Changes

2 bytes added ,  01:58, 10 May 2016
Line 50: Line 50:  
==Secondary Exploits==
 
==Secondary Exploits==
 
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own.
 
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own.
""Again, these exploits are only at best proven to work on 10.7.0-32!!! These may no longer function in 11.0.0-33!!!""
+
'''Again, these exploits are only at best proven to work on 10.7.0-32!!! These may no longer function in 11.0.0-33!!!'''
    
{| class="wikitable" border="1"
 
{| class="wikitable" border="1"