts a temporary, especially crafted TrueCrypt volume in the /lib/tls directory and executes a setuid application to bypass security controls and execute an agent as root. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 07.01.2007 [Title] Symantec Discovery XFERWAN Buffer Overflow Exploit [Vulnerabilty] CVE-2007-1173 [Category] Exploits/Remote [Platform] Windows [Description] | This module exploits a stack-based buffer overflow vulnerability in the XferWan.exe component included with Symantec Discovery 6.5. The exploit sends a specially crafted TCP packet triggering a buffer overflow and installing an agent on the target system. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.28.2007 [Title] Sun Java Web SOCKS Proxy Authentication Exploit [Vulnerabilty] CVE-2007-2881 [Category] Exploits/Remote [Platform] Linux [Description] | This module exploits a stack-based buffer overflow vulnerability in the SOCKS proxy included in the Sun Java Web Proxy Server. The exploit sends specially crafted packets during the SOCKS connection negotiation and installs an agent if successful. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.27.2007 [Title] Apple QuickTime Java toQTPointer() code execution exploit update [Vulnerabilty] CVE-2007-2175 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a memory corruption vulnerability in the Java QuickTime for Java (QtJava.dll) browser plug-in. The module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user(s) to connect to it with a Java-enabled browser using the vulnerable plug-in. When a user connects to the site they trigger the exploit and the module attempts to install an agent on their computer. This update adds support for Safari browser in Mac OS X (i386) and adds Opera support in Windows. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.21.2007 [Title] MSRPC Samba Command Injection exploit update [Vulnerabilty] CVE-2007-2447 [Category] Exploits/Remote [Platform] Linux, OpenBSD, FreeBSD, Mac OS X [Description] | This update adds support for Debian, Ubuntu, and Mac OS-X 10.4. This module exploits a command injection vulnerability in the function _AddPrinterW in Samba 3, reached through an AddPrinter remote request. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.20.2007 [Title] McAfee Subscription Manager ActiveX Exploit [Vulnerabilty] CVE-2007-2584 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a buffer overflow vulnerability in the McAfee Subscription Manager (MCSUBMGR.DLL) ActiveX control. The exploit is triggered when the IsOldAppInstalled () method processes an overly long string argument allowing remote attackers to execute arbitrary code. This client-side exploit is dependent on a user visiting a malicious web-site hosted by CORE IMPACT to distribute the exploit and install an agent. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.19.2007 [Title] ActSoft DVD Tools Buffer Overflow Exploit [Vulnerabilty] CVE-2007-0976 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a vulnerability in the dvdtools.ocx control included in the ActSoft DVD Tools ActiveX application. The exploit is triggered when the OpenDVD() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.18.2007 [Title] MSRPC Trend Micro Server Protect buffer overflow exploit [Vulnerabilty] CVE-2007-2508 [Category] Exploits/Remote [Platform] Windows [Description] | TrendMicro ServerProtect is prone to a buffer overflow vulnerability on the rpc interface that could permit the execution of arbitrary remote code. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.18.2007 [Title] NCTAudioFile2 ActiveX Buffer Overflow Exploit [Vulnerabilty] CVE-2007-0018 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a vulnerability in the NCTAudioFile2.AudioFile ActiveX Control (NCTAudioFile2.dll) used by various multimedia applications. The exploit is triggered when a long string argument is processed by the SetFormatLikeSample() method resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.14.2007 [Title] Symantec Norton Internet Security 2004 ActiveX Control Buffer Overflow Exploit [Vulnerabilty] CVE-2007-1689 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a buffer overflow in Norton Internet Security 2004, via a bug in ISLAert.dll, an ActiveX control installed by default. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.14.2007 [Title] Yahoo Messenger Webcam ActiveX Exploit Update [Vulnerabilty] CVE-2007-3148 [Category] Exploits/Client Side [Platform] Windows [Description] | This update adds support for Windows Vista. This module exploits a vulnerability in the Yahoo Messenger Webcam 8.1 ActiveX Control (ywcvwr.dll). When the Receive() method processes a long string argument, a stack based buffer overflow occurs allowing execution of arbitrary code. This exploit is triggered when an unsuspecting user is lured into visiting a malicious web-site hosted by CORE IMPACT. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.13.2007 [Title] Samba lsa_io_trans_names buffer overflow exploit [Vulnerabilty] CVE-2007-2446 [Category] Exploits/Remote [Platform] Solaris, Linux [Description] | This module exploits a buffer overflow vulnerability when parsing RPC requests through the LSA RPC interface in Samba 3.x. The exploit is triggered by sending a specially crafted RPC LsarLookupSids request to a vulnerable computer. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.13.2007 [Title] Microsoft Speech API ActiveX control Exploit [Vulnerabilty] CVE-2007-2222 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a vulnerability in XVoice.dll included in the Microsoft Text to Speech Control. The exploit is triggered when the FindEngine() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.12.2007 [Title] Apache Tomcat buffer overflow exploit [Vulnerabilty] CVE-2007-0774 [Category] Exploits/Remote [Platform] Linux [Description] | This module exploits a buffer overflow vulnerability in the Apache Tomcat JK Web Server Connector and installs an agent. An attacker can use an overly long URL to trigger a buffer overflow in the URL work map routine (map_uri_to_worker()) in the mod_jk.so library, resulting in the compromise of the target system. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.12.2007 [Title] Apple QuickTime Java toQTPointer() code execution exploit [Vulnerabilty] CVE-2007-2175 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a memory corruption vulnerability in the Java QuickTime for Java (QtJava.dll) browser plug-in. The module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user(s) to connect to it with a Java-enabled browser using the vulnerable plug-in. When a user connects to the site they trigger the exploit and the module attempts to install an agent on their computer. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.11.2007 [Title] Microsoft Windows GDI Kernel Local Privilege Escalation Exploit [Vulnerabilty] CVE-2006-5758 [Category] Exploits/Local [Platform] Windows [Description] | This module exploits a vulnerability in the way that Microsoft Windows manages GDI kernel structures in shared memory. An attacker could remap a global shared memory section that is defined to be read-only to read-write allowing them to execute arbitrary code and gain additional privileges on the target system. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.10.2007 [Title] Yahoo Messenger Webcam ActiveX Exploit [Vulnerabilty] CVE-2007-3148 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a vulnerability in the Yahoo Messenger Webcam 8.1 ActiveX Control (ywcvwr.dll). When the Receive() method processes a long string argument, a stack based buffer overflow occurs allowing execution of arbitrary code. This exploit is triggered when an unsuspecting user is lured into visiting a malicious web-site hosted by CORE IMPACT. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.06.2007 [Title] LANDesk Management Suite Alert Service Exploit [Vulnerabilty] CVE-2007-1674 [Category] Exploits/Remote [Platform] Windows [Description] | This module exploits a buffer overflow vulnerability in the Alert Service (aolnsrvr.exe) component of LANDesk Management Suite 8.7 and installs an agent if successful. This vulnerability can be exploited remotely by sending a specially crafted packet to port UDP/65535. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.04.2007 [Title] GNOME Evince PostScript Exploit [Vulnerabilty] CVE-2006-5864 [Category] Exploits/Client Side [Platform] Linux [Description] | This module exploits a stack-based buffer overflow vulnerability in the PostScript processor included in GNOME Evince. The vulnerability is caused by the get_next_text() function not properly validating overly long fields in a PostScript file. The exploit is triggered when an unsuspecting user opens a specially crafted file distributed via an email. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 06.03.2007 [Title] SNORT SMB Fragmentation Buffer Overflow exploit [Vulnerabilty] CVE-2006-5276 [Category] Exploits/Remote [Platform] Linux, FreeBSD [Description] | This module exploits a stack buffer overflow vulnerability in the Sourcefire Snort DCE/RPC preprocessor. An unauthenticated, remote attacker can exploit this vulnerability to execute arbitrary code with the privileges of the Snort process. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 05.29.2007 [Title] Symantec Rtvscan buffer overflow exploit [Vulnerabilty] CVE-2006-2630 [Category] Exploits/Remote [Platform] Windows [Description] | This module exploits a buffer overflow vulnerability in Symantec Client Security 3.x and Symantec Antivirus Corporate Edition 10.x that allows a remote un-authenticated attacker to compromise the target system and obtain system privileges. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 05.03.2007 [Title] CA BrightStor ARCserve Backup mediasvr.exe Exploit [Vulnerabilty] CVE-2007-1785 [Category] Exploits/Remote [Platform] Windows [Description] | This module exploits a buffer overflow vulnerability in the CA BrightStor ARCserve Backup mediasvr.exe. The vulnerability is caused by an input validation error in the mediasvr.exe component when it processes specially crafted RPC requests. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 04.19.2007 [Title] IBM Lotus Domino IMAP Server Buffer Overflow Exploit [Vulnerabilty] CVE-2007-1675 [Category] Exploits/Remote [Platform] Windows, AIX [Description] | This module exploits a buffer overflow vulnerability in a Lotus Domino IMAP Server and installs an agent if successful. This vulnerability can be exploited remotely and it does not require user authentication. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 04.16.2007 [Title] MSRPC DNS Server exploit [Vulnerabilty] CVE-2007-1748 [Category] Exploits/Remote [Platform] Windows [Description] | This module exploits a buffer overflow in the DNS Server via a specially crafted RPC request. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
f36a3a4a_curity_Updates___Core_Security__Description | [Released Date] 04.15.2007 [Title] Microsoft Outlook MS07-003 Exploit [Vulnerabilty] CVE-2007-0034 [Category] Exploits/Client Side [Platform] Windows [Description] | This module exploits a buffer overflow vulnerability in the Advanced Search (Finder.exe) feature of Microsoft Outlook (MS07-003). A remote attacker can compromise the vulnerable system by luring unsuspecting users into opening a specially crafted Outlook Saved Searches (OSS) file. | []
| Core Impact Pro Exploits and Security Updates | Core Security | Description | http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63 | 44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json |
9154a5bc_Profile_in_the_Diigo_Community__Member_name | [0] 0 [Description] The type of drive is unknown. [Member name] | Unknown | [
[
"U",
"n",
"k",
"n",
"o",
"w",
"n"
],
[
"N",
"o",
"R",
"o",
"o",
"t",
"D",
"i",
"r",
"e",
"c",
"t",
"o",
"r",
"y"
],
[
"R",
"e",
"m",
"o",
"v",
"a",
"b",
"l",
"e"
],
[
"F",
"i",
"x",
"e",
"d"
],
[
"N",
"e",
"t",
"w",
"o",
"r",
"k"
],
[
"C",
"D",
"R",
"o",
"m"
],
[
"R",
"a",
"m"
]
]
| Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community | Member name | https://www.diigo.com/profile/leloupbleu | 44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json |
9154a5bc_Profile_in_the_Diigo_Community__Member_name | [0] 1 [Description] The drive does not have a root directory. [Member name] | NoRootDirectory | [
[
"U",
"n",
"k",
"n",
"o",
"w",
"n"
],
[
"N",
"o",
"R",
"o",
"o",
"t",
"D",
"i",
"r",
"e",
"c",
"t",
"o",
"r",
"y"
],
[
"R",
"e",
"m",
"o",
"v",
"a",
"b",
"l",
"e"
],
[
"F",
"i",
"x",
"e",
"d"
],
[
"N",
"e",
"t",
"w",
"o",
"r",
"k"
],
[
"C",
"D",
"R",
"o",
"m"
],
[
"R",
"a",
"m"
]
]
| Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community | Member name | https://www.diigo.com/profile/leloupbleu | 44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json |
9154a5bc_Profile_in_the_Diigo_Community__Member_name | [0] 2 [Description] The drive is a removable storage device, such as a floppy disk drive or a USB flash drive. [Member name] | Removable | [
[
"U",
"n",
"k",
"n",
"o",
"w",
"n"
],
[
"N",
"o",
"R",
"o",
"o",
"t",
"D",
"i",
"r",
"e",
"c",
"t",
"o",
"r",
"y"
],
[
"R",
"e",
"m",
"o",
"v",
"a",
"b",
"l",
"e"
],
[
"F",
"i",
"x",
"e",
"d"
],
[
"N",
"e",
"t",
"w",
"o",
"r",
"k"
],
[
"C",
"D",
"R",
"o",
"m"
],
[
"R",
"a",
"m"
]
]
| Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community | Member name | https://www.diigo.com/profile/leloupbleu | 44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json |
9154a5bc_Profile_in_the_Diigo_Community__Member_name | [0] 3 [Description] The drive is a fixed disk. [Member name] | Fixed | [
[
"U",
"n",
"k",
"n",
"o",
"w",
"n"
],
[
"N",
"o",
"R",
"o",
"o",
"t",
"D",
"i",
"r",
"e",
"c",
"t",
"o",
"r",
"y"
],
[
"R",
"e",
"m",
"o",
"v",
"a",
"b",
"l",
"e"
],
[
"F",
"i",
"x",
"e",
"d"
],
[
"N",
"e",
"t",
"w",
"o",
"r",
"k"
],
[
"C",
"D",
"R",
"o",
"m"
],
[
"R",
"a",
"m"
]
]
| Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community | Member name | https://www.diigo.com/profile/leloupbleu | 44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json |
9154a5bc_Profile_in_the_Diigo_Community__Member_name | [0] 4 [Description] The drive is a network drive. [Member name] | Network | [
[
"U",
"n",
"k",
"n",
"o",
"w",
"n"
],
[
"N",
"o",
"R",
"o",
"o",
"t",
"D",
"i",
"r",
"e",
"c",
"t",
"o",
"r",
"y"
],
[
"R",
"e",
"m",
"o",
"v",
"a",
"b",
"l",
"e"
],
[
"F",
"i",
"x",
"e",
"d"
],
[
"N",
"e",
"t",
"w",
"o",
"r",
"k"
],
[
"C",
"D",
"R",
"o",
"m"
],
[
"R",
"a",
"m"
]
]
| Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community | Member name | https://www.diigo.com/profile/leloupbleu | 44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json |
9154a5bc_Profile_in_the_Diigo_Community__Member_name | [0] 5 [Description] The drive is an optical disc device, such as a CD or DVD-ROM. [Member name] | CDRom | [
[
"U",
"n",
"k",
"n",
"o",
"w",
"n"
],
[
"N",
"o",
"R",
"o",
"o",
"t",
"D",
"i",
"r",
"e",
"c",
"t",
"o",
"r",
"y"
],
[
"R",
"e",
"m",
"o",
"v",
"a",
"b",
"l",
"e"
],
[
"F",
"i",
"x",
"e",
"d"
],
[
"N",
"e",
"t",
"w",
"o",
"r",
"k"
],
[
"C",
"D",
"R",
"o",
"m"
],
[
"R",
"a",
"m"
]
]
| Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community | Member name | https://www.diigo.com/profile/leloupbleu | 44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json |
9154a5bc_Profile_in_the_Diigo_Community__Member_name | [0] 6 [Description] The drive is a RAM disk. [Member name] | Ram | [
[
"U",
"n",
"k",
"n",
"o",
"w",
"n"
],
[
"N",
"o",
"R",
"o",
"o",
"t",
"D",
"i",
"r",
"e",
"c",
"t",
"o",
"r",
"y"
],
[
"R",
"e",
"m",
"o",
"v",
"a",
"b",
"l",
"e"
],
[
"F",
"i",
"x",
"e",
"d"
],
[
"N",
"e",
"t",
"w",
"o",
"r",
"k"
],
[
"C",
"D",
"R",
"o",
"m"
],
[
"R",
"a",
"m"
]
]
| Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community | Member name | https://www.diigo.com/profile/leloupbleu | 44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Agnes Etherington Art Centre [About] | Featuring a range of contemporary and historical exhibitions and exciting public programs throughout the year. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Archives [About] | The University Archives manages, preserves, conserves, and makes the information assets of the University accessible. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Artist in Residence Program [About] | An annual professional residency in the Fine Art Programme. The residency is designed to provide students with unique access to mentorship from a celebrated artist, and gives the artist a chance to share his/her expertise. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] The Barefoot Players [About] | The Department of Drama's theatre troupe for young audiences. Made possible by the Queen's Summer Work Experience Program (SWEP), The Barefoot Players gain workplace experience creating, touring, and performing theatre for young audiences between May and August each year. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] CFRC 101.9 FM Radio [About] | Kingston’s only campus-community radio station offers not-for-profit, volunteer-powered media that fills the gap left by the mainstream. Offers diverse music and spoken word programming 24/7 over the air and online. Also provides free broadcast skills training and experience to members of the community. In operation since 1922. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Clark Hall Pub [About] | A service of the Engineering Society, Clark Hall Pub is the oldest bar on campus and the only fully student-owned and operated bar in Canada. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Conservatory of Music [About] | Offers a wide range of educational opportunities to the Queen's and Kingston community. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Grad Club [About] | One of the best campus venues for live music in the country. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Isabel Bader Centre for the Performing Arts [About] | The Isabel is a home for the creative arts at Queen’s and a hub of vibrant artistic study, creation and exhibition in our community. The learning experiences shaped by the Isabel will enhance our students’ skills and abilities for their work in the arts and beyond. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Queen's Musical Theatre [About] | A student-run organization that stages two musical productions per year along with holding events such as cabaret nights and training sessions. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Queen's Players [About] | Written and performed by a cast of 12 students, Queen’s Players has been described as a comedy/rock and roll troupe. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Queen's Pub [About] | A pub on campus, run by The AMS Pub Services (TAPS). | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] The Underground [About] | The University’s largest student bar, run by The AMS Pub Services (TAPS). Formerly known as Alfie's Nightclub. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Union Gallery [About] | Student-driven gallery that provides students with professional skills training; showcases university student artists, as well as professional artists with regional, national, and international profiles. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
1a11b29e_rtainment___Queen_s_University__About | [Name] Writer in Residence Program [About] | For one term each academic year, the Department of English welcomes a writer in residence to participate in literary events and to offer advice and mentorship to students involved in creative writing. | []
| Arts & Entertainment | Queen's University | About | http://[email protected]/live/entertainment | 44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] connectionEvent [Description] | Fired when the player initially connects to the channel. This does not imply that video playback has started | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] disconnectionEvent [Description] | Fired when the player gets disconnected from the channel. Does not usually happen unless your connection drops for instance | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] isLiveEvent [Description] | Fired when the channel goes on/off live status. You may use isLive after this has been fired to check whether the channel went live or just stopped being live. | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] playbackEvent [Description] | Fired when content playback actually starts, when the video starts playing | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] playbackCompleteEvent [Description] | Fired when a clip reaches it's end in on-demand mode or when the playback was stopped in live mode | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] errorEvent [Description] | Fired when an error occurs. The code attribute on the event will tell you what the error code is and the message attribute contains a short description of the issue | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] playClickedEvent [Description] | Fires when the overlay play button is clicked on the player | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] pauseClickedEvent [Description] | Fires when the overlay pause button is clicked on the player | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] mutedEvent [Description] | Fires when the player is muted | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
e34c1fc9_pers___Livestream___User_Guide__Description | [Event Type] unmutedEvent [Description] | Fires when the player is unmuted | []
| (Old) API for Flex Developers - Livestream » User Guide | Description | http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853 | 44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json |
1a787cc8_ur_Campus___Queen_s_University__Who | [Contact Office] Contact information for Undergraduate Admissions | Book a campus tour online [Who] | Prospective undergraduate students | []
| Visit & Tour Campus | Queen's University | Who | http://[email protected]/discover/visit | 44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json |
1a787cc8_ur_Campus___Queen_s_University__Who | [Contact Office] Contact information for School of Graduate Studies [Who] | Prospective graduate students | []
| Visit & Tour Campus | Queen's University | Who | http://[email protected]/discover/visit | 44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json |
1a787cc8_ur_Campus___Queen_s_University__Who | [Contact Office] Faculty Recruitment and Support site | [email protected] | 613-533-3167 [Who] | Prospective faculty/researchers | []
| Visit & Tour Campus | Queen's University | Who | http://[email protected]/discover/visit | 44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json |
1a787cc8_ur_Campus___Queen_s_University__Who | [Contact Office] Office of Advancement contact information [Who] | Alumni and donors | []
| Visit & Tour Campus | Queen's University | Who | http://[email protected]/discover/visit | 44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json |
1a787cc8_ur_Campus___Queen_s_University__Who | [Contact Office] Marketing and Communications contact information [Who] | Media | []
| Visit & Tour Campus | Queen's University | Who | http://[email protected]/discover/visit | 44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json |
1a787cc8_ur_Campus___Queen_s_University__Who | [Contact Office] Agnes Etherington Art Centre Museum of Health Care at Kingston Union Gallery [Who] | Everyone | []
| Visit & Tour Campus | Queen's University | Who | http://[email protected]/discover/visit | 44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json |
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description | [Rank] 31 [In] 0 [Out] 2 [Title and Description] | Movie Babes In Peril of RAPE! Famous Actresses Raped, Abused & Fucked. 2,000 Photos. Anna Nicole Smith, Drew Barrymore, Paris Hilton, Monica Bellucci, Salma Hayek +100's more. | []
| Free Rape Fantasy Pics, Stories, Videos Gang Rape Net | Title and Description | http://www.gangrape.net/rapetop/ | 44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json |
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description | [Rank] 32 [In] 0 [Out] 1 [Title and Description] | Primal fear When I go hunting my appearance in the mirror is really terrifying. All of my brutal videos collected here | []
| Free Rape Fantasy Pics, Stories, Videos Gang Rape Net | Title and Description | http://www.gangrape.net/rapetop/ | 44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json |
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description | [Rank] 33 [In] 0 [Out] 2 [Title and Description] | Death or Sin If she was someone else I could have been a normal human being... And now I take revenge on everyone who is like her | []
| Free Rape Fantasy Pics, Stories, Videos Gang Rape Net | Title and Description | http://www.gangrape.net/rapetop/ | 44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json |
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description | [Rank] 34 [In] 0 [Out] 1 [Title and Description] | Milf Seekers ,fuck a milf Pick a MILF from tousands and fuck her tonight. | []
| Free Rape Fantasy Pics, Stories, Videos Gang Rape Net | Title and Description | http://www.gangrape.net/rapetop/ | 44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json |
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description | [Rank] 35 [In] 0 [Out] 1 [Title and Description] | Fame Dolls y0ung and wild gir1s | []
| Free Rape Fantasy Pics, Stories, Videos Gang Rape Net | Title and Description | http://www.gangrape.net/rapetop/ | 44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json |
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description | [Rank] 36 [In] 0 [Out] 4 [Title and Description] | He rapes new girl every week, see photos You will cum to these photos as you ll see it | []
| Free Rape Fantasy Pics, Stories, Videos Gang Rape Net | Title and Description | http://www.gangrape.net/rapetop/ | 44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json |
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description | [Rank] 37 [In] 0 [Out] 2 [Title and Description] | World of Rape Group forcesex screaming fucking and more...more...more... | []
| Free Rape Fantasy Pics, Stories, Videos Gang Rape Net | Title and Description | http://www.gangrape.net/rapetop/ | 44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json |
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description | [Rank] 38 [In] 0 [Out] 2 [Title and Description] | Japaneses Force Fucking Free Samples Video samples of the most cruel and horrifying acts of forced sex with hot Asian girls | []
| Free Rape Fantasy Pics, Stories, Videos Gang Rape Net | Title and Description | http://www.gangrape.net/rapetop/ | 44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json |
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description | [Rank] 39 [In] 0 [Out] 3 [Title and Description] | Cruel-Cruel. Rape Me Film Me Cruel! Abducted Teens Raped For Fun by Evil Polititions and Actors! | []
| Free Rape Fantasy Pics, Stories, Videos Gang Rape Net | Title and Description | http://www.gangrape.net/rapetop/ | 44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.