Changes

119 bytes added ,  01:54, 10 May 2016
m
Line 50: Line 50:  
==Secondary Exploits==
 
==Secondary Exploits==
 
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own.
 
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own.
 +
""Again, these exploits are only at best proven to work on 10.7.0-32!!! These may no longer function in 11.0.0-33!!!""
    
{| class="wikitable" border="1"
 
{| class="wikitable" border="1"