task
stringlengths
12
101
input
stringlengths
0
6.4k
output
stringlengths
1
6.03k
options
list
pageTitle
stringlengths
0
632
outputColName
stringlengths
1
710
url
stringlengths
15
288
wdcFile
stringlengths
66
75
5194eaa9_music_chart_for_November__1994__Song
[#] 23 [Artist] Spearhead [Album] Home [Song]
Positive
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 22 [Artist] Pizzicato Five [Album] Made In USA [Song]
Twiggy Twiggy
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 21 [Artist] Beck [Album] Mellow Gold [Song]
Beercan
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 20 [Artist] Portishead [Album] Dummy [Song]
Numb
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 19 [Artist] Dick Dale [Album] Unknown Territory [Song]
Scalped
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 18 [Artist] Sam Phillips [Album] Martinis & Bikinis [Song]
Strawberry Road
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 17 [Artist] Dag [Album] Righteous [Song]
Your Mama's Eyes
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 16 [Artist] Tindersticks [Album] Tindersticks [Song]
The Not Knowing
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 15 [Artist] Public Enemy [Album] Muse Sick-N-Hour Mess Age [Song]
Ain't Nuttin Butter Song
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 14 [Artist] Latin Playboys [Album] Latin Playboys [Song]
Ten Believers
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 13 [Artist] Built To Spill [Album] There's Nothing Wrong With Love [Song]
Big Dipper
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 12 [Artist] Mark Lanegan [Album] Whiskey For The Holy Ghost [Song]
Borracho
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 11 [Artist] Ted Hawkins [Album] The Next Hundred Years [Song]
The Good & The Bad
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 10 [Artist] Jeff Buckley [Album] Grace [Song]
So Real
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 9 [Artist] Beastie Boys [Album] Ill Communication [Song]
Sabotage
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 8 [Artist] Iris Dement [Album] My Life [Song]
Sweet Is The Melody
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 7 [Artist] Johnny Cash [Album] American Recordings [Song]
Man Who Wouldn't Cry
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 6 [Artist] Hector Zazou [Album] Sahara Blue [Song]
I'll Strangle You
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 5 [Artist] Lisa Germano [Album] Geek the Girl [Song]
A Psychopath
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 4 [Artist] Nirvana [Album] Unplugged In NY [Song]
Where Did You Sleep Last Night
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 3 [Artist] Sky Cries Mary [Album] This Timeless Turning [Song]
Shipwrecked
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 2 [Artist] MC Solaar [Album] Prose Combat [Song]
Nouveau Western
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
5194eaa9_music_chart_for_November__1994__Song
[#] 1 [Artist] G. Love & Special Sauce [Album] G. Love & Special Sauce [Song]
Baby's Got Sauce
[]
KEXP 90.3 FM - The KEXP Top90 music chart for November, 1994
Song
http://www.kexp.org/charts/top90/1994/11
44/1438042990445.44_20150728002310-00116-ip-10-236-191-2_540075273_3.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 07.16.2007 [Title] Zenturi ProgramChecker ActiveX Exploit [Vulnerabilty] CVE-2007-2987 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a vulnerability in the sasatl.dll control included in the Zenturi ProgramChecker ActiveX application. The exploit is triggered when the DebugMsgLog() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 07.16.2007 [Title] EnjoySAP ActiveX Exploit [Vulnerabilty] CVE-2007-3605 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a vulnerability in the kwedit.dll control included in the EnjoySAP application. The exploit is triggered when the PrepareToPostHTML() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 07.16.2007 [Title] NeoTrace ActiveX Exploit [Vulnerabilty] CVE-2006-6707 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a vulnerability in the NeoTraceExplorer ActiveX Control (NeoTraceExplorer.dll). The exploit is triggered when a long string argument is processed by the TraceTarget() method resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 07.12.2007 [Title] Asterisk T.38 buffer overflow exploit [Vulnerabilty] CVE-2007-2293 [Category] Exploits/Remote [Platform] Linux [Description]
This module exploits a buffer overflow vulnerability in the T38FaxRateManagement parameter when parsing SIP/SDP requests in 1.4.x prior to 1.4.3. After successful exploitation a agent will be installed. The process being exploited is usually run as root.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 07.12.2007 [Title] mDNSResponder buffer overflow exploit [Vulnerabilty] CVE-2007-2386 [Category] Exploits/Remote [Platform] Mac OS X [Description]
This module exploits a buffer overflow vulnerability in the mDNSResponder service running on certain versions of Apple Mac OS X. The vulnerability is exploited remotely by sending a specially crafted UPnP Internet Gateway Device (IGD) packet and installing an agent.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 07.02.2007 [Title] TrueCrypt Privilege Escalation Exploit [Vulnerabilty] CVE-2007-1738 [Category] Exploits/Local [Platform] Linux [Description]
This module exploits a vulnerability in TrueCrypt 4.x when the software is installed with setuid root. An attacker can exploit this vulnerability to obtain root privileges. This exploit mounts a temporary, especially crafted TrueCrypt volume in the /lib/tls directory and executes a setuid application to bypass security controls and execute an agent as root.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 07.01.2007 [Title] Symantec Discovery XFERWAN Buffer Overflow Exploit [Vulnerabilty] CVE-2007-1173 [Category] Exploits/Remote [Platform] Windows [Description]
This module exploits a stack-based buffer overflow vulnerability in the XferWan.exe component included with Symantec Discovery 6.5. The exploit sends a specially crafted TCP packet triggering a buffer overflow and installing an agent on the target system.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.28.2007 [Title] Sun Java Web SOCKS Proxy Authentication Exploit [Vulnerabilty] CVE-2007-2881 [Category] Exploits/Remote [Platform] Linux [Description]
This module exploits a stack-based buffer overflow vulnerability in the SOCKS proxy included in the Sun Java Web Proxy Server. The exploit sends specially crafted packets during the SOCKS connection negotiation and installs an agent if successful.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.27.2007 [Title] Apple QuickTime Java toQTPointer() code execution exploit update [Vulnerabilty] CVE-2007-2175 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a memory corruption vulnerability in the Java QuickTime for Java (QtJava.dll) browser plug-in. The module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user(s) to connect to it with a Java-enabled browser using the vulnerable plug-in. When a user connects to the site they trigger the exploit and the module attempts to install an agent on their computer. This update adds support for Safari browser in Mac OS X (i386) and adds Opera support in Windows.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.21.2007 [Title] MSRPC Samba Command Injection exploit update [Vulnerabilty] CVE-2007-2447 [Category] Exploits/Remote [Platform] Linux, OpenBSD, FreeBSD, Mac OS X [Description]
This update adds support for Debian, Ubuntu, and Mac OS-X 10.4. This module exploits a command injection vulnerability in the function _AddPrinterW in Samba 3, reached through an AddPrinter remote request.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.20.2007 [Title] McAfee Subscription Manager ActiveX Exploit [Vulnerabilty] CVE-2007-2584 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a buffer overflow vulnerability in the McAfee Subscription Manager (MCSUBMGR.DLL) ActiveX control. The exploit is triggered when the IsOldAppInstalled () method processes an overly long string argument allowing remote attackers to execute arbitrary code. This client-side exploit is dependent on a user visiting a malicious web-site hosted by CORE IMPACT to distribute the exploit and install an agent.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.19.2007 [Title] ActSoft DVD Tools Buffer Overflow Exploit [Vulnerabilty] CVE-2007-0976 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a vulnerability in the dvdtools.ocx control included in the ActSoft DVD Tools ActiveX application. The exploit is triggered when the OpenDVD() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.18.2007 [Title] MSRPC Trend Micro Server Protect buffer overflow exploit [Vulnerabilty] CVE-2007-2508 [Category] Exploits/Remote [Platform] Windows [Description]
TrendMicro ServerProtect is prone to a buffer overflow vulnerability on the rpc interface that could permit the execution of arbitrary remote code.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.18.2007 [Title] NCTAudioFile2 ActiveX Buffer Overflow Exploit [Vulnerabilty] CVE-2007-0018 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a vulnerability in the NCTAudioFile2.AudioFile ActiveX Control (NCTAudioFile2.dll) used by various multimedia applications. The exploit is triggered when a long string argument is processed by the SetFormatLikeSample() method resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.14.2007 [Title] Symantec Norton Internet Security 2004 ActiveX Control Buffer Overflow Exploit [Vulnerabilty] CVE-2007-1689 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a buffer overflow in Norton Internet Security 2004, via a bug in ISLAert.dll, an ActiveX control installed by default.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.14.2007 [Title] Yahoo Messenger Webcam ActiveX Exploit Update [Vulnerabilty] CVE-2007-3148 [Category] Exploits/Client Side [Platform] Windows [Description]
This update adds support for Windows Vista. This module exploits a vulnerability in the Yahoo Messenger Webcam 8.1 ActiveX Control (ywcvwr.dll). When the Receive() method processes a long string argument, a stack based buffer overflow occurs allowing execution of arbitrary code. This exploit is triggered when an unsuspecting user is lured into visiting a malicious web-site hosted by CORE IMPACT.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.13.2007 [Title] Samba lsa_io_trans_names buffer overflow exploit [Vulnerabilty] CVE-2007-2446 [Category] Exploits/Remote [Platform] Solaris, Linux [Description]
This module exploits a buffer overflow vulnerability when parsing RPC requests through the LSA RPC interface in Samba 3.x. The exploit is triggered by sending a specially crafted RPC LsarLookupSids request to a vulnerable computer.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.13.2007 [Title] Microsoft Speech API ActiveX control Exploit [Vulnerabilty] CVE-2007-2222 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a vulnerability in XVoice.dll included in the Microsoft Text to Speech Control. The exploit is triggered when the FindEngine() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.12.2007 [Title] Apache Tomcat buffer overflow exploit [Vulnerabilty] CVE-2007-0774 [Category] Exploits/Remote [Platform] Linux [Description]
This module exploits a buffer overflow vulnerability in the Apache Tomcat JK Web Server Connector and installs an agent. An attacker can use an overly long URL to trigger a buffer overflow in the URL work map routine (map_uri_to_worker()) in the mod_jk.so library, resulting in the compromise of the target system.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.12.2007 [Title] Apple QuickTime Java toQTPointer() code execution exploit [Vulnerabilty] CVE-2007-2175 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a memory corruption vulnerability in the Java QuickTime for Java (QtJava.dll) browser plug-in. The module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user(s) to connect to it with a Java-enabled browser using the vulnerable plug-in. When a user connects to the site they trigger the exploit and the module attempts to install an agent on their computer.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.11.2007 [Title] Microsoft Windows GDI Kernel Local Privilege Escalation Exploit [Vulnerabilty] CVE-2006-5758 [Category] Exploits/Local [Platform] Windows [Description]
This module exploits a vulnerability in the way that Microsoft Windows manages GDI kernel structures in shared memory. An attacker could remap a global shared memory section that is defined to be read-only to read-write allowing them to execute arbitrary code and gain additional privileges on the target system.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.10.2007 [Title] Yahoo Messenger Webcam ActiveX Exploit [Vulnerabilty] CVE-2007-3148 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a vulnerability in the Yahoo Messenger Webcam 8.1 ActiveX Control (ywcvwr.dll). When the Receive() method processes a long string argument, a stack based buffer overflow occurs allowing execution of arbitrary code. This exploit is triggered when an unsuspecting user is lured into visiting a malicious web-site hosted by CORE IMPACT.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.06.2007 [Title] LANDesk Management Suite Alert Service Exploit [Vulnerabilty] CVE-2007-1674 [Category] Exploits/Remote [Platform] Windows [Description]
This module exploits a buffer overflow vulnerability in the Alert Service (aolnsrvr.exe) component of LANDesk Management Suite 8.7 and installs an agent if successful. This vulnerability can be exploited remotely by sending a specially crafted packet to port UDP/65535.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.04.2007 [Title] GNOME Evince PostScript Exploit [Vulnerabilty] CVE-2006-5864 [Category] Exploits/Client Side [Platform] Linux [Description]
This module exploits a stack-based buffer overflow vulnerability in the PostScript processor included in GNOME Evince. The vulnerability is caused by the get_next_text() function not properly validating overly long fields in a PostScript file. The exploit is triggered when an unsuspecting user opens a specially crafted file distributed via an email.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 06.03.2007 [Title] SNORT SMB Fragmentation Buffer Overflow exploit [Vulnerabilty] CVE-2006-5276 [Category] Exploits/Remote [Platform] Linux, FreeBSD [Description]
This module exploits a stack buffer overflow vulnerability in the Sourcefire Snort DCE/RPC preprocessor. An unauthenticated, remote attacker can exploit this vulnerability to execute arbitrary code with the privileges of the Snort process.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 05.29.2007 [Title] Symantec Rtvscan buffer overflow exploit [Vulnerabilty] CVE-2006-2630 [Category] Exploits/Remote [Platform] Windows [Description]
This module exploits a buffer overflow vulnerability in Symantec Client Security 3.x and Symantec Antivirus Corporate Edition 10.x that allows a remote un-authenticated attacker to compromise the target system and obtain system privileges.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 05.03.2007 [Title] CA BrightStor ARCserve Backup mediasvr.exe Exploit [Vulnerabilty] CVE-2007-1785 [Category] Exploits/Remote [Platform] Windows [Description]
This module exploits a buffer overflow vulnerability in the CA BrightStor ARCserve Backup mediasvr.exe. The vulnerability is caused by an input validation error in the mediasvr.exe component when it processes specially crafted RPC requests.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 04.19.2007 [Title] IBM Lotus Domino IMAP Server Buffer Overflow Exploit [Vulnerabilty] CVE-2007-1675 [Category] Exploits/Remote [Platform] Windows, AIX [Description]
This module exploits a buffer overflow vulnerability in a Lotus Domino IMAP Server and installs an agent if successful. This vulnerability can be exploited remotely and it does not require user authentication.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 04.16.2007 [Title] MSRPC DNS Server exploit [Vulnerabilty] CVE-2007-1748 [Category] Exploits/Remote [Platform] Windows [Description]
This module exploits a buffer overflow in the DNS Server via a specially crafted RPC request.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
f36a3a4a_curity_Updates___Core_Security__Description
[Released Date] 04.15.2007 [Title] Microsoft Outlook MS07-003 Exploit [Vulnerabilty] CVE-2007-0034 [Category] Exploits/Client Side [Platform] Windows [Description]
This module exploits a buffer overflow vulnerability in the Advanced Search (Finder.exe) feature of Microsoft Outlook (MS07-003). A remote attacker can compromise the vulnerable system by luring unsuspecting users into opening a specially crafted Outlook Saved Searches (OSS) file.
[]
Core Impact Pro Exploits and Security Updates | Core Security
Description
http://www.coresecurity.com/products/core-impact/recent-exploits-and-updates?title=&field_exploit_type_tid=All&field_vulnerabilty_id_value=&field_operating_system_tid=All&page=63
44/1438042990445.44_20150728002310-00338-ip-10-236-191-2_386337740_0.json
9154a5bc_Profile_in_the_Diigo_Community__Member_name
[0] 0 [Description] The type of drive is unknown. [Member name]
Unknown
[ [ "U", "n", "k", "n", "o", "w", "n" ], [ "N", "o", "R", "o", "o", "t", "D", "i", "r", "e", "c", "t", "o", "r", "y" ], [ "R", "e", "m", "o", "v", "a", "b", "l", "e" ], [ "F", "i", "x", "e", "d" ], [ "N", "e", "t", "w", "o", "r", "k" ], [ "C", "D", "R", "o", "m" ], [ "R", "a", "m" ] ]
Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community
Member name
https://www.diigo.com/profile/leloupbleu
44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json
9154a5bc_Profile_in_the_Diigo_Community__Member_name
[0] 1 [Description] The drive does not have a root directory. [Member name]
NoRootDirectory
[ [ "U", "n", "k", "n", "o", "w", "n" ], [ "N", "o", "R", "o", "o", "t", "D", "i", "r", "e", "c", "t", "o", "r", "y" ], [ "R", "e", "m", "o", "v", "a", "b", "l", "e" ], [ "F", "i", "x", "e", "d" ], [ "N", "e", "t", "w", "o", "r", "k" ], [ "C", "D", "R", "o", "m" ], [ "R", "a", "m" ] ]
Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community
Member name
https://www.diigo.com/profile/leloupbleu
44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json
9154a5bc_Profile_in_the_Diigo_Community__Member_name
[0] 2 [Description] The drive is a removable storage device, such as a floppy disk drive or a USB flash drive. [Member name]
Removable
[ [ "U", "n", "k", "n", "o", "w", "n" ], [ "N", "o", "R", "o", "o", "t", "D", "i", "r", "e", "c", "t", "o", "r", "y" ], [ "R", "e", "m", "o", "v", "a", "b", "l", "e" ], [ "F", "i", "x", "e", "d" ], [ "N", "e", "t", "w", "o", "r", "k" ], [ "C", "D", "R", "o", "m" ], [ "R", "a", "m" ] ]
Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community
Member name
https://www.diigo.com/profile/leloupbleu
44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json
9154a5bc_Profile_in_the_Diigo_Community__Member_name
[0] 3 [Description] The drive is a fixed disk. [Member name]
Fixed
[ [ "U", "n", "k", "n", "o", "w", "n" ], [ "N", "o", "R", "o", "o", "t", "D", "i", "r", "e", "c", "t", "o", "r", "y" ], [ "R", "e", "m", "o", "v", "a", "b", "l", "e" ], [ "F", "i", "x", "e", "d" ], [ "N", "e", "t", "w", "o", "r", "k" ], [ "C", "D", "R", "o", "m" ], [ "R", "a", "m" ] ]
Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community
Member name
https://www.diigo.com/profile/leloupbleu
44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json
9154a5bc_Profile_in_the_Diigo_Community__Member_name
[0] 4 [Description] The drive is a network drive. [Member name]
Network
[ [ "U", "n", "k", "n", "o", "w", "n" ], [ "N", "o", "R", "o", "o", "t", "D", "i", "r", "e", "c", "t", "o", "r", "y" ], [ "R", "e", "m", "o", "v", "a", "b", "l", "e" ], [ "F", "i", "x", "e", "d" ], [ "N", "e", "t", "w", "o", "r", "k" ], [ "C", "D", "R", "o", "m" ], [ "R", "a", "m" ] ]
Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community
Member name
https://www.diigo.com/profile/leloupbleu
44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json
9154a5bc_Profile_in_the_Diigo_Community__Member_name
[0] 5 [Description] The drive is an optical disc device, such as a CD or DVD-ROM. [Member name]
CDRom
[ [ "U", "n", "k", "n", "o", "w", "n" ], [ "N", "o", "R", "o", "o", "t", "D", "i", "r", "e", "c", "t", "o", "r", "y" ], [ "R", "e", "m", "o", "v", "a", "b", "l", "e" ], [ "F", "i", "x", "e", "d" ], [ "N", "e", "t", "w", "o", "r", "k" ], [ "C", "D", "R", "o", "m" ], [ "R", "a", "m" ] ]
Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community
Member name
https://www.diigo.com/profile/leloupbleu
44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json
9154a5bc_Profile_in_the_Diigo_Community__Member_name
[0] 6 [Description] The drive is a RAM disk. [Member name]
Ram
[ [ "U", "n", "k", "n", "o", "w", "n" ], [ "N", "o", "R", "o", "o", "t", "D", "i", "r", "e", "c", "t", "o", "r", "y" ], [ "R", "e", "m", "o", "v", "a", "b", "l", "e" ], [ "F", "i", "x", "e", "d" ], [ "N", "e", "t", "w", "o", "r", "k" ], [ "C", "D", "R", "o", "m" ], [ "R", "a", "m" ] ]
Stéphane-Gabriel Mérizzi (leloupbleu)'s Public Profile in the Diigo Community
Member name
https://www.diigo.com/profile/leloupbleu
44/1438042990445.44_20150728002310-00126-ip-10-236-191-2_915308029_9.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Agnes Etherington Art Centre [About]
Featuring a range of contemporary and historical exhibitions and exciting public programs throughout the year.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Archives [About]
The University Archives manages, preserves, conserves, and makes the information assets of the University accessible.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Artist in Residence Program [About]
An annual professional residency in the Fine Art Programme. The residency is designed to provide students with unique access to mentorship from a celebrated artist, and gives the artist a chance to share his/her expertise.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] The Barefoot Players [About]
The Department of Drama's theatre troupe for young audiences. Made possible by the Queen's Summer Work Experience Program (SWEP), The Barefoot Players gain workplace experience creating, touring, and performing theatre for young audiences between May and August each year.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] CFRC 101.9 FM Radio [About]
Kingston’s only campus-community radio station offers not-for-profit, volunteer-powered media that fills the gap left by the mainstream. Offers diverse music and spoken word programming 24/7 over the air and online. Also provides free broadcast skills training and experience to members of the community. In operation since 1922.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Clark Hall Pub [About]
A service of the Engineering Society, Clark Hall Pub is the oldest bar on campus and the only fully student-owned and operated bar in Canada.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Conservatory of Music [About]
Offers a wide range of educational opportunities to the Queen's and Kingston community.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Grad Club [About]
One of the best campus venues for live music in the country.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Isabel Bader Centre for the Performing Arts [About]
The Isabel is a home for the creative arts at Queen’s and a hub of vibrant artistic study, creation and exhibition in our community. The learning experiences shaped by the Isabel will enhance our students’ skills and abilities for their work in the arts and beyond.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Queen's Musical Theatre [About]
A student-run organization that stages two musical productions per year along with holding events such as cabaret nights and training sessions.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Queen's Players [About]
Written and performed by a cast of 12 students, Queen’s Players has been described as a comedy/rock and roll troupe.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Queen's Pub [About]
A pub on campus, run by The AMS Pub Services (TAPS).
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] The Underground [About]
The University’s largest student bar, run by The AMS Pub Services (TAPS). Formerly known as Alfie's Nightclub.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Union Gallery [About]
Student-driven gallery that provides students with professional skills training; showcases university student artists, as well as professional artists with regional, national, and international profiles.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
1a11b29e_rtainment___Queen_s_University__About
[Name] Writer in Residence Program [About]
For one term each academic year, the Department of English welcomes a writer in residence to participate in literary events and to offer advice and mentorship to students involved in creative writing.
[]
Arts & Entertainment | Queen's University
About
http://[email protected]/live/entertainment
44/1438042981525.10_20150728002301-00137-ip-10-236-191-2_253542789_0.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] connectionEvent [Description]
Fired when the player initially connects to the channel. This does not imply that video playback has started
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] disconnectionEvent [Description]
Fired when the player gets disconnected from the channel. Does not usually happen unless your connection drops for instance
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] isLiveEvent [Description]
Fired when the channel goes on/off live status. You may use isLive after this has been fired to check whether the channel went live or just stopped being live.
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] playbackEvent [Description]
Fired when content playback actually starts, when the video starts playing
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] playbackCompleteEvent [Description]
Fired when a clip reaches it's end in on-demand mode or when the playback was stopped in live mode
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] errorEvent [Description]
Fired when an error occurs. The code attribute on the event will tell you what the error code is and the message attribute contains a short description of the issue
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] playClickedEvent [Description]
Fires when the overlay play button is clicked on the player
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] pauseClickedEvent [Description]
Fires when the overlay pause button is clicked on the player
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] mutedEvent [Description]
Fires when the player is muted
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
e34c1fc9_pers___Livestream___User_Guide__Description
[Event Type] unmutedEvent [Description]
Fires when the player is unmuted
[]
(Old) API for Flex Developers - Livestream » User Guide
Description
http://original.livestream.com/userguide/index.php?title=(Old)_API_for_Flex_Developers&oldid=5853
44/1438042990445.44_20150728002310-00110-ip-10-236-191-2_188949403_1.json
1a787cc8_ur_Campus___Queen_s_University__Who
[Contact Office] Contact information for Undergraduate Admissions | Book a campus tour online [Who]
Prospective undergraduate students
[]
Visit & Tour Campus | Queen's University
Who
http://[email protected]/discover/visit
44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json
1a787cc8_ur_Campus___Queen_s_University__Who
[Contact Office] Contact information for School of Graduate Studies [Who]
Prospective graduate students
[]
Visit & Tour Campus | Queen's University
Who
http://[email protected]/discover/visit
44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json
1a787cc8_ur_Campus___Queen_s_University__Who
[Contact Office] Faculty Recruitment and Support site | [email protected] | 613-533-3167 [Who]
Prospective faculty/researchers
[]
Visit & Tour Campus | Queen's University
Who
http://[email protected]/discover/visit
44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json
1a787cc8_ur_Campus___Queen_s_University__Who
[Contact Office] Office of Advancement contact information [Who]
Alumni and donors
[]
Visit & Tour Campus | Queen's University
Who
http://[email protected]/discover/visit
44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json
1a787cc8_ur_Campus___Queen_s_University__Who
[Contact Office] Marketing and Communications contact information [Who]
Media
[]
Visit & Tour Campus | Queen's University
Who
http://[email protected]/discover/visit
44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json
1a787cc8_ur_Campus___Queen_s_University__Who
[Contact Office] Agnes Etherington Art Centre Museum of Health Care at Kingston Union Gallery [Who]
Everyone
[]
Visit & Tour Campus | Queen's University
Who
http://[email protected]/discover/visit
44/1438042981525.10_20150728002301-00006-ip-10-236-191-2_187475437_1.json
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description
[Rank] 31 [In] 0 [Out] 2 [Title and Description]
Movie Babes In Peril of RAPE! Famous Actresses Raped, Abused & Fucked. 2,000 Photos. Anna Nicole Smith, Drew Barrymore, Paris Hilton, Monica Bellucci, Salma Hayek +100's more.
[]
Free Rape Fantasy Pics, Stories, Videos Gang Rape Net
Title and Description
http://www.gangrape.net/rapetop/
44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description
[Rank] 32 [In] 0 [Out] 1 [Title and Description]
Primal fear When I go hunting my appearance in the mirror is really terrifying. All of my brutal videos collected here
[]
Free Rape Fantasy Pics, Stories, Videos Gang Rape Net
Title and Description
http://www.gangrape.net/rapetop/
44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description
[Rank] 33 [In] 0 [Out] 2 [Title and Description]
Death or Sin If she was someone else I could have been a normal human being... And now I take revenge on everyone who is like her
[]
Free Rape Fantasy Pics, Stories, Videos Gang Rape Net
Title and Description
http://www.gangrape.net/rapetop/
44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description
[Rank] 34 [In] 0 [Out] 1 [Title and Description]
Milf Seekers ,fuck a milf Pick a MILF from tousands and fuck her tonight.
[]
Free Rape Fantasy Pics, Stories, Videos Gang Rape Net
Title and Description
http://www.gangrape.net/rapetop/
44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description
[Rank] 35 [In] 0 [Out] 1 [Title and Description]
Fame Dolls y0ung and wild gir1s
[]
Free Rape Fantasy Pics, Stories, Videos Gang Rape Net
Title and Description
http://www.gangrape.net/rapetop/
44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description
[Rank] 36 [In] 0 [Out] 4 [Title and Description]
He rapes new girl every week, see photos You will cum to these photos as you ll see it
[]
Free Rape Fantasy Pics, Stories, Videos Gang Rape Net
Title and Description
http://www.gangrape.net/rapetop/
44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description
[Rank] 37 [In] 0 [Out] 2 [Title and Description]
World of Rape Group forcesex screaming fucking and more...more...more...
[]
Free Rape Fantasy Pics, Stories, Videos Gang Rape Net
Title and Description
http://www.gangrape.net/rapetop/
44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description
[Rank] 38 [In] 0 [Out] 2 [Title and Description]
Japaneses Force Fucking Free Samples Video samples of the most cruel and horrifying acts of forced sex with hot Asian girls
[]
Free Rape Fantasy Pics, Stories, Videos Gang Rape Net
Title and Description
http://www.gangrape.net/rapetop/
44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json
76c7610f__Stories__Videos_Gang_Rape_Net__Title_and_Description
[Rank] 39 [In] 0 [Out] 3 [Title and Description]
Cruel-Cruel. Rape Me Film Me Cruel! Abducted Teens Raped For Fun by Evil Polititions and Actors!
[]
Free Rape Fantasy Pics, Stories, Videos Gang Rape Net
Title and Description
http://www.gangrape.net/rapetop/
44/1438042990445.44_20150728002310-00106-ip-10-236-191-2_458158564_5.json