(DOC) 1 Million Serial Numbers of Different Softwares | рол ролов - Academia.edu

1st Directory Email Spider 2002 1.18 crack serial keygen

1st Directory Email Spider 2002 1.18 crack serial keygen

A-Patch para Yahoo Messenger Advanced Email Extractor 2.84 Atualização de segurança do Outlook 2002: KB921594. ]activate microsoft office 2016 product key free download game free downloadkolor autopano giga 4.4.1 serial free downloadlemmings game. Serial.txt.html 1 0.00% 7 0.00% /gallery/images/3DS-MAX-8-plugins.html 1 0.00% 7 /gallery/images/Civilization-II-activation-code-email-address.html 1.

1st Directory Email Spider 2002 1.18 crack serial keygen - amusing

डॉ.अंकुश चोरमुले, प्रबंधक, होय आम्ही शेतकरी समूह.

फॉल आर्मीवर्म- लष्करी अळी (स्पोडोप्टेरा फ्रुगीपर्डा) ही अमेरिकेतील मका पिकावर उपजीविका  करणारी कीड असून जून २०१८ मध्ये तिचा भारतात सर्वप्रथम प्रादुर्भाव दिसून आला. या किडीमुळे मागील खरीप व रब्बी हंगामात मका पिकाचे मोठ्या प्रमाणात नुकसान झाले आहे.  मागील वर्षी असणारी पाण्याची कमतरता तसेच लष्करी अळीचा प्रादुर्भाव यामुळे मक्‍याच्या दरात कायम तेजी पहावयास मिळाली. सध्या खरीप तोंडावर येऊन ठेपला असताना येत्या हंगामात देखील या किडीमुळे मका पिकाचे नुकसान होण्याची दाट शक्यता आहे. या किडीच्या व्यवस्थापनासाठी एकात्मिक कीड नियंत्रणाचे उपाय करणे गरजेचे आहे

किडीचा जीवनक्रम 

लष्करी अळीचा  जीवनक्रम अंडी,अळी,कोष व पतंग या चार अवस्थेमधून पूर्ण होतो 

अंडी अवस्था – मादी पतंग पानाच्या वरच्या व खालच्या बाजूला तसेच पोंग्यामध्ये जवळपास एक हजार अंडी घालते. अंडी पुंजक्यामध्ये घातली जातात व त्यावर लोकरीसारखे आवरण असते. अंड्यांचा रंग पिवळट सोनेरी असून ती घुमटाच्या आकाराची असतात. अंडी अवस्था २  ते ३ दिवसाची असते.

अळी अवस्था – अळी अवस्था ही जवळपास सहा अवस्थेमधून पूर्ण होते. अंड्यातून बाहेर पडणाऱ्या  अळ्या अन्नाच्या शोधात विखुरल्या जातात. प्रथम अवस्थेतील लहान अळ्या रंगाने हिरव्या असून त्यांचे डोके काळ्या  रंगाचे असते.  दुसऱ्या अवस्थेमध्ये अळीने  प्रवेश केल्यानंतर तिचे डोके तपकिरी रंगाचे होते.  तिसऱ्या अवस्थेमध्ये अळीचा रंग तपकिरी होतो. तिच्या अंगावर वरच्या बाजूने तीन पांढऱ्या रेषा दिसू लागतात.  चौथ्या ते सहाव्या अवस्थेत अळीच्या शरीरावर उंचवट्याचा सारखे ठिपके दिसू लागतात. अळी १४ ते १९ दिवसांमध्ये पूर्ण होते.

कोष- पुर्ण वाढ झालेली अळी २ ते ८ सेंटिमीटर जमिनीत जाऊन मातीचे वेस्टन करुन त्यात कोषावस्थेत जाते. कोष लालसर तपकिरी रंगाचा असतो. कोषावस्था ९ ते १२ दिवसात पूर्ण होते. 

पतंग 

नर पतंग राखाडी ते तपकिरी रंगाचा असून त्याच्या पुढील पंखाच्या वरच्या कडेला त्रिकोणी आकारात पांढरा ठिपका  व पंखाच्या मध्यभागी गोल ठिपका दिसून येतो. मादी पतंगाचे पुढचे पंख राखाडी रंगाचे असून ते एकाच रंगाचे असतात.  नर आणि मादी मध्ये मागील पंख सोनेरी पांढऱ्या रंगाचे असतात. पतंग अवस्था चार ते सहा दिवसांची असते.

लष्करी आळीचा जीवनक्रम ३२ ते ४६ दिवसांमध्ये पूर्ण होतो

लष्करी अळी ओळखण्याची खुण

१.अळीच्या  डोक्याच्या पुढच्या बाजूस उलट इंग्रजी  ‘Y’ आकाराची खूण असते.

२.अळीच्या आठव्या बॉडी सेगमेंट वर चौकोनी आकारात चार ठिपके दिसुन येतात. त्या चार ठिपक्‍यात केस देखील आढळून येतात. अळीच्या  शरीरावर इतरत्र कुठेही अशी ठेवण दिसत नाही. 

चौकट 

लष्करी अळीचे लक्षणावरती आधारित व्यवस्थापन करणे गरजेचे आहे.  त्याची दोन कारणं आहेत १.पिकावर वाढणारी लक्षणे अळीची वाढ दर्शवतात. २.  त्याचबरोबर अळीची वाढीची अवस्था कोणते कीटकनाशक अथवा नियंत्रणाचे उपाय योजावेत हे ठरवते

नुकसानीचा प्रकार 

रोपावस्थेतील मका पिकाच्या पानांवर सुरुवातीची लक्षणे दिसून येतात. पहिल्या व दुसऱ्या अवस्थेतील अळ्या पाने खरवडून खातात त्यामुळे पानावर पांढरे लांबट चट्टे दिसून येतात.  लहान रोपावर जर अशी लक्षणे दिसत असल्यास पिकावर लष्करी अळीचा प्रादुर्भाव आहे असे समजावे व नियंत्रणाचे उपाय योजावेत. जेव्हा अळी तिसऱ्या अवस्थेत प्रवेश करते त्यावेळी ती पोंग्यामध्ये  प्रवेश करून पाने खाण्यास सुरुवात करते. या अवस्थेत पानावर छिद्रे दिसून येतात. अळीने पाचव्या अवस्थेत प्रवेश केल्यानंतर ती पोंग्यामध्ये राहून पाने खाते त्यामुळे पानावर मोठी छिद्रे दिसून येतात. सहाव्या अवस्थेतील अळी आधाशीपने पाने खाऊन पोंग्यामध्ये  मोठ्या प्रमाणात विष्टा टाकते या अवस्थेत मक्‍याची पाने झडल्यासारखी  दिसून येतात. तुरा आणि कणीस  भरण्याच्या अवस्थेत कणीस जर लष्करी अळीचा  प्रादुर्भाव झाला तर अशावेळी आर्थिक नुकसान होते.  अळी मक्याच्या कणसात प्रवेश करून दाण्यावर उपजीविका करते. मधु मका या किडीला जास्त प्रमाणात बळी पडतो. अळीने प्रादुर्भावित कणीस खाण्यायोग्य राहत नाही. 

शेतात किडीचे निरीक्षण कसे करावे

 शेताला रोजच्या रोज भेट देऊन पिकाचे निरीक्षण करावे. सुरुवातीच्या काळात दिसणारी लक्षणे ओळखून व्यवस्थापनाचे उपाय योजावेत. निरीक्षण करतेवेळी शेताच्या बाहेरील बाजूच्या तीन ते चार ओळी सोडून शेतातून इंग्रजी डब्ल्यू “W” आकारात चालावे. चालताना डब्ल्यू आकारातील पहिल्या ओळीतील पाच झाडे निवडावीत अशाप्रकारे डब्ल्यू आकारातील प्रत्येक ओळीतील पाच अशी वीस झाडे निवडावीत. या वीस निरीक्षण केलेल्या झाडांपैकी किती झाडावर प्रादुर्भाव आहे याची नोंद घ्यावी .

उदा . समजा २० झाडांपैकी २ झाडे लष्करी अळीमुळे प्रादुर्भावित असतील  तर नुकसान पातळी १० टक्के आहे असे समजावे. जर पीक रोपावस्थेत अथवा मध्य वाढीच्या अवस्थेत असेल तर नियंत्रणाचे उपाय योजने गरजेचे आहे.शेताचे निरीक्षण रोपावस्थे पासून सुरू करावे व आठवड्यातून एकदा शेताचे निरीक्षण करावे

पिकाच्या वाढीच्या अवस्थेनुसार आर्थिक नुकसान संकेत पातळी

१. रोपावस्था ते सुरुवातीची पोंगा अवस्था  (उगवाणी नंतर दोन आठवड्यापर्यंत) :- तीन पतंग प्रति सापळा किंवा ५ टक्के प्रादुर्भावित झाडे
2. सुरुवातीची पोंगा अवस्था ते मध्य पोंगा अवस्था  (उगवणीनंतर दोन ते चार आठवडे) :- ५ ते १० टक्के प्रादुर्भावित झाडे 
3. मध्य पोंगा अवस्था ते उशिराची पोंगा अवस्था (उगवणीनंतर ४ ते ७ आठवडे):- १० ते २० टक्के प्रादुर्भावित झाडे
4. उशिराची पोंगा  अवस्था (उगवणीनंतर सात आठवड्यापुढे);-  २० % पेक्षा जास्त प्रादुर्भावित झाडे५. तुरा लागण्याची अवस्था ते पीक काढणी:-  १० टक्‍क्‍यांपेक्षा जास्त कणसाचे नुकसान

लष्करी अळीचे एकात्मिक व्यवस्थापन 

  1. पाऊस पडण्याआधी शेताची खोलवर नांगरट करून घ्यावी. खोल नांगरटीमुळे किडींची कोषावस्था प्रखर सूर्यप्रकाशाच्या तसेच कीटक खाणाऱ्या पक्ष्यांच्या संपर्कात येऊन मरून जातात. 
  2. पिकांची फेरपालट करावी. मका घेतलेल्या शेतात त्यानंतर भुईमूग अथवा सूर्यफूल पिकाची लागवड करावी.
  3. ज्या भागात मका लागवड केली जाते अशा भागात मक्‍याची लागवड एकाच वेळेस करावी. जूनमध्ये पाऊस पडल्यानंतर मक्याची लागवड करावी. मक्याची उशीरा पेरणी टाळावी. एकाच वेळी पेरणी केल्यामुळे एका प्रदेशातील मका एकाच वेळी वाढतो व किडीला प्रत्येक वाढीच्या अवस्थेतील मका उपलब्ध होत नाही.
  4. मक्‍याची पेरणी करताना त्यामध्ये आंतरपीक घेऊन पिकांची विविधता साधावी. त्यामध्ये कडधान्य पिकांचा वापर करावा. उदा.  मका+ तूर,उडीद, मूग
  5. मक्याच्या बाजूने नेपिअर गवताची लागवड करावी. नेपियर चा उपयोग मका पिकात लष्करी अळीसाठी सापळा पीक म्हणून होतो
  6. मका पिकाची पेरणी झाल्यानंतर लगेचच शेतात एकरी दहा पक्षी थांबे उभारावेत.
  7.  मक्याच्या पानावर दिसणारे अंडीपुंज व सुरुवातीच्या अवस्थेतील अळ्या गोळा करून नष्ट कराव्यात अथवा  पानावर चिरडून टाकाव्यात. 
  8. किडीच्या सर्वेक्षणासाठी पेरणीनंतर पीक उगवून येण्यापूर्वी एकरी पाच कामगंध सापळे लावावेत. लष्करी आळीचे नर पतंग एक गठ्ठा पकडण्यासाठी शेतात हेक्‍टरी १५ कामगंध सापळे लावावेत त्यामुळे किडीचा प्रादुर्भाव नियंत्रित ठेवण्यास मदत होते.
  9. जेव्हा मका पिकाचा पोंगा  व्यवस्थित तयार होईल तेव्हा त्यामध्ये माती आणि राख किंवा चुना यांचे ९:१ या प्रमाणात मिश्रण घेऊन त्यात टाकावे त्यामुळे पोंग्यातील  अळ्यांवर परिणाम होतो. 
  10. मधु मका किंवा बेबी कॉर्न  मध्ये पिकाची एकाच वेळी पेरणी करणे शक्य नसल्यास ५ टक्के निंबोळी अर्क किंवा १५०० पीपीएम अझेडीरेक्टिन  ५ मिलि प्रति लिटर पाणी या प्रमाणात घेऊन सुरवातीच्या वाढीच्या काळात फवारणी घ्यावी. 
  11. किडीचा प्रादुर्भाव मका पिकावर दिसू लागताच  जैविक कीटकनाशक नोमुरिया रिलाई ३ ग्रॅम किंवा मेटाऱ्ऱ्हाझियम अनीसोप्ली  ५ ग्रॅम प्रति लिटर पाण्यात मिसळून फवारणी करावी. 
  12. किडीचा प्रादुर्भाव आर्थिक नुकसान संकेत पातळीच्या वर गेल्यास खालील पैकी एका  कीटकनाशकांची आलटून पालटून फवारणी घ्यावी. कीटकनाशकांची फवारणी घेताना फवारा मक्याच्या पोंग्यात जाईल याची काळजी घ्यावी. 
अन कीटकनाशक प्रमाण/१० लिटर पाण्यासाठी 
थायोमिथोक्झाम १२.६ % + लॅम्बडा सायहॉलोथ्रीन ९.५ झेड सी 
5 मिली 
स्पिनेटोरम ११. ७ एस सी४ मिली 
क्लोरॅनट्रानिलीप्रोल १८.५ एस सी४ मिली 

लष्करी अळीचे एकात्मिक व्यवस्थापन व्हिडिओ

Источник: [https://torrent-igruha.org/3551-portal.html]
NameDescriptionCVE-2021-43549A remote authenticated attacker with write access to a PI Server could trick a user into interacting with a PI Web API endpoint and redirect them to a malicious website. As a result, a victim may disclose sensitive information to the attacker or be provided with false information. CVE-2021-43414An issue was discovered in GNU Hurd before 0.9 20210404-9. The use of an authentication protocol in the proc server is vulnerable to man-in-the-middle attacks, which can be exploited for local privilege escalation to get full root access. CVE-2021-43403An issue was discovered in FusionPBX before 4.5.30. The log_viewer.php Log View page allows an authenticated user to choose an arbitrary filename for download (i.e., not necessarily freeswitch.log in the intended directory). CVE-2021-43339In Ericsson Network Location before 2021-07-31, it is possible for an authenticated attacker to inject commands via file_name in the export functionality. For example, a new admin user could be created. CVE-2021-43293Sonatype Nexus Repository Manager 3.x before 3.36.0 allows a remote authenticated attacker to potentially perform network enumeration via Server Side Request Forgery (SSRF). CVE-2021-43203In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly. CVE-2021-43183In JetBrains Hub before 2021.1.13690, the authentication throttling mechanism could be bypassed. CVE-2021-43136An authentication bypass issue in FormaLMS <= 2.4.4 allows an attacker to bypass the authentication mechanism and obtain a valid access to the platform. CVE-2021-43017Adobe Creative Cloud version 5.5 (and earlier) are affected by an Application denial of service vulnerability in the Creative Cloud Desktop installer. An authenticated attacker could leverage this vulnerability to achieve denial of service in the context of the user. User interaction is required before product installation to abuse this vulnerability. CVE-2021-42837An issue was discovered in Talend Data Catalog before 7.3-20210930. After setting up SAML/OAuth, authentication is not correctly enforced on the native login page. Any valid user from the SAML/OAuth provider can be used as the username with an arbitrary password, and login will succeed. CVE-2021-42770A Cross-site scripting (XSS) vulnerability was discovered in OPNsense before 21.7.4 via the LDAP attribute return in the authentication tester. CVE-2021-42754An improper control of generation of code vulnerability [CWE-94] in FortiClientMacOS versions 7.0.0 and below and 6.4.5 and below may allow an authenticated attacker to hijack the MacOS camera without the user permission via the malicious dylib file. CVE-2021-42671An incorrect access control vulnerability exists in Sourcecodester Engineers Online Portal in PHP in nia_munoz_monitoring_system/admin/uploads. An attacker can leverage this vulnerability in order to bypass access controls and access all the files uploaded to the web server without the need of authentication or authorization. CVE-2021-42665An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication. CVE-2021-42580Sourcecodester Online Learning System 2.0 is vunlerable to sql injection authentication bypass in admin login file (/admin/login.php) and authenticated file upload in (Master.php) file , we can craft these two vunlerablities to get unauthenticated remote command execution. CVE-2021-42372A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service. CVE-2021-423384MOSAn GCB Doctor&#8217;s login page has improper validation of Cookie, which allows an unauthenticated remote attacker to bypass authentication by code injection in cookie, and arbitrarily manipulate the system or interrupt services by upload and execution of arbitrary files. CVE-2021-42250Improper output neutralization for Logs. A specific Apache Superset HTTP endpoint allowed for an authenticated user to forge log entries or inject malicious content into logs. CVE-2021-42237Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability. CVE-2021-42169The Simple Payroll System with Dynamic Tax Bracket in PHP using SQLite Free Source Code (by: oretnom23 ) is vulnerable from remote SQL-Injection-Bypass-Authentication for the admin account. The parameter (username) from the login form is not protected correctly and there is no security and escaping from malicious payloads. CVE-2021-42054ACCEL-PPP 1.12.0 has an out-of-bounds read in triton_context_schedule if the client exits after authentication. CVE-2021-42026A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control read access for certain client actions. This could allow authenticated attackers to retrieve the changedDate attribute of arbitrary objects, even when they don't have read access to them. CVE-2021-42025A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects in some cases, regardless whether they have write access to it. CVE-2021-42009An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3. CVE-2021-41972Apache Superset up to and including 1.3.1 allowed for database connections password leak for authenticated users. This information could be accessed in a non-trivial way. CVE-2021-41971Apache Superset up to and including 1.3.0 when configured with ENABLE_TEMPLATE_PROCESSING on (disabled by default) allowed SQL injection when a malicious authenticated user sends an http request with a custom URL. CVE-2021-41919webTareas version 2.4 and earlier allows an authenticated user to arbitrarily upload potentially dangerous files without restrictions. This is working by adding or replacing a personal profile picture. The affected endpoint is /includes/upload.php on the HTTP POST data. This allows an attacker to exploit the platform by injecting code or malware and, under certain conditions, to execute code on remote user browsers. CVE-2021-41918webTareas version 2.4 and earlier allows an authenticated user to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and achieve a Reflected Cross-Site Scripting attack against the platform users and administrators. The issue affects every endpoint on the application because it is related on how each URL is echoed back on every response page. CVE-2021-41917webTareas version 2.4 and earlier allows an authenticated user to store arbitrary web script or HTML by creating or editing a client name in the clients section, due to incorrect sanitization of user-supplied data and achieve a Stored Cross-Site Scripting attack against the platform users and administrators. The affected endpoint is /clients/editclient.php, on the HTTP POST cn parameter. CVE-2021-41916A Cross-Site Request Forgery (CSRF) vulnerability in webTareas version 2.4 and earlier allows a remote attacker to create a new administrative profile and add a new user to the new profile. without the victim's knowledge, by enticing an authenticated admin user to visit an attacker's web page. CVE-2021-41865HashiCorp Nomad and Nomad Enterprise 1.1.1 through 1.1.5 allowed authenticated users with job submission capabilities to cause denial of service by submitting incomplete job specifications with a Consul mesh gateway and host networking mode. Fixed in 1.1.6. CVE-2021-41826PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect. CVE-2021-41821Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Integer Underflow vulnerability that might lead to denial of service. A crafted message must be sent from an authenticated agent to the manager. CVE-2021-41753A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in D-Link DIR-X1560, v1.04B04, and DIR-X6060, v1.11B04 allows a remote unauthenticated attacker to disconnect a wireless client via sending specific spoofed SAE authentication frames. CVE-2021-41649An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input. CVE-2021-41648An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input. CVE-2021-41647An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user. CVE-2021-41583vpn-user-portal (aka eduVPN or Let's Connect!) before 2.3.14, as packaged for Debian 10, Debian 11, and Fedora, allows remote authenticated users to obtain OS filesystem access, because of the interaction of QR codes with an exec that uses the -r option. This can be leveraged to obtain additional VPN access. CVE-2021-41580** DISPUTED ** The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability. CVE-2021-41573Hitachi Content Platform Anywhere (HCP-AW) 4.4.5 and later allows information disclosure. If authenticated user creates a link to a file or folder while the system was running version 4.3.x or earlier and then shares the link and then later deletes the file or folder without deleting the link and before the link expires. If the system has been upgraded to version 4.4.5 or 4.5.0 a malicious user with the link could browse and download all files of the authenticated user that created the link . CVE-2021-41554** UNSUPPORTED WHEN ASSIGNED ** ARCHIBUS Web Central 21.3.3.815 (a version from 2014) does not properly validate requests for access to data and functionality in these affected endpoints: /archibus/schema/ab-edit-users.axvw, /archibus/schema/ab-data-dictionary-table.axvw, /archibus/schema/ab-schema-add-field.axvw, /archibus/schema/ab-core/views/process-navigator/ab-my-user-profile.axvw. By not verifying the permissions for access to resources, it allows a potential attacker to view pages that are not allowed. Specifically, it was found that any authenticated user can reach the administrative console for user management by directly requesting access to the page via URL. This allows a malicious user to modify all users' profiles, to elevate any privileges to administrative ones, or to create or delete any type of user. It is also possible to modify the emails of other users, through a misconfiguration of the username parameter, on the user profile page. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020. CVE-2021-41525An issue related to modification of otherwise restricted files through a locally authenticated attacker exists in FlexNet inventory agent and inventory beacon versions 2020 R2.5 and prior. CVE-2021-41511The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication. CVE-2021-41504** UNSUPPORTED WHEN ASSIGNED ** An Elevated Privileges issue exists in D-Link DCS-5000L v1.05 and DCS-932L v2.17 and older. The use of the digest-authentication for the devices command interface may allow further attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. CVE-2021-41503** UNSUPPORTED WHEN ASSIGNED ** DCS-5000L v1.05 and DCS-932L v2.17 and older are affecged by Incorrect Acess Control. The use of the basic authentication for the devices command interface allows attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. CVE-2021-41385The third party intelligence connector in Securonix SNYPR 6.3.1 Build 184295_0302 allows an authenticated user to obtain access to server configuration details via SSRF. CVE-2021-41324Directory traversal in the Copy, Move, and Delete features in Pydio Cells 2.2.9 allows remote authenticated users to enumerate personal files (or Cells files belonging to any user) via the nodes parameter (for Copy and Move) or via the Path parameter (for Delete). CVE-2021-41323Directory traversal in the Compress feature in Pydio Cells 2.2.9 allows remote authenticated users to overwrite personal files, or Cells files belonging to any user, via the format parameter. CVE-2021-41320A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. CVE-2021-41317XSS Hunter Express before 2021-09-17 does not properly enforce authentication requirements for paths. CVE-2021-41315The Device42 Remote Collector before 17.05.01 does not sanitize user input in its SNMP Connectivity utility. This allows an authenticated attacker (with access to the console application) to execute arbitrary OS commands and escalate privileges. CVE-2021-41314Certain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. CVE-2021-41313Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.21.0. CVE-2021-41312Affected versions of Atlassian Jira Server and Data Center allow a remote attacker who has had their access revoked from Jira Service Management to enable and disable Issue Collectors on Jira Service Management projects via an Improper Authentication vulnerability in the /secure/ViewCollectors endpoint. The affected versions are before version 8.19.1. CVE-2021-41308Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1. CVE-2021-41303Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0. CVE-2021-41301ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access. CVE-2021-41297ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text. CVE-2021-41295ECOA BAS controller has a Cross-Site Request Forgery vulnerability, thus authenticated attacker can remotely place a forged request at a malicious web page and execute CRUD commands (GET, POST, PUT, DELETE) to perform arbitrary operations in the system. CVE-2021-41292ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate HVAC. CVE-2021-41286Omikron MultiCash Desktop 4.00.008.SP5 relies on a client-side authentication mechanism. When a user logs into the application, the validity of the password is checked locally. All communication to the database backend is made via the same technical account. Consequently, an attacker can attach a debugger to the process or create a patch that manipulates the behavior of the login function. When the function always returns the success value (corresponding to a correct password), an attacker can login with any desired account, such as the administrative account of the application. CVE-2021-41275spree_auth_devise is an open source library which provides authentication and authorization services for use with the Spree storefront framework by using an underlying Devise authentication framework. In affected versions spree_auth_devise is subject to a CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of spree_auth_devise are affected if protect_from_forgery method is both: Executed whether as: A before_action callback (the default). A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). Users are advised to update their spree_auth_devise gem. For users unable to update it may be possible to change your strategy to :exception. Please see the linked GHSA for more workaround details. ### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch &#128079; ### Patches Spree 4.3 users should update to spree_auth_devise 4.4.1 Spree 4.2 users should update to spree_auth_devise 4.2.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2 CVE-2021-41274solidus_auth_devise provides authentication services for the Solidus webstore framework, using the Devise gem. In affected versions solidus_auth_devise is subject to a CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both: Executed whether as: A `before_action` callback (the default) or A `prepend_before_action` (option `prepend: true` given) before the `:load_object` hook in `Spree::UserController` (most likely order to find). Configured to use `:null_session` or `:reset_session` strategies (`:null_session` is the default in case the no strategy is given, but `rails --new` generated skeleton use `:exception`). Users should promptly update to `solidus_auth_devise` version `2.5.4`. Users unable to update should if possible, change their strategy to `:exception`. Please see the linked GHSA for more workaround details. CVE-2021-41266Minio console is a graphical user interface for the for MinIO operator. Minio itself is a multi-cloud object storage project. Affected versions are subject to an authentication bypass issue in the Operator Console when an external IDP is enabled. All users on release v0.12.2 and before are affected and are advised to update to 0.12.3 or newer. Users unable to upgrade should add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes service account token. CVE-2021-41258Kirby is an open source file structured CMS. In affected versions Kirby's blocks field stores structured data for each block. This data is then used in block snippets to convert the blocks to HTML for use in your templates. We recommend to escape HTML special characters to protect against cross-site scripting (XSS) attacks. The default snippet for the image block unfortunately did not use our escaping helper. This made it possible to include malicious HTML code in the source, alt and link fields of the image block, which would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. Attackers must be in your group of authenticated Panel users in order to exploit this weakness. Users who do not make use of the blocks field are not affected. This issue has been patched in Kirby version 3.5.8 by escaping special HTML characters in the output from the default image block snippet. Please update to this or a later version to fix the vulnerability. CVE-2021-41254kustomize-controller is a Kubernetes operator, specialized in running continuous delivery pipelines for infrastructure and workloads defined with Kubernetes manifests and assembled with Kustomize. Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing an authenticated Kubernetes user to gain cluster admin privileges. In affected versions multitenant environments where non-admin users have permissions to create Flux Kustomization objects are affected by this issue. This vulnerability was fixed in kustomize-controller v0.15.0 (included in flux2 v0.18.0) released on 2021-10-08. Starting with v0.15, the kustomize-controller no longer executes shell commands on the container OS and the `kubectl` binary has been removed from the container image. To prevent the creation of Kubernetes Service Accounts with `secrets` in namespaces owned by tenants, a Kubernetes validation webhook such as Gatekeeper OPA or Kyverno can be used. CVE-2021-41252Kirby is an open source file structured CMS ### Impact Kirby's writer field stores its formatted content as HTML code. Unlike with other field types, it is not possible to escape HTML special characters against cross-site scripting (XSS) attacks, otherwise the formatting would be lost. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. Attackers must be in your group of authenticated Panel users in order to exploit this weakness. Users who do not make use of the writer field are not affected. This issue has been patched in Kirby 3.5.8 by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a later version to fix the vulnerability. CVE-2021-41232Thunderdome is an open source agile planning poker tool in the theme of Battling for points. In affected versions there is an LDAP injection vulnerability which affects instances with LDAP authentication enabled. The provided username is not properly escaped. This issue has been patched in version 1.16.3. If users are unable to update they should disable the LDAP feature if in use. CVE-2021-41179Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn't enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn't authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading. CVE-2021-41157FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. By default, SIP requests of the type SUBSCRIBE are not authenticated in the affected versions of FreeSWITCH. Abuse of this security issue allows attackers to subscribe to user agent event notifications without the need to authenticate. This abuse poses privacy concerns and might lead to social engineering or similar attacks. For example, attackers may be able to monitor the status of target SIP extensions. Although this issue was fixed in version v1.10.6, installations upgraded to the fixed version of FreeSWITCH from an older version, may still be vulnerable if the configuration is not updated accordingly. Software upgrades do not update the configuration by default. SIP SUBSCRIBE messages should be authenticated by default so that FreeSWITCH administrators do not need to explicitly set the `auth-subscriptions` parameter. When following such a recommendation, a new parameter can be introduced to explicitly disable authentication. CVE-2021-41145FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. FreeSWITCH prior to version 1.10.7 is susceptible to Denial of Service via SIP flooding. When flooding FreeSWITCH with SIP messages, it was observed that after a number of seconds the process was killed by the operating system due to memory exhaustion. By abusing this vulnerability, an attacker is able to crash any FreeSWITCH instance by flooding it with SIP messages, leading to Denial of Service. The attack does not require authentication and can be carried out over UDP, TCP or TLS. This issue was patched in version 1.10.7. CVE-2021-41130Extensible Service Proxy, a.k.a. ESP is a proxy which enables API management capabilities for JSON/REST or gRPC API services. ESPv1 can be configured to authenticate a JWT token. Its verified JWT claim is passed to the application by HTTP header "X-Endpoint-API-UserInfo", the application can use it to do authorization. But if there are two "X-Endpoint-API-UserInfo" headers from the client, ESPv1 only replaces the first one, the 2nd one will be passed to the application. An attacker can send two "X-Endpoint-API-UserInfo" headers, the second one with a fake JWT claim. Application may use the fake JWT claim to do the authorization. This impacts following ESPv1 usages: 1) Users have configured ESPv1 to do JWT authentication with Google ID Token as described in the referenced google endpoint document. 2) Users backend application is using the info in the "X-Endpoint-API-UserInfo" header to do the authorization. It has been fixed by v1.58.0. You need to patch it in the following ways: * If your docker image is using tag ":1", needs to re-start the container to pick up the new version. The tag ":1" will automatically point to the latest version. * If your docker image tag pings to a specific minor version, e.g. ":1.57". You need to update it to ":1.58" and re-start the container. There are no workaround for this issue. CVE-2021-41129Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user. Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user. This controller looks for a request input parameter called `confirmation_token` which is expected to be a 64 character random alpha-numeric string that references a value within the Panel's cache containing a `user_id` value. This value is then used to fetch the user that attempted to login, and lookup their two-factor authentication token. Due to the design of this system, any element in the cache that contains only digits could be referenced by a malicious user, and whatever value is stored at that position would be used as the `user_id`. There are a few different areas of the Panel that store values into the cache that are integers, and a user who determines what those cache keys are could pass one of those keys which would cause this code pathway to reference an arbitrary user. At its heart this is a high-risk login bypass vulnerability. However, there are a few additional conditions that must be met in order for this to be successfully executed, notably: 1.) The account referenced by the malicious cache key must have two-factor authentication enabled. An account without two-factor authentication would cause an exception to be triggered by the authentication logic, thusly exiting this authentication flow. 2.) Even if the malicious user is able to reference a valid cache key that references a valid user account with two-factor authentication, they must provide a valid two-factor authentication token. However, due to the design of this endpoint once a valid user account is found with two-factor authentication enabled there is no rate-limiting present, thusly allowing an attacker to brute force combinations until successful. This leads to a third condition that must be met: 3.) For the duration of this attack sequence the cache key being referenced must continue to exist with a valid `user_id` value. Depending on the specific key being used for this attack, this value may disappear quickly, or be changed by other random user interactions on the Panel, outside the control of the attacker. In order to mitigate this vulnerability the underlying authentication logic was changed to use an encrypted session store that the user is therefore unable to control the value of. This completely removed the use of a user-controlled value being used. In addition, the code was audited to ensure this type of vulnerability is not present elsewhere. CVE-2021-41125Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the `w3lib.http.basic_auth_header` function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using `HttpAuthMiddleware`. CVE-2021-41124Scrapy-splash is a library which provides Scrapy and JavaScript integration. In affected versions users who use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication will have any non-Splash request expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots). CVE-2021-41120sylius/paypal-plugin is a paypal plugin for the Sylius development platform. In affected versions the URL to the payment page done after checkout was created with autoincremented payment id (/pay-with-paypal/{id}) and therefore it was easy to predict. The problem is that the Credit card form has prefilled "credit card holder" field with the Customer's first and last name and hence this can lead to personally identifiable information exposure. Additionally, the mentioned form did not require authentication. The problem has been patched in Sylius/PayPalPlugin 1.2.4 and 1.3.1. If users are unable to update they can override a sylius_paypal_plugin_pay_with_paypal_form route and change its URL parameters to (for example) {orderToken}/{paymentId}, then override the Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method. Additionally, one could override the @SyliusPayPalPlugin/payWithPaypal.html.twig template, to add contingencies: ['SCA_ALWAYS'] line in hostedFields.submit(...) function call (line 421). It would then have to be handled in the function callback. CVE-2021-41113TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the new TYPO3 v11 feature that allows users to create and share deep links in the backend user interface is vulnerable to cross-site-request-forgery. The impact is the same as described in TYPO3-CORE-SA-2020-006 (CVE-2020-11069). However, it is not limited to the same site context and does not require the attacker to be authenticated. In a worst case scenario, the attacker could create a new admin user account to compromise the system. To successfully carry out an attack, an attacker must trick his victim to access a compromised system. The victim must have an active session in the TYPO3 backend at that time. The following Same-Site cookie settings in $GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite] are required for an attack to be successful: SameSite=strict: malicious evil.example.org invoking TYPO3 application at good.example.org and SameSite=lax or none: malicious evil.com invoking TYPO3 application at example.org. Update your instance to TYPO3 version 11.5.0 which addresses the problem described. CVE-2021-41105FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is susceptible to a DoS where calls can be terminated by remote attackers. This attack can be done continuously, thus denying encrypted calls during the attack. When a media port that is handling SRTP traffic is flooded with a specially crafted SRTP packet, the call is terminated leading to denial of service. This issue was reproduced when using the SDES key exchange mechanism in a SIP environment as well as when using the DTLS key exchange mechanism in a WebRTC environment. The call disconnection occurs due to line 6331 in the source file `switch_rtp.c`, which disconnects the call when the total number of SRTP errors reach a hard-coded threshold (100). By abusing this vulnerability, an attacker is able to disconnect any ongoing calls that are using SRTP. The attack does not require authentication or any special foothold in the caller's or the callee's network. This issue is patched in version 1.10.7. CVE-2021-41100Wire-server is the backing server for the open source wire secure messaging application. In affected versions it is possible to trigger email address change of a user with only the short-lived session token in the `Authorization` header. As the short-lived token is only meant as means of authentication by the client for less critical requests to the backend, the ability to change the email address with a short-lived token constitutes a privilege escalation attack. Since the attacker can change the password after setting the email address to one that they control, changing the email address can result in an account takeover by the attacker. Short-lived tokens can be requested from the backend by Wire clients using the long lived tokens, after which the long lived tokens can be stored securely, for example on the devices key chain. The short lived tokens can then be used to authenticate the client towards the backend for frequently performed actions such as sending and receiving messages. While short-lived tokens should not be available to an attacker per-se, they are used more often and in the shape of an HTTP header, increasing the risk of exposure to an attacker relative to the long-lived tokens, which are stored and transmitted in cookies. If you are running an on-prem instance and provision all users with SCIM, you are not affected by this issue (changing email is blocked for SCIM users). SAML single-sign-on is unaffected by this issue, and behaves identically before and after this update. The reason is that the email address used as SAML NameID is stored in a different location in the databse from the one used to contact the user outside wire. Version 2021-08-16 and later provide a new end-point that requires both the long-lived client cookie and `Authorization` header. The old end-point has been removed. If you are running an on-prem instance with at least some of the users invited or provisioned via SAML SSO and you cannot update then you can block `/self/email` on nginz (or in any other proxies or firewalls you may have set up). You don't need to discriminate by verb: `/self/email` only accepts `PUT` and `DELETE`, and `DELETE` is almost never used. CVE-2021-41093Wire is an open source secure messenger. In affected versions if the an attacker gets an old but valid access token they can take over an account by changing the email. This issue has been resolved in version 3.86 which uses a new endpoint which additionally requires an authentication cookie. See wire-ios-sync-engine and wire-ios-transport references. This is the root advisory that pulls the changes together. CVE-2021-41087in-toto-golang is a go implementation of the in-toto framework to protect software supply chain integrity. In affected versions authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). Exploiting this vulnerability is dependent on the specific policy applied. The problem has been fixed in version 0.3.0. CVE-2021-41023A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files CVE-2021-41011LINE client for iOS before 11.15.0 might expose authentication information for a certain service to external entities under certain conditions. This is usually impossible, but in combination with a server-side bug, attackers could get this information. CVE-2021-40997A remote authentication bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability. CVE-2021-40996A remote authentication bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability. CVE-2021-40867Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. CVE-2021-40866Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. CVE-2021-40862HashiCorp Terraform Enterprise up to v202108-1 contained an API endpoint that erroneously disclosed a sensitive URL to authenticated parties, which could be used for privilege escalation or unauthorized modification of a Terraform configuration. Fixed in v202109-1. CVE-2021-40825nLight ECLYPSE (nECY) system Controllers running software prior to 1.17.21245.754 contain a default key vulnerability. The nECY does not force a change to the key upon the initial configuration of an affected device. nECY system controllers utilize an encrypted channel to secure SensorViewTM configuration and monitoring software and nECY to nECY communications. Impacted devices are at risk of exploitation. A remote attacker with IP access to an impacted device could submit lighting control commands to the nECY by leveraging the default key. A successful attack may result in the attacker gaining the ability to modify lighting conditions or gain the ability to update the software on lighting devices. The impacted key is referred to as the SensorView Password in the nECY nLight Explorer Interface and the Gateway Password in the SensorView application. An attacker cannot authenticate to or modify the configuration or software of the nECY system controller. CVE-2021-40797An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service. CVE-2021-40712Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a improper input validation vulnerability via the path parameter. An authenticated attacker can send a malformed POST request to achieve server-side denial of service. CVE-2021-40711Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a stored XSS vulnerability when creating Content Fragments. An authenticated attacker can send a malformed POST request to achieve arbitrary code execution. Malicious JavaScript may be executed in a victim&#8217;s browser when they browse to the page containing the vulnerable field. CVE-2021-40708Adobe Genuine Service versions 7.3 (and earlier) are affected by a privilege escalation vulnerability in the AGSService installer. An authenticated attacker could leverage this vulnerability to achieve read / write privileges to execute arbitrary code. User interaction is required to abuse this vulnerability. CVE-2021-40541PHPFusion 9.03.110 is affected by cross-site scripting (XSS) in the preg patterns filter html tag without "//" in descript() function An authenticated user can trigger XSS by appending "//" in the end of text. CVE-2021-40539Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution. CVE-2021-40526Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike CVE-2021-40502SAP Commerce - versions 2105.3, 2011.13, 2005.18, 1905.34, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. Authenticated attackers will be able to access and edit data from B2B units they do not belong to. CVE-2021-40501SAP ABAP Platform Kernel - versions 7.77, 7.81, 7.85, 7.86, does not perform necessary authorization checks for an authenticated business user, resulting in escalation of privileges. That means this business user is able to read and modify data beyond the vulnerable system. However, the attacker can neither significantly reduce the performance of the system nor stop the system. CVE-2021-40496SAP Internet Communication framework (ICM) - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785, allows an attacker with logon functionality, to exploit the authentication function by using POST and form field to repeat executions of the initial command by a GET request and exposing sensitive data. This vulnerability is normally exposed over the network and successful exploitation can lead to exposure of data like system details. CVE-2021-40387An issue was discovered in the server software in Kaseya Unitrends Backup Software before 10.5.5-2. There is authenticated remote code execution. CVE-2021-40350webctrl.cgi.elf on Christie Digital DWU850-GS V06.46 devices allows attackers to perform any desired action via a crafted query containing an unspecified Cookie header. Authentication bypass can be achieved by including an administrative cookie that the device does not validate. CVE-2021-40329The Authentication API in Ping Identity PingFederate before 10.3 mishandles certain aspects of external password management. CVE-2021-40309A SQL injection vulnerability exists in the Take Attendance functionality of OS4Ed's OpenSIS 8.0. allows an attacker to inject their own SQL query. The cp_id_miss_attn parameter from TakeAttendance.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request as a user with access to "Take Attendance" functionality to trigger this vulnerability. CVE-2021-40284D-Link DSL-3782 EU v1.01:EU v1.03 is affected by a buffer overflow which can cause a denial of service. This vulnerability exists in the web interface "/cgi-bin/New_GUI/Igmp.asp". Authenticated remote attackers can trigger this vulnerability by sending a long string in parameter 'igmpsnoopEnable' via an HTTP request. CVE-2021-40131A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by adding malicious code to the configuration by using the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. CVE-2021-40130A vulnerability in the web application of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to specify non-log files as sources for syslog reporting. This vulnerability is due to improper restriction of the syslog configuration. An attacker could exploit this vulnerability by configuring non-log files as sources for syslog reporting through the web application. A successful exploit could allow the attacker to read non-log files on the CSPC. CVE-2021-40129A vulnerability in the configuration dashboard of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to submit a SQL query through the CSPC configuration dashboard. This vulnerability is due to insufficient input validation of uploaded files. An attacker could exploit this vulnerability by uploading a file containing a SQL query to the configuration dashboard. A successful exploit could allow the attacker to read restricted information from the CSPC SQL database. CVE-2021-40126A vulnerability in the web-based dashboard of Cisco Umbrella could allow an authenticated, remote attacker to perform an email enumeration attack against the Umbrella infrastructure. This vulnerability is due to an overly descriptive error message on the dashboard that appears when a user attempts to modify their email address when the new address already exists in the system. An attacker could exploit this vulnerability by attempting to modify the user's email address. A successful exploit could allow the attacker to enumerate email addresses of users in the system. CVE-2021-40125A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device. CVE-2021-40124A vulnerability in the Network Access Manager (NAM) module of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to incorrect privilege assignment to scripts executed before user logon. An attacker could exploit this vulnerability by configuring a script to be executed before logon. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. CVE-2021-40123A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative read-only privileges to download files that should be restricted. This vulnerability is due to incorrect permissions settings on an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the device. A successful exploit could allow the attacker to download files that should be restricted. CVE-2021-40120A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system and execute them using root-level privileges. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as a user with root-level privileges. CVE-2021-40119A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user. This vulnerability is due to the re-use of static SSH keys across installations. An attacker could exploit this vulnerability by extracting a key from a system under their control. A successful exploit could allow the attacker to log in to an affected system as the root user. CVE-2021-40097An issue was discovered in Concrete CMS through 8.5.5. Authenticated path traversal leads to to remote code execution via uploaded PHP code, related to the bFilename parameter. CVE-2021-40088An issue was discovered in PrimeKey EJBCA before 7.6.0. CMP RA Mode can be configured to use a known client certificate to authenticate enrolling clients. The same RA client certificate is used for revocation requests as well. While enrollment enforces multi tenancy constraints (by verifying that the client certificate has access to the CA and Profiles being enrolled against), this check was not performed when authenticating revocation operations, allowing a known tenant to revoke a certificate belonging to another tenant. CVE-2021-40085An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value. CVE-2021-39879Missing authentication in all versions of GitLab CE/EE since version 7.11.0 allows an attacker with access to a victim's session to disable two-factor authentication CVE-2021-39868In all versions of GitLab CE/EE since version 8.12, an authenticated low-privileged malicious user may create a project with unlimited repository size by modifying values in a project export. CVE-2021-39828Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by a privilege escalation vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to escalate privileges. User interaction is required before product installation to abuse this vulnerability. CVE-2021-39827Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by an arbitrary file write vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to write an arbitrary file to the system. User interaction is required before product installation to abuse this vulnerability. CVE-2021-39826Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by an arbitrary command execution vulnerability. An authenticated attacker could leverage this vulnerability to execute arbitrary commands. User interaction is required to abuse this vulnerability in that a user must open a maliciously crafted .epub file. CVE-2021-39459Remote code execution in the modules component in Yakamara Media Redaxo CMS version 5.12.1 allows an authenticated CMS user to execute code on the hosting system via a module containing malicious PHP code. CVE-2021-39458Triggering an error page of the import process in Yakamara Media Redaxo CMS version 5.12.1 allows an authenticated CMS user has to alternate the files of a vaild file backup. This leads of leaking the database credentials in the environment variables. CVE-2021-39404MaianAffiliate v1.0 allows an authenticated administrative user to save an XSS to the database. CVE-2021-39402MaianAffiliate v.1.0 is suffers from code injection by adding a new product via the admin panel. The injected payload is reflected on the affiliate main page for all authenticated and unauthenticated visitors. CVE-2021-39351The WP Bannerize WordPress plugin is vulnerable to authenticated SQL injection via the id parameter found in the ~/Classes/wpBannerizeAdmin.php file which allows attackers to exfiltrate sensitive information from vulnerable sites. This issue affects versions 2.0.0 - 4.0.2. CVE-2021-39321Version 3.3.23 of the Sassy Social Share WordPress plugin is vulnerable to PHP Object Injection via the wp_ajax_heateor_sss_import_config AJAX action due to deserialization of unvalidated user supplied inputs via the import_config function found in the ~/admin/class-sassy-social-share-admin.php file. This can be exploited by underprivileged authenticated users due to a missing capability check on the import_config function. CVE-2021-39296In OpenBMC 2.9, crafted IPMI messages allow an attacker to bypass authentication and gain full control of the system. CVE-2021-39279Certain MOXA devices allow Authenticated Command Injection via /forms/web_importTFTP. This affects WAC-2004 1.7, WAC-1001 2.1, WAC-1001-T 2.1, OnCell G3470A-LTE-EU 1.7, OnCell G3470A-LTE-EU-T 1.7, TAP-323-EU-CT-T 1.3, TAP-323-US-CT-T 1.3, TAP-323-JP-CT-T 1.3, WDR-3124A-EU 2.3, WDR-3124A-EU-T 2.3, WDR-3124A-US 2.3, and WDR-3124A-US-T 2.3. CVE-2021-39271OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3. CVE-2021-39244Authenticated Semi-Blind Command Injection (via Parameter Injection) exists on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices via the getlogs.cgi tcpdump feature. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0, Nexto NX5101 1.8.11.0, Nexto NX5110 1.1.2.8, Nexto NX5210 1.1.2.8, Nexto Xpress XP300 1.8.11.0, Nexto Xpress XP315 1.8.11.0, Nexto Xpress XP325 1.8.11.0, Nexto Xpress XP340 1.8.11.0, and Hadron Xtorm HX3040 1.7.58.0. CVE-2021-39236In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user. CVE-2021-39235In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block. CVE-2021-39234In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL. CVE-2021-39232In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins. CVE-2021-39226Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects. CVE-2021-39225Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading. CVE-2021-39203WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release. CVE-2021-39201WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. ### Impact The issue allows an authenticated but low-privileged user (like contributor/author) to execute XSS in the editor. This bypasses the restrictions imposed on users who do not have the permission to post `unfiltered_html`. ### Patches This has been patched in WordPress 5.8, and will be pushed to older versions via minor releases (automatic updates). It's strongly recommended that you keep auto-updates enabled to receive the fix. ### References https://wordpress.org/news/category/releases/ https://hackerone.com/reports/1142140 ### For more information If you have any questions or comments about this advisory: * Open an issue in [HackerOne](https://hackerone.com/wordpress) CVE-2021-39196pcapture is an open source dumpcap web service interface . In affected versions this vulnerability allows an authenticated but unprivileged user to use the REST API to capture and download packets with no capture filter and without adequate permissions. This is important because the capture filters can effectively limit the scope of information that a user can see in the data captures. If no filter is present, then all data on the local network segment where the program is running can be captured and downloaded. v3.12 fixes this problem. There is no workaround, you must upgrade to v3.12 or greater. CVE-2021-39192Ghost is a Node.js content management system. An error in the implementation of the limits service between versions 4.0.0 and 4.9.4 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability. This issue is patched in Ghost version 4.10.0. As a workaround, disable all non-Administrator accounts to prevent API access. It is highly recommended to regenerate all API keys after patching or applying the workaround. CVE-2021-39191mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version. CVE-2021-39179DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL Injection vulnerability in the Tracker component in DHIS2 Server allows authenticated remote attackers to execute arbitrary SQL commands via unspecified vectors. This vulnerability affects the `/api/trackedEntityInstances` and `/api/trackedEntityInstances/query` API endpoints in all DHIS2 versions 2.34, 2.35, and 2.36. It also affects versions 2.32 and 2.33 which have reached _end of support_ - exceptional security updates have been added to the latest *end of support* builds for these versions. Versions 2.31 and older are unaffected. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. The vulnerability is not exposed to a non-malicious user - the vulnerability requires a conscious attack to be exploited. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. Security patches are available in DHIS2 versions 2.32-EOS, 2.33-EOS, 2.34.7, 2.35.7, and 2.36.4. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the `/api/trackedEntityInstances`, and `/api/trackedEntityInstances/query` endpoints as a temporary workaround while waiting to upgrade. CVE-2021-39174Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard. CVE-2021-39173Cachet is an open source status page system. Prior to version 2.5.1 authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name. As a workaround, only allow trusted source IP addresses to access to the administration dashboard. CVE-2021-39172Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard. CVE-2021-39171Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. Prior to version 3.1.0, a malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2. CVE-2021-39170Pimcore is an open source data & experience management platform. Prior to version 10.1.2, an authenticated user could add XSS code as a value of custom metadata on assets. There is a patch for this issue in Pimcore version 10.1.2. As a workaround, users may apply the patch manually. CVE-2021-39166Pimcore is an open source data & experience management platform. Prior to version 10.1.2, text-values were not properly escaped before printed in the version preview. This allowed XSS by authenticated users with access to the resources. This issue is patched in Pimcore version 10.1.2. CVE-2021-39165Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected. CVE-2021-39132Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to version 3.3.14 and version 3.4.3, an authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition. The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions:`admin` level access to the `system` resource type. The ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions: `create` `update` or `admin` level access to a `project_acl` resource, and/or`create` `update` or `admin` level access to the `system_acl` resource. The unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only. Patches are available in versions 3.4.3, 3.3.14 CVE-2021-39121Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to enumerate the keys of private Jira projects via an Information Disclosure vulnerability in the /rest/api/latest/projectvalidate/key endpoint. The affected versions are before version 8.5.18, from version 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2. CVE-2021-38975IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to to obtain sensitive information from a specially crafted HTTP request. IBM X-Force ID: 212780. CVE-2021-38974IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to cause a denial of service using specially crafted HTTP requests. IBM X-Force ID: 212779. CVE-2021-38915IBM Data Risk Manager 2.0.6 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 209947. CVE-2021-38887IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information from application response requests that could be used in further attacks against the system. IBM X-Force ID: 209401. CVE-2021-38863IBM Security Verify Bridge 1.0.5.0 stores user credentials in plain clear text which can be read by a locally authenticated user. IBM X-Force ID: 208154. CVE-2021-3882LedgerSMB does not set the 'Secure' attribute on the session authorization cookie when the client uses HTTPS and the LedgerSMB server is behind a reverse proxy. By tricking a user to use an unencrypted connection (HTTP), an attacker may be able to obtain the authentication data by capturing network traffic. LedgerSMB 1.8 and newer switched from Basic authentication to using cookie authentication with encrypted cookies. Although an attacker can't access the information inside the cookie, nor the password of the user, possession of the cookie is enough to access the application as the user from which the cookie has been obtained. In order for the attacker to obtain the cookie, first of all the server must be configured to respond to unencrypted requests, the attacker must be suitably positioned to eavesdrop on the network traffic between the client and the server *and* the user must be tricked into using unencrypted HTTP traffic. Proper audit control and separation of duties limit Integrity impact of the attack vector. Users of LedgerSMB 1.8 are urged to upgrade to known-fixed versions. Users of LedgerSMB 1.7 or 1.9 are unaffected by this vulnerability and don't need to take action. As a workaround, users may configure their Apache or Nginx reverse proxy to add the Secure attribute at the network boundary instead of relying on LedgerSMB. For Apache, please refer to the 'Header always edit' configuration command in the mod_headers module. For Nginx, please refer to the 'proxy_cookie_flags' configuration command. CVE-2021-38705ClinicCases 7.3.3 is affected by Cross-Site Request Forgery (CSRF). A successful attack would consist of an authenticated user following a malicious link, resulting in arbitrary actions being carried out with the privilege level of the targeted user. This can be exploited to create a secondary administrator account for the attacker. CVE-2021-38703Wireless devices running certain Arcadyan-derived firmware (such as KPN Experia WiFi 1.00.15) do not properly sanitise user input to the syslog configuration form. An authenticated remote attacker could leverage this to alter the device configuration and achieve remote code execution. This can be exploited in conjunction with CVE-2021-20090. CVE-2021-38618In GFOS Workforce Management 4.8.272.1, the login page of application is prone to authentication bypass, allowing anyone (who knows a user's credentials except the password) to get access to an account. This occurs because of JSESSIONID mismanagement. CVE-2021-38607Crocoblock JetEngine before 2.6.1 allows XSS by remote authenticated users via a custom form input. CVE-2021-38540The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3. CVE-2021-38525Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40. CVE-2021-38524Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX45 before 1.0.2.32, RAX50 before 1.0.2.32, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, and RBS750 before 3.2.16.6. CVE-2021-38523NETGEAR R6400 devices before 1.0.1.70 are affected by a stack-based buffer overflow by an authenticated user. CVE-2021-38522NETGEAR R6400 devices before 1.0.1.52 are affected by a stack-based buffer overflow by an authenticated user. CVE-2021-38521Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6400 before 1.0.1.50, R7900P before 1.4.1.50, R8000P before 1.4.1.50, RAX75 before 1.0.1.62, and RAX80 before 1.0.1.62. CVE-2021-38520Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6400 before 1.0.1.52, R6400v2 before 1.0.4.84, R6700v3 before 1.0.4.84, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, and R7000P before 1.3.2.124. CVE-2021-38519Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6250 before 1.0.4.36, R6300v2 before 1.0.4.36, R6400 before 1.0.1.50, R6400v2 before 1.0.2.66, R6700v3 before 1.0.2.66, R6700 before 1.0.2.8, R6900 before 1.0.2.8, R7000 before 1.0.9.88, R6900P before 1.3.2.132, R7100LG before 1.0.0.52, R7900 before 1.0.3.10, R8000 before 1.0.4.46, R7900P before 1.4.1.50, R8000P before 1.4.1.50, and RAX80 before 1.0.1.40. CVE-2021-38518Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. CVE-2021-38514Certain NETGEAR devices are affected by authentication bypass. This affects D3600 before 1.0.0.72, D6000 before 1.0.0.72, D6100 before 1.0.0.63, D6200 before 1.1.00.34, D6220 before 1.0.0.48, D6400 before 1.0.0.86, D7000 before 1.0.1.70, D7000v2 before 1.0.0.52, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DC112A before 1.0.0.42, DGN2200v4 before 1.0.0.108, DGND2200Bv4 before 1.0.0.108, EX2700 before 1.0.1.48, EX3700 before 1.0.0.76, EX3800 before 1.0.0.76, EX6000 before 1.0.0.38, EX6100 before 1.0.2.24, EX6100v2 before 1.0.1.76, EX6120 before 1.0.0.42, EX6130 before 1.0.0.28, EX6150v1 before 1.0.0.42, EX6150v2 before 1.0.1.76, EX6200 before 1.0.3.88, EX6200v2 before 1.0.1.72, EX6400 before 1.0.2.136, EX7000 before 1.0.0.66, EX7300 before 1.0.2.136, EX8000 before 1.0.1.180, RBK50 before 2.1.4.10, RBR50 before 2.1.4.10, RBS50 before 2.1.4.10, RBK40 before 2.1.4.10, RBR40 before 2.1.4.10, RBS40 before 2.1.4.10, RBW30 before 2.2.1.204, PR2000 before 1.0.0.28, R6020 before 1.0.0.38, R6080 before 1.0.0.38, R6050 before 1.0.1.18, JR6150 before 1.0.1.18, R6120 before 1.0.0.46, R6220 before 1.1.0.86, R6250 before 1.0.4.34, R6300v2 before 1.0.4.32, R6400 before 1.0.1.44, R6400v2 before 1.0.2.62, R6700 before 1.0.1.48, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900v2 before 1.2.0.36, R6900 before 1.0.1.48, R7000 before 1.0.9.34, R6900P before 1.3.1.64, R7000P before 1.3.1.64, R7100LG before 1.0.0.48, R7300DST before 1.0.0.70, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, R7900 before 1.0.3.8, R8000 before 1.0.4.28, R7900P before 1.4.1.30, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, R9000 before 1.0.3.10, RBS40V before 2.2.0.58, RBK50V before 2.2.0.58, WN2000RPTv3 before 1.0.1.32, WN2500RPv2 before 1.0.1.54, WN3000RPv3 before 1.0.2.78, WN3100RPv2 before 1.0.0.66, WNDR3400v3 before 1.0.1.22, WNDR3700v4 before 1.0.2.102, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.56, WNDR4500v3 before 1.0.0.56, WNR2000v5 (R2000) before 1.0.0.66, WNR2020 before 1.1.0.62, WNR2050 before 1.1.0.62, WNR3500Lv2 before 1.2.0.62, and XR500 before 2.3.2.22. CVE-2021-38513Certain NETGEAR devices are affected by authentication bypass. This affects RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, RBS850 before 3.2.10.11, CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, RBK752 before 3.2.10.10, RBR750 before 3.2.10.10, and RBS750 before 3.2.10.10. CVE-2021-38502Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2. CVE-2021-38488Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter comment of the API events, which may allow an attacker to remotely execute code. CVE-2021-38476InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 authentication process response indicates and validates the existence of a username. This may allow an attacker to enumerate different user accounts. CVE-2021-38459The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database. CVE-2021-38457The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication. CVE-2021-38431An authenticated user using Advantech WebAccess SCADA in versions 9.0.3 and prior can use API functions to disclose project names and paths from other users. CVE-2021-38428Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API schedule, which may allow an attacker to remotely execute code. CVE-2021-38412Properly formatted POST requests to multiple resources on the HTTP and HTTPS web servers of the Digi PortServer TS 16 Rack device do not require authentication or authentication tokens. This vulnerability could allow an attacker to enable the SNMP service and manipulate the community strings to achieve further control in. CVE-2021-38411Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter deviceName of the API modbusWriter-Reader, which may allow an attacker to remotely execute code. CVE-2021-38407Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code. CVE-2021-38403Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter supplier of the API maintenance, which may allow an attacker to remotely execute code. CVE-2021-38373In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is not honored (and cleartext messages are sent) unless "Server requires authentication" is checked. CVE-2021-38366Sitecore through 10.1, when Update Center is enabled, allows remote authenticated users to upload arbitrary files and achieve remote code execution by visiting an uploaded .aspx file at an admin/Packages URL. CVE-2021-38346The Brizy Page Builder plugin <= 2.3.11 for WordPress allowed authenticated users to upload executable files to a location of their choice using the brizy_create_block_screenshot AJAX action. The file would be named using the id parameter, which could be prepended with "../" to perform directory traversal, and the file contents were populated via the ibsf parameter, which would be base64-decoded and written to the file. While the plugin added a .jpg extension to all uploaded filenames, a double extension attack was still possible, e.g. a file named shell.php would be saved as shell.php.jpg, and would be executable on a number of common configurations. CVE-2021-38320The simpleSAMLphp Authentication WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/simplesamlphp-authentication.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.7.0. CVE-2021-38294A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication. CVE-2021-38176Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system. CVE-2021-38168Roxy-WI through 5.2.2.0 allows authenticated SQL injection via select_servers. CVE-2021-38167Roxy-WI through 5.2.2.0 allows SQL Injection via check_login. An unauthenticated attacker can extract a valid uuid to bypass authentication. CVE-2021-38163SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable. CVE-2021-38161Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8. CVE-2021-38155OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain that account's corresponding UUID, which might be leveraged for other unrelated attacks. All deployments enabling security_compliance.lockout_failure_attempts are affected. CVE-2021-38123Open Redirect vulnerability in Micro Focus Network Automation, affecting Network Automation versions 10.4x, 10.5x, 2018.05, 2018.11, 2019.05, 2020.02, 2020.08, 2020.11, 2021.05. The vulnerability could allow redirect users to malicious websites after authentication. CVE-2021-37933An LDAP injection vulnerability in /account/login in Huntflow Enterprise before 3.10.6 could allow an unauthenticated, remote user to modify the logic of an LDAP query and bypass authentication. The vulnerability is due to insufficient server-side validation of the email parameter before using it to construct LDAP queries. An attacker could bypass authentication exploiting this vulnerability by sending login attempts in which there is a valid password but a wildcard character in email parameter. CVE-2021-37910ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users' connections by sending specially crafted SAE authentication frames. CVE-2021-37843The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6.6, 4.0.12, 5.0.5; for Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; for Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; and for Fisheye 2.5.9. CVE-2021-37794A stored cross-site scripting (XSS) vulnerability exists in FileBrowser < v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance. CVE-2021-37748Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate. CVE-2021-37741ManageEngine ADManager Plus before 7111 has Pre-authentication RCE vulnerabilities. CVE-2021-37736A remote authentication bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability. CVE-2021-37711Versions prior to 6.4.3.1 contain an authenticated server-side request forgery vulnerability in file upload via URL. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. CVE-2021-37705OneFuzz is an open source self-hosted Fuzzing-As-A-Service platform. Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable, a OneFuzz deployment must be both version 2.12.0 or greater and deployed with the non-default --multi_tenant_domain option. This can result in read/write access to private data such as software vulnerability and crash information, security testing tools and proprietary code and symbols. Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration, which omits the `--multi_tenant_domain` option. CVE-2021-37698Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server's certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading. CVE-2021-37624FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, FreeSWITCH does not authenticate SIP MESSAGE requests, leading to spam and message spoofing. By default, SIP requests of the type MESSAGE (RFC 3428) are not authenticated in the affected versions of FreeSWITCH. MESSAGE requests are relayed to SIP user agents registered with the FreeSWITCH server without requiring any authentication. Although this behaviour can be changed by setting the `auth-messages` parameter to `true`, it is not the default setting. Abuse of this security issue allows attackers to send SIP MESSAGE messages to any SIP user agent that is registered with the server without requiring authentication. Additionally, since no authentication is required, chat messages can be spoofed to appear to come from trusted entities. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. This issue is patched in version 1.10.7. Maintainers recommend that this SIP message type is authenticated by default so that FreeSWITCH administrators do not need to be explicitly set the `auth-messages` parameter. When following such a recommendation, a new parameter can be introduced to explicitly disable authentication. CVE-2021-37614In certain Progress MOVEit Transfer versions before 2021.0.3 (aka 13.0.3), SQL injection in the MOVEit Transfer web application could allow an authenticated remote attacker to gain access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, or execute SQL statements that alter or delete database elements, via crafted strings sent to unique MOVEit Transfer transaction types. The fixed versions are 2019.0.7 (11.0.7), 2019.1.6 (11.1.6), 2019.2.3 (11.2.3), 2020.0.6 (12.0.6), 2020.1.5 (12.1.5), and 2021.0.3 (13.0.3). CVE-2021-37605In the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being being validated / updated prior to message authentication. CVE-2021-37604In the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being validated/updated prior to message authentication. CVE-2021-37580A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0 CVE-2021-37557A SQL injection vulnerability in image generation in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote authenticated (but low-privileged) attackers to execute arbitrary SQL commands via the include/views/graphs/generateGraphs/generateImage.php index parameter. CVE-2021-37556A SQL injection vulnerability in reporting export in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote authenticated (but low-privileged) attackers to execute arbitrary SQL commands via the include/reporting/dashboard/csvExport/csv_HostGroupLogs.php start and end parameters. CVE-2021-37545In JetBrains TeamCity before 2021.1.1, insufficient authentication checks for agent requests were made. CVE-2021-37532SAP Business One version - 10, due to improper input validation, allows an authenticated User to gain access to directory and view the contents of index in the directory, which would otherwise be restricted to high privileged User. CVE-2021-37531SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system. CVE-2021-37470In NCH WebDictate v2.13, persistent Cross Site Scripting (XSS) exists in the Recipient Name field. An authenticated user can add or modify the affected field to inject arbitrary JavaScript. CVE-2021-37469In NCH WebDictate v2.13 and earlier, authenticated users can abuse logprop?file=/.. path traversal to read files on the filesystem. CVE-2021-37447In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via documentdelete?file=/.. for file deletion. CVE-2021-37446In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via documentprop?file=/.. for file reading. CVE-2021-37445In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via logprop?file=/.. for file reading. CVE-2021-37415Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication. CVE-2021-37414Zoho ManageEngine DesktopCentral before 10.0.709 allows anyone to get a valid user's APIKEY without authentication. CVE-2021-37364OpenClinic GA 5.194.18 is affected by Insecure Permissions. By default the Authenticated Users group has the modify permission to openclinic folders/files. A low privilege account is able to rename mysqld.exe or tomcat8.exe files located in bin folders and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues. CVE-2021-37343A path traversal vulnerability exists in Nagios XI below version 5.8.5 AutoDiscovery component and could lead to post authenticated RCE under security context of the user running Nagios. CVE-2021-3723A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session. CVE-2021-37223Nagios Enterprises NagiosXI <= 5.8.4 contains a Server-Side Request Forgery (SSRF) vulnerability in schedulereport.php. Any authenticated user can create scheduled reports containing PDF screenshots of any view in the NagiosXI application. Due to lack of input sanitisation, the target page can be replaced with an SSRF payload to access internal resources or disclose local system files. CVE-2021-37215The employee management page of Flygo contains an Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attacker can manipulate the user data and then over-write another employee&#8217;s user data by specifying that employee&#8217;s ID in the API parameter. CVE-2021-37214The employee management page of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the employee ID in specific parameters to arbitrary access employee's data, modify it, and then obtain administrator privilege and execute arbitrary command. CVE-2021-37213The check-in record page of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the employee ID and date in specific parameters to access particular employee&#8217;s check-in record. CVE-2021-37212The bulletin function of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the bulletin ID in specific Url parameters and access and modify bulletin particular content. CVE-2021-37207A vulnerability has been identified in SENTRON powermanager V3 (All versions). The affected application assigns improper access rights to a specific folder containing configuration files. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges. CVE-2021-37173A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.14.1), RUGGEDCOM ROX RX1400 (All versions < V2.14.1), RUGGEDCOM ROX RX1500 (All versions < V2.14.1), RUGGEDCOM ROX RX1501 (All versions < V2.14.1), RUGGEDCOM ROX RX1510 (All versions < V2.14.1), RUGGEDCOM ROX RX1511 (All versions < V2.14.1), RUGGEDCOM ROX RX1512 (All versions < V2.14.1), RUGGEDCOM ROX RX1524 (All versions < V2.14.1), RUGGEDCOM ROX RX1536 (All versions < V2.14.1), RUGGEDCOM ROX RX5000 (All versions < V2.14.1). The command line interface of affected devices insufficiently restrict file read and write operations for low privileged users. This could allow an authenticated remote attacker to escalate privileges and gain root access to the device. CVE-2021-37172A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (V4.5.0). Affected devices fail to authenticate against configured passwords when provisioned using TIA Portal V13. This could allow an attacker using TIA Portal V13 or later versions to bypass authentication and download arbitrary programs to the PLC. The vulnerability does not occur when TIA Portal V13 SP1 or any later version was used to provision the device. CVE-2021-37158An issue was discovered in OpenGamePanel OGP-Agent-Linux through 2021-08-14. An authenticated attacker could inject OS commands by starting a Counter-Strike server and using the map field to enter a Bash command. CVE-2021-37156Redmine 4.2.0 and 4.2.1 allow existing user sessions to continue upon enabling two-factor authentication for the user's account, but the intended behavior is for those sessions to be terminated. CVE-2021-37153ForgeRock Access Management (AM) before 7.0.2, when configured with Active Directory as the Identity Store, has an authentication-bypass issue. CVE-2021-37152Multiple XSS issues exist in Sonatype Nexus Repository Manager 3 before 3.33.0. An authenticated attacker with the ability to add HTML files to a repository could redirect users to Nexus Repository Manager&#8217;s pages with code modifications. CVE-2021-37151CyberArk Identity 21.5.131, when handling an invalid authentication attempt, sometimes reveals whether the username is valid. In certain authentication policy configurations with MFA, the API response length can be used to differentiate between a valid user and an invalid one (aka Username Enumeration). Response differentiation enables attackers to enumerate usernames of valid application users. Attackers can use this information to leverage brute-force and dictionary attacks in order to discover valid account information such as passwords. CVE-2021-37145** UNSUPPORTED WHEN ASSIGNED ** A command-injection vulnerability in an authenticated Telnet connection in Poly (formerly Polycom) CX5500 and CX5100 1.3.5 leads an attacker to Privilege Escalation and Remote Code Execution capability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. CVE-2021-37123There is an improper authentication vulnerability in Hero-CT060 before 1.0.0.200. The vulnerability is due to that when an user wants to do certain operation, the software does not insufficiently validate the user's identity. Successful exploit could allow the attacker to do certain operations which the user are supposed not to do. CVE-2021-36981In the server in SerNet verinice before 1.22.2, insecure Java deserialization allows remote authenticated attackers to execute arbitrary code. CVE-2021-36949Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability CVE-2021-3694LedgerSMB does not sufficiently HTML-encode error messages sent to the browser. By sending a specially crafted URL to an authenticated user, this flaw can be abused for remote code execution and information disclosure. CVE-2021-3693LedgerSMB does not check the origin of HTML fragments merged into the browser's DOM. By sending a specially crafted URL to an authenticated user, this flaw can be abused for remote code execution and information disclosure. CVE-2021-36921AIMANAGER before B115 on MONITORAPP Application Insight Web Application Firewall (AIWAF) devices with Manager 2.1.0 has Improper Authentication. An attacker can gain administrative access by modifying the response to an authentication check request. CVE-2021-36909Authenticated Database Reset vulnerability in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows any authenticated user to wipe the entire database regardless of their authorization. It leads to a complete website reset and takeover. CVE-2021-36908Cross-Site Request Forgery (CSRF) vulnerability leading to Database Reset in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows attackers to trick authenticated into making unintentional database reset. CVE-2021-36875Authenticated Reflected Cross-Site Scripting (XSS) vulnerability in WordPress uListing plugin (versions <= 2.0.5). Vulnerable parameters: &filter[id], &filter[user], &filter[expired_date], &filter[created_date], &filter[updated_date]. CVE-2021-36874Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5). CVE-2021-36873Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress iQ Block Country plugin (versions <= 1.2.11). Vulnerable parameter: &blockcountry_blockmessage. CVE-2021-36872Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress Popular Posts plugin (versions <= 5.3.3). Vulnerable at &widget-wpp[2][post_type]. CVE-2021-36871Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in WordPress WP Google Maps Pro premium plugin (versions <= 8.1.11). Vulnerable parameters: &wpgmaps_marker_category_name, Value > &attributes[], Name > &attributes[], &icons[], &names[], &description, &link, &title. CVE-2021-36870Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in WordPress WP Google Maps plugin (versions <= 8.1.12). Vulnerable parameters: &dataset_name, &wpgmza_gdpr_retention_purpose, &wpgmza_gdpr_company_name, &name #2, &name, &polyname #2, &polyname, &address. CVE-2021-36845Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. Vulnerable parameters: 1 - "Newsletter" tab, &yith_maintenance_newsletter_submit_label parameter: payload should start with a single quote (') symbol to break the context, i.e.: NOTIFY ME' autofocus onfocus=alert(/Visse/);// v=' - this payload will be auto triggered while admin visits this page/tab. 2 - "General" tab issues, vulnerable parameters: &yith_maintenance_message, &yith_maintenance_custom_style, &yith_maintenance_mascotte, &yith_maintenance_title_font[size], &yith_maintenance_title_font[family], &yith_maintenance_title_font[color], &yith_maintenance_paragraph_font[size], &yith_maintenance_paragraph_font[family], &yith_maintenance_paragraph_font[color], &yith_maintenance_border_top. 3 - "Background" tab issues, vulnerable parameters: &yith_maintenance_background_image, &yith_maintenance_background_color. 4 - "Logo" tab issues, vulnerable parameters: &yith_maintenance_logo_image, &yith_maintenance_logo_tagline, &yith_maintenance_logo_tagline_font[size], &yith_maintenance_logo_tagline_font[family], &yith_maintenance_logo_tagline_font[color]. 5 - "Newsletter" tab issues, vulnerable parameters: &yith_maintenance_newsletter_email_font[size], &yith_maintenance_newsletter_email_font[family], &yith_maintenance_newsletter_email_font[color], &yith_maintenance_newsletter_submit_font[size], &yith_maintenance_newsletter_submit_font[family], &yith_maintenance_newsletter_submit_font[color], &yith_maintenance_newsletter_submit_background, &yith_maintenance_newsletter_submit_background_hover, &yith_maintenance_newsletter_title, &yith_maintenance_newsletter_action, &yith_maintenance_newsletter_email_label, &yith_maintenance_newsletter_email_name, &yith_maintenance_newsletter_submit_label, &yith_maintenance_newsletter_hidden_fields. 6 - "Socials" tab issues, vulnerable parameters: &yith_maintenance_socials_facebook, &yith_maintenance_socials_twitter, &yith_maintenance_socials_gplus, &yith_maintenance_socials_youtube, &yith_maintenance_socials_rss, &yith_maintenance_socials_skype, &yith_maintenance_socials_email, &yith_maintenance_socials_behance, &yith_maintenance_socials_dribble, &yith_maintenance_socials_flickr, &yith_maintenance_socials_instagram, &yith_maintenance_socials_pinterest, &yith_maintenance_socials_tumblr, &yith_maintenance_socials_linkedin. CVE-2021-36841Authenticated Stored Cross-Site Scripting (XSS) vulnerability in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.7, vulnerable parameter &yith_maintenance_newsletter_submit_label. Possible even when unfiltered HTML is disallowed by WordPress configuration. CVE-2021-36823Authenticated Stored Cross-Site Scripting (XSS) vulnerability in WordPress Absolutely Glamorous Custom Admin plugin (versions <= 6.8). Stored XSS possible via unsanitized input fields of the plugin settings, some of the payloads could make the frontend and the backend inaccessible. CVE-2021-36801Akaunting version 2.1.12 and earlier suffers from an authentication bypass issue in the user-controllable field, companies[0]. This issue was fixed in version 2.1.13 of the product. CVE-2021-36767In Digi RealPort through 4.8.488.0, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server. CVE-2021-36749In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1. CVE-2021-36747Blackboard Learn through 9.1 allows XSS by an authenticated user via the Feedback to Learner form. CVE-2021-36746Blackboard Learn through 9.1 allows XSS by an authenticated user via the Assignment Instructions HTML editor. CVE-2021-36745A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations. CVE-2021-3671A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server. CVE-2021-36703The "blog title" field in the "Settings" menu "config" page of "dashboard" in htmly 2.8.1 has a storage cross site scripting (XSS) vulnerability. It allows remote attackers to send an authenticated post HTTP request to admin/config and inject arbitrary web script or HTML through a special website name. CVE-2021-36702The "content" field in the "regular post" page of the "add content" menu under "dashboard" in htmly 2.8.1 has a storage cross site scripting (XSS) vulnerability. It allows remote attackers to send authenticated post-http requests to add / content and inject arbitrary web scripts or HTML through special content. CVE-2021-36654CMSuno 1.7 is vulnerable to an authenticated stored cross site scripting in modifying the filename parameter (tgo) while updating the theme. CVE-2021-3663firefly-iii is vulnerable to Improper Restriction of Excessive Authentication Attempts CVE-2021-36624Sourcecodester Phone Shop Sales Managements System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. CVE-2021-36621Sourcecodester Online Covid Vaccination Scheduler System 1.0 is vulnerable to SQL Injection. The username parameter is vulnerable to time-based SQL injection. Upon successful dumping the admin password hash, an attacker can decrypt and obtain the plain-text password. Hence, the attacker could authenticate as Administrator. CVE-2021-36560Phone Shop Sales Managements System using PHP with Source Code 1.0 is vulnerable to authentication bypass which leads to account takeover of the admin. CVE-2021-36543Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.UnlockDocument.php in SeedDMS v5.1.x <5.1.23 and v6.0.x <6.0.16 allows a remote attacker to unlock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. CVE-2021-36542Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.LockDocument.php in SeedDMS v5.1.x<5.1.23 and v6.0.x <6.0.16 allows a remote attacker to lock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. CVE-2021-36372In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked. CVE-2021-36371Emissary-Ingress (formerly Ambassador API Gateway) through 1.13.9 allows attackers to bypass client certificate requirements (i.e., mTLS cert_required) on backend upstreams when more than one TLSContext is defined and at least one configuration exists that does not require client certificate authentication. The attacker must send an SNI specifying an unprotected backend and an HTTP Host header specifying a protected backend. (2.x versions are unaffected. 1.x versions are unaffected with certain configuration settings involving prune_unreachable_routes and a wildcard Host resource.) CVE-2021-36367PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user). CVE-2021-36359OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3. CVE-2021-36325Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. CVE-2021-36324Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. CVE-2021-36323Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. CVE-2021-36309Dell Enterprise SONiC OS, versions 3.3.0 and earlier, contains a sensitive information disclosure vulnerability. An authenticated malicious user with access to the system may use the TACACS\Radius credentials stored to read sensitive information and use it in further attacks. CVE-2021-36305Dell PowerScale OneFS contains an Unsynchronized Access to Shared Data in a Multithreaded Context in SMB CA handling. An authenticated user of SMB on a cluster with CA could potentially exploit this vulnerability, leading to a denial of service over SMB. CVE-2021-36298Dell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity. CVE-2021-36285Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive NVMe password attempt mitigations in order to carry out a brute force attack. CVE-2021-36284Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive admin password attempt mitigations in order to carry out a brute force attack. CVE-2021-36283Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. CVE-2021-36282Dell EMC PowerScale OneFS versions 8.2.x - 9.1.0.x contain a use of uninitialized resource vulnerability. This can potentially allow an authenticated user with ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH privileges to gain access up to 24 bytes of data within the /ifs kernel stack under certain conditions. CVE-2021-36281Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an incorrect permission assignment vulnerability. A low privileged authenticated user can potentially exploit this vulnerability to escalate privileges. CVE-2021-3628OpenKM Community Edition in its 6.3.10 version is vulnerable to authenticated Cross-site scripting (XSS). A remote attacker could exploit this vulnerability by injecting arbitrary code via de uuid parameter. CVE-2021-36277Dell Command Update, Dell Update, and Alienware Update versions prior to 4.3 contains a Improper Certificate Verification vulnerability. A local authenticated malicious user could exploit this vulnerability by modifying local configuration files in order to execute arbitrary code on the system. CVE-2021-36276Dell DBUtilDrv2.sys driver (versions 2.5 and 2.6) contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required. CVE-2021-36235An issue was discovered in Ivanti Workspace Control before 10.6.30.0. A locally authenticated user with low privileges can bypass File and Folder Security by leveraging an unspecified attack vector. As a result, the attacker can start applications with elevated privileges. CVE-2021-36233The function AdminGetFirstFileContentByFilePath in MIK.starlight 7.9.5.24363 allows (by design) an authenticated attacker to read arbitrary files from the filesystem by specifying the file path. CVE-2021-36232Improper Authorization in multiple functions in MIK.starlight 7.9.5.24363 allows an authenticated attacker to escalate privileges. CVE-2021-36231Deserialization of untrusted data in multiple functions in MIK.starlight 7.9.5.24363 allows authenticated remote attackers to execute operating system commands by crafting serialized objects. CVE-2021-3619Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue, where an authenticated user could abuse MIME filetype sniffing to embed executable code on a malicious upload. This issue was fixed in version 0.6.0. Note that login rights to Velociraptor is nearly always reserved for trusted and verified users with IT security backgrounds. CVE-2021-36181A concurrent execution using shared resource with improper Synchronization vulnerability ('Race Condition') in the customer database interface of FortiPortal before 6.0.6 may allow an authenticated, low-privilege user to bring the underlying database data into an inconsistent state via specific coordination of web requests. CVE-2021-36175An improper neutralization of input vulnerability [CWE-79] in FortiWebManager versions 6.2.3 and below, 6.0.2 and below may allow a remote authenticated attacker to inject malicious script/tags via the name/description/comments parameter of various sections of the device. CVE-2021-36170An information disclosure vulnerability [CWE-200] in FortiAnalyzerVM and FortiManagerVM versions 7.0.0 and 6.4.6 and below may allow an authenticated attacker to read the FortiCloud credentials which were used to activate the trial license in cleartext. CVE-2021-36168A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Fortinet FortiPortal 6.x before 6.0.5, FortiPortal 5.3.x before 5.3.6 and any FortiPortal before 6.2.5 allows authenticated attacker to disclosure information via crafted GET request with malicious parameter values. CVE-2021-36124An issue was discovered in Echo ShareCare 8.15.5. It does not perform authentication or authorization checks when accessing a subset of sensitive resources, leading to the ability for unauthenticated users to access pages that are vulnerable to attacks such as SQL injection. CVE-2021-36123An issue was discovered in Echo ShareCare 8.15.5. The TextReader feature in General/TextReader/TextReader.cfm is susceptible to a local file inclusion vulnerability when processing remote input in the textFile parameter from an authenticated user, leading to the ability to read arbitrary files on the server filesystems as well any files accessible via Universal Naming Convention (UNC) paths. CVE-2021-36122An issue was discovered in Echo ShareCare 8.15.5. The UnzipFile feature in Access/EligFeedParse_Sup/UnzipFile_Upd.cfm is susceptible to a command argument injection vulnerability when processing remote input in the zippass parameter from an authenticated user, leading to the ability to inject arbitrary arguments to 7z.exe. CVE-2021-36121An issue was discovered in Echo ShareCare 8.15.5. The file-upload feature in Access/DownloadFeed_Mnt/FileUpload_Upd.cfm is susceptible to an unrestricted upload vulnerability via the name1 parameter, when processing remote input from an authenticated user, leading to the ability for arbitrary files to be written to arbitrary filesystem locations via ../ Directory Traversal on the Z: drive (a hard-coded drive letter where ShareCare application files reside) and remote code execution as the ShareCare service user (NT AUTHORITY\SYSTEM). CVE-2021-36038Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability in the Multishipping Module. An authenticated attacker could leverage this vulnerability to achieve sensitive information disclosure. CVE-2021-36037Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper improper authorization vulnerability. An authenticated attacker could leverage this vulnerability to achieve sensitive information disclosure. CVE-2021-36032Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability. An authenticated attacker can trigger an insecure direct object reference in the `V1/customers/me` endpoint to achieve information exposure and privilege escalation. CVE-2021-36025Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability while saving a customer's details with a specially crafted file. An authenticated attacker with admin privileges can leverage this vulnerability to achieve remote code execution. CVE-2021-36012Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by a business logic error in the placeOrder graphql mutation. An authenticated attacker can leverage this vulnerability to altar the price of an item. CVE-2021-35984Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability achieve an application denial-of-service in the context of the current user. Exploitation of this issue does not requires user interaction. CVE-2021-35979An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform authentication. CVE-2021-35976The feature to preview a website in Plesk Obsidian 18.0.0 through 18.0.32 on Linux is vulnerable to reflected XSS via the /plesk-site-preview/ PATH, aka PFSI-62467. The attacker could execute JavaScript code in the victim's browser by using the link to preview sites hosted on the server. Authentication is not required to exploit the vulnerability. CVE-2021-35973NETGEAR WAC104 devices before 1.0.4.15 are affected by an authentication bypass vulnerability in /usr/sbin/mini_httpd, allowing an unauthenticated attacker to invoke any action by adding the &currentsetting.htm substring to the HTTP query, a related issue to CVE-2020-27866. This directly allows the attacker to change the web UI password, and eventually to enable debug mode (telnetd) and gain a shell on the device as the admin limited-user account (however, escalation to root is simple because of weak permissions on the /etc/ directory). CVE-2021-35956Stored cross-site scripting (XSS) in the embedded webserver of AKCP sensorProbe before SP480-20210624 enables remote authenticated attackers to introduce arbitrary JavaScript via the Sensor Description, Email (from/to/cc), System Name, and System Location fields. CVE-2021-35941Western Digital WD My Book Live (2.x and later) and WD My Book Live Duo (all versions) have an administrator API that can perform a system factory restore without authentication, as exploited in the wild in June 2021, a different vulnerability than CVE-2018-18472. CVE-2021-35936If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2. CVE-2021-35528Improper Access Control vulnerability in the application authentication and authorization of Hitachi Energy Retail Operations, Counterparty Settlement and Billing (CSB) allows an attacker to execute a modified signed Java Applet JAR file. A successful exploitation may lead to data extraction or modification of data inside the application. This issue affects: Hitachi Energy Retail Operations 5.7.3 and prior versions. Hitachi Energy Counterparty Settlement and Billing (CSB) 5.7.3 prior versions. CVE-2021-35521A path traversal in Thrift command handlers in IDEMIA Morpho Wave Compact and VisionPass devices before 2.6.2 allows remote authenticated attackers to achieve denial of services and information disclosure via TCP/IP packets. CVE-2021-35520A Buffer Overflow in Thrift command handlers in IDEMIA Morpho Wave Compact and VisionPass devices before 2.6.2 allows physically proximate authenticated attackers to achieve code execution, denial of services, and information disclosure via serial ports. CVE-2021-35497The FTL Server (tibftlserver) and Docker images containing tibftlserver components of TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, TIBCO ActiveSpaces - Enterprise Edition, TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, TIBCO FTL - Enterprise Edition, TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contain a vulnerability that theoretically allows a non-administrative, authenticated FTL user to trick the affected components into creating illegitimate certificates. These maliciously generated certificates can be used to enable man-in-the-middle attacks or to escalate privileges so that the malicious user has administrative privileges. Affected releases are TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition: versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, and 4.6.2, TIBCO ActiveSpaces - Developer Edition: versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, and 4.6.2, TIBCO ActiveSpaces - Enterprise Edition: versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, and 4.6.2, TIBCO FTL - Community Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, TIBCO FTL - Developer Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, TIBCO FTL - Enterprise Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, TIBCO eFTL - Community Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, TIBCO eFTL - Developer Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, and TIBCO eFTL - Enterprise Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0. CVE-2021-35495The Scheduler Connection component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server - Community Edition, TIBCO JasperReports Server - Developer Edition, TIBCO JasperReports Server for AWS Marketplace, TIBCO JasperReports Server for ActiveMatrix BPM, and TIBCO JasperReports Server for Microsoft Azure contains an easily exploitable vulnerability that allows an authenticated attacker with network access to obtain FTP server passwords for other users of the affected system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions 7.2.1 and below, TIBCO JasperReports Server: versions 7.5.0 and 7.5.1, TIBCO JasperReports Server: version 7.8.0, TIBCO JasperReports Server: version 7.9.0, TIBCO JasperReports Server - Community Edition: versions 7.8.0 and below, TIBCO JasperReports Server - Developer Edition: versions 7.9.0 and below, TIBCO JasperReports Server for AWS Marketplace: versions 7.9.0 and below, TIBCO JasperReports Server for ActiveMatrix BPM: versions 7.9.0 and below, and TIBCO JasperReports Server for Microsoft Azure: version 7.8.0. CVE-2021-35494The Rest API component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server - Community Edition, TIBCO JasperReports Server - Developer Edition, TIBCO JasperReports Server for AWS Marketplace, TIBCO JasperReports Server for ActiveMatrix BPM, and TIBCO JasperReports Server for Microsoft Azure contain a race condition that allows a low privileged authenticated attacker via the REST API to obtain read access to temporary objects created by other users on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions 7.2.1 and below, TIBCO JasperReports Server: versions 7.5.0 and 7.5.1, TIBCO JasperReports Server: version 7.8.0, TIBCO JasperReports Server: version 7.9.0, TIBCO JasperReports Server - Community Edition: versions 7.8.0 and below, TIBCO JasperReports Server - Developer Edition: versions 7.9.0 and below, TIBCO JasperReports Server for AWS Marketplace: versions 7.9.0 and below, TIBCO JasperReports Server for ActiveMatrix BPM: versions 7.9.0 and below, and TIBCO JasperReports Server for Microsoft Azure: version 7.8.0. CVE-2021-35492Wowza Streaming Engine through 4.8.11+5 could allow an authenticated, remote attacker to exhaust filesystem resources via the /enginemanager/server/vhost/historical.jsdata vhost parameter. This is due to the insufficient management of available filesystem resources. An attacker could exploit this vulnerability through the Virtual Host Monitoring section by requesting random virtual-host historical data and exhausting available filesystem resources. A successful exploit could allow the attacker to cause database errors and cause the device to become unresponsive to web-based management. (Manual intervention is required to free filesystem resources and return the application to an operational state.) CVE-2021-35489Thruk 2.40-2 allows /thruk/#cgi-bin/extinfo.cgi?type=2&host={HOSTNAME]&service={SERVICENAME]&backend={BACKEND] Reflected XSS via the host or service parameter. An attacker could inject arbitrary JavaScript into extinfo.cgi. The malicious payload would be triggered every time an authenticated user browses the page containing it. CVE-2021-35488Thruk 2.40-2 allows /thruk/#cgi-bin/status.cgi?style=combined&title={TITLE] Reflected XSS via the host or title parameter. An attacker could inject arbitrary JavaScript into status.cgi. The payload would be triggered every time an authenticated user browses the page containing it. CVE-2021-35472An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users. CVE-2021-3547OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration. CVE-2021-35464ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier CVE-2021-35395Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device. CVE-2021-35358A stored cross site scripting (XSS) vulnerability in dotAdmin/#/c/c_Images of dotCMS 21.05.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Title' and 'Filename' parameters. CVE-2021-35343Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.Ajax.php in SeedDMS v5.1.x<5.1.23 and v6.0.x<6.0.16 allows a remote attacker to edit document name without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. CVE-2021-35324A vulnerability in the Form_Login function of TOTOLINK A720R A720R_Firmware V4.1.5cu.470_B20200911 allows attackers to bypass authentication. CVE-2021-35296An issue in the administrator authentication panel of PTCL HG150-Ub v3.0 allows attackers to bypass authentication via modification of the cookie value and Response Path. CVE-2021-35233The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies. CVE-2021-35225Each authenticated Orion Platform user in a MSP (Managed Service Provider) environment can view and browse all NetPath Services from all that MSP's customers. This can lead to any user having a limited insight into other customer's infrastructure and potential data cross-contamination. CVE-2021-35217Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data. CVE-2021-35216Insecure Deserialization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module. An Authenticated Attacker with network access via HTTP can compromise this vulnerability can result in Remote Code Execution. CVE-2021-35215Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability. CVE-2021-35213An Improper Access Control Privilege Escalation Vulnerability was discovered in the User Setting of Orion Platform version 2020.2.5. It allows a guest user to elevate privileges to the Administrator using this vulnerability. Authentication is required to exploit the vulnerability. CVE-2021-35212An SQL injection Privilege Escalation Vulnerability was discovered in the Orion Platform reported by the ZDI Team. A blind Boolean SQL injection which could lead to full read/write over the Orion database content including the Orion certificate for any authenticated user. CVE-2021-35193Patterson Application Service in Patterson Eaglesoft 18 through 21 accepts the same certificate authentication across different customers' installations (that have the same software version). This provides remote access to SQL database credentials. (In the normal use of the product, retrieving those credentials only occurs after a username/password authentication step; however, this authentication step is on the client side, and an attacker can develop their own client that skips this step.) CVE-2021-3514When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash. CVE-2021-35049Vulnerability in Fidelis Network and Deception CommandPost enables authenticated command injection through the web interface. The vulnerability could allow a specially crafted HTTP request to execute system commands on the CommandPost and return results in an HTTP response in an authenticated session. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.7 and in version 9.4. Patches and updates are available to address this vulnerability. CVE-2021-35048Vulnerability in Fidelis Network and Deception CommandPost enables unauthenticated SQL injection through the web interface. The vulnerability could lead to exposure of authentication tokens in some versions of Fidelis software. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.7 and in version 9.4. Patches and updates are available to address this vulnerability. CVE-2021-35030A vulnerability was found in the CGI program in Zyxel GS1900-8 firmware version V2.60, that did not properly sterilize packet contents and could allow an authenticated, local user to perform a cross-site scripting (XSS) attack via a crafted LLDP packet. CVE-2021-35029An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device. CVE-2021-35028A command injection vulnerability in the CGI program of the Zyxel VPN2S firmware version 1.12 could allow an authenticated, local user to execute arbitrary OS commands. CVE-2021-34992This vulnerability allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS 6.10. Authentication is required to exploit this vulnerability. The specific flaw exists within Composite.dll. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-14740. CVE-2021-34991This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110. CVE-2021-34863This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the var:page parameter provided to the webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13271. CVE-2021-34862This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the var:menu parameter provided to the webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13270. CVE-2021-34861This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the webproc endpoint, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12104. CVE-2021-34860This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the getpage parameter provided to the webproc endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-12103. CVE-2021-34830
Источник: [https://torrent-igruha.org/3551-portal.html]

!!Quick Search 1.

100%(3)100% found this document useful (3 votes)
4K views4,338 pages

Copyright

© Attribution Non-Commercial (BY-NC)

Available Formats

PDF, TXT or read online from Scribd

Share this document

Share or Embed Document

Did you find this document useful?

100%(3)100% found this document useful (3 votes)
4K views4,338 pages

04
!!Quick Search v1.04
!Advanced Album Editor v3.1
!Advanced Album Editor v4.3
!Advanced Album Editor v4.5
!Custom Addressbook v4.3
!Easy Screen Saver Studio
!Easy ScreenSaver Studio 3.1
!Easy ScreenSaver Studio v3.0
!Easy ScreenSaver Studio v3.1
!Easy ScreenSaver Studio v3.3
!Mail v2.0
!Mail v3.0
!Pearl-express v1.3
!Perl-Express 1.6.5
!perl-express V1.6.5
!Quick Screen Capture 2.1
!Quick Screen Capture 2.1.5
!Quick Screen Capture v1.1
!Quick Screen Capture v2.1
!Quick Screen Capture v2.1.5
!Quick Screen Capture v2.2
!Quick Screen Capture v2.21
!Quick Screen Recorder v1.5
!Quick Screenshot Maker v2.1
!Quick Screenshot Maker v2.10
!QuickCapture v1.05
!Tankz - Battle in The City v1.1
!Tankz Battle in the city v1.0 for PalmOS
!Tankz Battle in the City v1.1 for PalmOS
!TraceRoute
!TraceRoute v2.0.2
#1 ACE Search Engine Submissionn Software v1.0.0
#1 CD Ripper - CD to MP3,CD To WAV,CD To WMA,CD To Ogg with ease! v1.72.21
#1 CD Ripper - CD to MP3,CD To WAV,CD To WMA,CD To Ogg with ease! v1.72.22
#1 CD Ripper v1.7
#1 CD Ripper v1.72.22
#1 CD Ripper v1.72.31
#1 CD Ripper v1.72.34
#1 CD Ripper v1.72.35
#1 CD Ripper v1.72.36
#1 CD Ripper v1.72.38
#1 CD Ripper v1.72.39
#1 CD Ripper v1.72.40
#1 CD Ripper v1.72.41
#1 CD Ripper v1.72.42
#1 CD Ripper v1.72.43
#1 CD Ripper v1.72.46
#1 CD Ripper v1.72.47
#1 CD Ripper v1.72.48
#1 CD Ripper v1.72.49
#1 CD Ripper v1.72.52
#1 CD Ripper v1.72.53
#1 CD Ripper v1.72.55
#1 CD Ripper v1.72.57
#1 CD Ripper v1.72.59
#1 CD Ripper v1.72.62
#1 CD Ripper v1.72.65
#1 CD Ripper v1.72.67
#1 CD Ripper v1.72.69
#1 CD Ripper v1.72.70
#1 CD Ripper v1.72.72
#1 DVD Audio Ripper v1.0
#1 DVD Audio Ripper v1.0.1
#1 DVD Audio Ripper v1.0.13
#1 DVD Audio Ripper v1.0.13 Full
#1 DVD Audio Ripper v1.0.14
#1 DVD Audio Ripper v1.0.16
#1 DVD Audio Ripper v1.0.20
#1 DVD Audio Ripper v1.0.21
#1 DVD Audio Ripper v1.0.26
#1 DVD Audio Ripper v1.0.27
#1 DVD Audio Ripper v1.0.29
#1 DVD Audio Ripper v1.0.3
#1 DVD Audio Ripper v1.0.5
#1 DVD Audio Ripper v1.0.7
#1 DVD Audio Ripper v1.0.9
#1 DVD Ripper Se v1.3.26
#1 DVD Ripper SE v1.3.28
#1 DVD Ripper SE v1.3.30
#1 DVD Ripper SE v1.3.34
#1 DVD Ripper SE v1.3.38
#1 DVD Ripper v1.1
#1 DVD Ripper v1.2
#1 DVD Ripper v1.2.04
#1 DVD Ripper v1.2.05
#1 DVD Ripper v1.2.06
#1 DVD Ripper v1.2.07
#1 DVD Ripper v1.3
#1 DVD Ripper v1.3.
#1 DVD Ripper v1.3.0.8
#1 DVD Ripper v1.3.08
#1 DVD Ripper v1.3.10
#1 DVD Ripper v1.3.11
#1 DVD Ripper v1.3.13
#1 DVD Ripper v1.3.14
#1 DVD Ripper v1.3.15
#1 DVD Ripper v1.3.16
#1 DVD Ripper v1.3.17
#1 DVD Ripper v1.3.18
#1 DVD Ripper v1.3.19
#1 DVD Ripper v1.3.20
#1 DVD Ripper v1.3.21
#1 DVD Ripper v1.3.21 Retail
#1 DVD Ripper v1.3.24
#1 DVD Ripper v1.3.26
#1 DVD Ripper v1.3.26 Full
#1 DVD Ripper v1.3.27
#1 DVD Ripper v1.3.28
#1 DVD Ripper v1.3.31
#1 DVD Ripper v1.3.32
#1 DVD Ripper v1.3.33
#1 DVD Ripper v1.3.34
#1 DVD Ripper v1.3.35
#1 DVD Ripper v1.3.38
#1 DVD Ripper v1.3.40
#1 MP3 To Wav Converter v1.5.04
#1 Mp3 To Wav Converter V1.5.06
#1 MP3 To Wav Converter v1.5.07
#1 Screen Capture
#1 Screen Capture v3.0
#1 Screen Capture v3.1
#1 Screen Capture v3.1.1
#1 Screen Capture v3.1.2
#1 Screen Capture v3.2
#1 Sound Recorder v3.1
#1 Sound Recorder v3.1.1
#1 Video Converter v2.1
#1 Video Converter v3.1.2
#1 Video Converter v3.1.4
#1 Video Converter v3.1.7
#1 Video Converter v3.2.2
#1 Video Converter v3.3.5
#1 Video Converter v3.4.1
#1 Video Converter v3.4.11
#1 Video Converter v3.4.12
#1 Video Converter v3.4.2
#1 Video Converter v3.4.3
#1 Video Converter v3.4.4
#1 Video Converter v3.4.5
#1 Video Converter v3.4.6
#1 Video Converter v3.4.7
#1 Video Converter v3.5.1
#1 Video Converter v3.6.4
#1 Video Converter v3.6.8
#1 Video Converter v3.67
#1 Video Convertor v1.0 us
#1 Video Convertor v3.6.3
#1 Video Convertor v3.6.6
#1 Video Convertor v3.6.7
#1CD Ripper v1.72.35
#1CD Ripper v1.72.62
#PC#Protect Stealth Activity Monitor V v4.01
$Test v1.2.005
$tock Exchange
&O Defrag Professional/Server Edition v4.0.508
.mobile for Desktop PC v1.0.40603.0
.NET Windows Forms Suite NF v1.1.6
@Air v3.0
@Caster 1.0.1
@Caster 1.1.0
@Caster 1.3.0
@Caster v1.0.0
@Caster v1.0.1
@Caster v1.1.0
@Caster v1.3.0
@caster.v1.1.0
@KeyLogger Home v2.0b
@loha D-Lite Walkin' Talkin' Email 1.2
@loha D-Lite Walkin Talkin Email v1.2
@loha D-Lite Walkin' Talkin' Email v1.2
@MailGate 3.1.3
@MailGate v2.76
@MailGate v3.1.3
@micA v1.08d Beta
@Net Clock Time Server v1.02
@NetClock Time Server 1.02
@nyMail 1.5
@nyMail 1.51
@nyMailv1.02
@Office v1.5.18
@Office v1.5.21
@promt Professional English-German v6.0.0.384
@promt Professional English-Russian v6.0.0.300
@promt Professional English-Russian v6.0.0.384
@promt Professional English-Spanish v6.0.0.384
@Spider v1.0
@Spider v1.0.2
@Spider v1.0.3
@Spider v1.1.0
@Spider v1.18
@Spider v1.19
@Spider v1.2
@Spider v1.2.0
@Spider v1.2.1
@Spider v1.2.5
@Spider v1.20
@Spider v1.21
@Spider v1.22
@Spider v1.23
@Spider v1.23 regfile
@Spider v1.24
@Spider v1.5.5
@Spider v1.5.6
@Spider v1.6.7
@Spider v1.7.8
@Spider v1.8.9
@stack LC3 v v3.02
@stacke LC4
@stake L0phtCrack4 v4.00
@stake LC 5 v5.02
@stake LC4
@stake LC4 Password Auditing And Recovery v4.0
@stake LC4 v4.00
@stake LC5
@stake LC5 5.03
@stake LC5 v5.00
@stake LophtCrack v4.0
@udio Organizer 1.11 German
@Your Fingertips v.1.0 build 34
++Mail v2.0
++Mail v3.0
0 Code HTML Converter v1.0
00 Defrag Professional Edition v4.0.508 for WinNT/2K/XP
001 MP3 Encoder 1.0
001 MP3 Encoder v1.0
001 MP3 Encoder v1.0 2K
001 mp3Encoder v2.01
001Spy 1.2
001Spy v1.2
001Spy version 1.2
007 Customer Search Expert v3.0
007 James Bond
007 MP3 Agent v2.2.0.33
007 NightFire
007 nightfire new
007 SESAME 4.2
007 SESAME v4.2
007 SPY Software 2.5
007 Spy Software Pro 3.0
007 Spy Software Pro v3.0
007 Spy Software v1.03
007 Spy Software v1.04
007 Spy Software v1.12
007 Spy Software v1.13
007 Spy Software v1.14
007 Spy Software v1.17
007 SPY Software v2.5
007 Spy Software v2.50
007 Spy Software v3.0
007 Spy Software v3.0 Pro
007 Spy Software v3.01
007 Spy Software v3.03
007 Spy Software v3.04
007 Spy Software v3.06
007 Spy Software v3.12
007 Spy Software v3.17
007 Spy Software v3.18
007 Spy Software v3.19
007 Spy Software v3.2
007 Spy Software v3.20
007 Spy Software v3.32
007 Spy Software v3.33
007 Spy Software v3.4
007 Spy Software v3.41
007 Spy Software v3.42
007 Spy Software v3.45
007 Spy Software v3.6
007 Spy Software v3.60
007 STARR Commander v1.34
007 STARR Commander v2.0
007 STARR Commander v2.21
007 STARR Internet & PC Ueberwachung v1.34
007 STARR PC & Internet Monitor V2.0
007 STARR PC & Internet Monitor v3.0 Home Edition
007 STARR PC & Internet Monitor v3.01 Pro Edition
007 STARR PC & Internet Monitor v3.02
007 STARR PC & Internet Monitor v3.03
007 STARR PC & Internet Monitor v3.06 Pro
007 STARR PC and Internet Monitor Home Edition v3.01
007 STARR PC and Internet Monitor Home Edition v3.11
007 STARR PC and Internet Monitor PRO EDITION v3
007 STARR PC and Internet Monitor Pro Edition v3.02
007 STARR PC and Internet Monitor Pro Edition v3.03
007 STARR PC and Internet Monitor PRO Edition v3.14
007 STARR PC and Internet Monitor v3.0 HOME Edition
007 STARR PC and Internet Monitor v3.02 PRO Edition
007 STARR Stealth Activity Recorder And Reporter v2.21
007 Stealth Activity Monitor (SAM) 4.2
007 Stealth Activity Monitor (SAM) 4.2a
007 Stealth Activity Monitor SAM v4.2
007 Stealth Activity Monitor SAM v4.2a
007 Stealth Activity Monitor v4.2
007 Stealth Activity Monitor v4.2 SAM
007 Stealth Activity Recoder and Reporter (STARR) v1.34
007 Stealth Activity Recoder and Reporter STARR v1.34
007 Stealth Activity Recoder and Reporter v1.34
007 Stealth Activity Recorder & Reporter
007 Stealth Activity Recorder & Reporter (STARR) V1.33
007 Stealth Activity Recorder & Reporter (STARR) v2.0
007 Stealth Activity Recorder & Reporter STARR V1.33
007 Stealth Activity Recorder & Reporter STARR v2.0
007 Stealth Activity Recorder & Reporter v1.1
007 Stealth Activity Recorder & Reporter v1.22
007 Stealth Activity Recorder & Reporter v1.2x
007 Stealth Activity Recorder & Reporter v1.3
007 Stealth Activity Recorder and Reporter (STARR) 1.2
007 Stealth Activity Recorder and Reporter (STARR) 1.34
007 Stealth Activity Recorder and Reporter (STARR) 2.0
007 Stealth Activity Recorder and Reporter (STARR) 2.21
007 Stealth Activity Recorder and Reporter STARR v1.2
007 Stealth Activity Recorder and Reporter STARR v1.33
007 Stealth Activity Recorder and Reporter STARR v1.34
007 Stealth Activity Recorder and Reporter STARR v2.0
007 Stealth Activity Recorder and Reporter STARR v2.1
007 Stealth Activity Recorder and Reporter STARR v2.21
007 Stealth Activity Recorder Reporter (STARR) 2.0
007 Stealth Activity Recorder Reporter STARR v2.0
007 Stealth Activity Reporter v1.23
007 Submitter Pro v1.5.41
007dtf - Direct Transfer Files V1.1
007SpySoftware 3.01
007StealthActivityMonitorVersion4.2
007th ZIG ZAG v2.3
007th Zig-zag 2.3
007th Zig-zag v2.3
008Soft MP3 Splitter v2.0
010 Editor
010 Editor v1.0
010 Editor v1.0.1
010 Editor v1.1
010 Editor v1.1.1
010 Editor v1.2
010 Editor v1.2 regfile
010 Editor v1.3
010 Editor v1.3.2
010 Memorizer v1.0
010 Memorizer v1.0.2
010 Memorizer v1.02
010 Memorizer v1.1
010Editor v1.3.2
010Memorizer v1.1
0190Killer v1.x
0190-Killer v2.0
01Com Communicate I2000 v2.0.886
01Com Communicate v10.0.886
01W Editor for Win95 1
01W Editor v1.0 for Win95
01W Editor v1.0 Win95
01W Sound Editor v6
01W SoundEditor v6.2
024h Lucky Reminder Corporate Edition v1.62
024h Lucky Reminder Corporate Edition v1.70
024h Lucky Reminder v1.4
024h Lucky Reminder v1.41
024h Lucky Reminder v1.5
024h Lucky Reminder v1.5.1
024h Lucky Reminder v1.5.2
024h Lucky Reminder v1.6
024H Lucky Reminder v1.61
024h Lucky Reminder v1.61 regfile
024H Lucky Reminder v1.62
024h Lucky Reminder v1.62 regfile
0-code Email Address Protector v2.0.0.4
0-Code HTML Converter v1.0
0-Code Html Converter v2.0
0-Code Scrollbar Style Creator v1.3
0-Code WYSIWYG Scrollbars Style Creator v1.2
0-Picasso v1.01
0pop v2.05
1 ACE Search Engine Submission v1.0.0
1 ACE Search Engine Submissionn Software v1.0.0
1 Animation Builder v1.0
1 Backup v2.0.1.19
1 Button Launcher Pro v5.0
1 CD Ripper - CD to MP3,CD To WAV,CD To WMA,CD To Ogg with ease! v1.72.25
1 CD Ripper 1.6
1 CD Ripper v1.5
1 CD Ripper v1.6
1 CD Ripper v1.61
1 CD Ripper v1.7
1 CD Ripper v1.71
1 CD Ripper v1.72.17
1 CD Ripper v1.72.22
1 CD Ripper v1.72.24
1 CD Ripper v1.72.25
1 CD Ripper v1.72.27
1 CD Ripper v1.72.30
1 CD Ripper v1.72.57
1 CleanUp v3.2
1 Click & Go 1.2
1 Click & Go v1.2
1 Click & Lock
1 Click & Lock 1.5
1 Click & Lock 2.41
1 Click & Lock v1.5
1 Click & Lock v1.50
1 Click & Lock v1.72
1 Click & Lock v2.41
1 Click & Lock v2.72
1 Click Add n Remove v1.4
1 Click and Go v1.2
1 Click and Lock v2.4
1 Click And Lock v2.51
1 Click And Lock v2.6
1 Click And Lock v2.7
1 Click and Lock v2.72
1 Click And Lock v2.76
1 Click DVD Ripper v2
1 Click DVD Ripper v2.03
1 Click Runner v2.0
1 Click Unzip
1 Click Unzip 2.1.0
1 Click UnziP v 2.1.0
1 Click UnziP v v2.1.0
1 Click Unzip v2.0
1 Click Unzip v2.0.0
1 Click Unzip v2.1
1 Click Unzip v2.1.0
1 Click Unzip v3.00
1 Click Unzip! v2.0
1 Click Unzip! v3.0.0
1 Click Wallpaper v1.2
1 Click& Lock v1.44
1 Cool Bar 1.2
1 Cool Bar v1.2
1 Cool Button Tool v1.0 Flash Version
1 Cool Button Tool v1.6 Flash
1 Cool Button Tool v2.01
1 Cool Button Tool v4.0
1 Cool Button Tool v4.1
1 Cool Button Tool v4.5
1 Cool Button Tool v5.0 Flash
1 DVD Ripper All Versions
1 DVD Ripper Slasher v1.0
1 DVD Ripper v1.1
1 DVD Ripper v1.2
1 DVD Ripper v1.2.0.5
1 DVD Ripper v1.2.04
1 DVD Ripper v1.2.05
1 DVD Ripper v1.2.07
1 DVD Ripper v1.3.08
1 DVD Ripper v1.3.09
1 DVD Ripper v1.3.10
1 DVD Ripper v1.3.11
1 DVD Ripper v1.3.x
1 Form Proposal - Invoice v1.5
1 Form Proposal Invoice v1.0
1 Form Proposal Invoice v1.1
1 Form Proposal Invoice v1.31
1 Form Proposal Invoice v1.4
1 Form Proposal-Invoice
1 Form Proposal-Invoice v1.0
1 Form Proposal-Invoice v1.2
1 Form Proposal-Invoice v1.3
1 Form Proposal-Invoice v1.31
1 Form Proposal-Invoice v1.4
1 Form Proposal-Invoice v1.4.r2
1 Form Proposal-Invoice v1.5
1 Form Proposal-Invoice v1.5r3
1 Form Proposal-Invonce v1.31
1 Form Proposal-Invonce v1.4
1 Great Craps Game v1.3.6
1 Moon Above
1 Moon Above 1.0
1 Moon Above ScreenSaver v1.0
1 Moon Above v1.0
1 More Photo Calender v1.0
1 More PhotoCalendar v1.0 German
1- More PhotoCalendar v1.20
1 More PhotoCalendar v1.21
1 More PhotoCalender v1.41
1 More PhotoCalender v1.50
1 More Scanner v1.06
1 More Scanner v1.10
1 More Watermaker v1.00
1 More Watermarker v1.0 German
1 More Watermarker v1.02
1 More Watermarker v1.10
1 MP3 Radio V2.1.3.2
1 MP3 To WAV Converter v1.5.03
1 of Us 2.5 for PalmOS
1 of Us v2.5 for PalmOS
1 Screen Capture
1 Screen Capture v3.1.1
1 st DVD Ripper v5.0.7
1 st Mass Mailer v2.3
1 Step MP3 to Audio CD Maker v2.0
1 Step UnZip v2.0
1 Step Unzip v2.0.0
1 Ugly FTP v2.30
1 Ugly FTP v2.30 loader
1/2 Convert! v1.0
1+2
10 Archivi Millennuim
10 Finger Schreibtrainer v2.0.1
10 Finger Schreibtrainer v2.0.1 German
10 Finger-Schreibtrainer v2.0.1
10 Finger-Schreibtrainer v2.0.1 trainer
10 Meter Contest Log v2.1
10 Meter Contest v1.7
10 Minute Guide To Practical UNIX v2.0
10 Minute Guide To Practical UNIX vv3.1, 8.0, 9.3
10 Minute Guide To Practical UNIX vv3.1, v8.0, v9.3
10 mn guide to Unix v2.0
10 Sek. Haushaltsbuch v.2.03 German
10 sek. Haushaltsbuch v1.1.1
10 Sekunden CD Verwaltung v2.02 German
10 Sekunden Haushaltsbuch v1.11
10 Sekunden Haushaltsbuch v1.14
10 Sekunden Haushaltsbuch v1.15
10 Sekunden Haushaltsbuch v1.18
10 Sekunden Haushaltsbuch v1.19
10 Sekunden Haushaltsbuch v1.20 German
10 Sekunden Haushaltsbuch v2.01
10 Sekunden Haushaltsbuch v2.02
10 Sekunden Haushaltsbuch v2.08 German
10 Sekunden Haushaltsbuch v2.09
10 Sekunden Haushaltsbuch v2.11
100 Happy Dollars 3D ScreeenSaver v1.3
100 Happy Dollars 3D ScreeenSaver v1.6
100 Happy Dollars 3D Screen Saver v1.6
100 Percent Word Search v2.2
100% Popup Flash Killer v3.9
100,000+ MGAWEB Super Submission v1.69
1000 - Lots of Happiness in the Game v1.0
1000 Lots Of Happiness In The Game v1
1000 Lots Of Happiness In The Game v1.1
1001 Killer Internet Marketing Tactics
1001 Killer Internet Marketing Tactics New
1001 Killer Internet Marketing Tactics v1.3
1001 Killer Internet Marketing Tacticts v1.2
1001 Lines v3.01
100XCD v2.4 Retail
100xCD v2.5
100xCD v2.7
101 Airborne Invasion of Normandy Update 1.2.3
101 Airborne Invasion of Normandy Update v1.2.3
101 Bluck Email Direct Sender v2.0.81
101 Email Address Extractor v2.2.4
101 Email Address Spider v3.2.9
101 Mailing List Remover v2.0.1
10-10 QSO Party Log v1.3
1024 S Pro 2003 Professional v12.15
10Arkivi 3.0
10Arkivi v3.0
10D Remote v1.1
10DRemote v1.0
10DRemote v1.1
10sec Haushaltsbuch 1.18
10sec Haushaltsbuch 1.18 german
10sec Haushaltsbuch v1.18
10sec Haushaltsbuch v1.18 German
10sek Haushaltsbuch 1.19
10sek Haushaltsbuch v1.19
10-Sekunden-Haushaltsbuch v1.17
10-Strike FTPrint v3.43
10-Strike Log-Analyzer v1.3
10-Strike Log-Analyzer v1.4
10-Strike MP3-Scanner
10-Strike MP3-Scanner v1.0
10-Strike MP3-Scanner v1.02
10-Strike MP3-Scanner v1.0b
10-Strike MP3-Scanner v1.2
10-Strike MP3-Scanner v1.4
111 Quick Installer v2.1
111 Quick Installer v2.2
111 Quick Reinstaller 2.2
111 Quick Reinstaller 2.21
111 Quick Reinstaller 2.5
111 Quick Reinstaller v1.0
111 Quick Reinstaller v2.01
111 Quick Reinstaller v2.2
111 Quick Reinstaller v2.21
111 Quick Reinstaller v2.5
111 Zondulux v1.0
11view v1.0
12 Ghost
12 Ghosts 99.1d
12 Ghosts HiSpirit XP 15
12 Ghosts HiSpirits XP 30
12 Ghosts Wash V21.0.25
12! The Series: Pyramid Memory Dominoes v1.8
12!The Series... Pyramid 1.0
12!The Series... Pyramid v1.0
123 Audio CD Ripper v1.8.0
123 Audio CD Ripper v1.80
123 Audio CD Ripper v1.80.us
123 Audio CD Ripper v2.10
123 AVI To GIF
123 Avi to Gif Converter 1.0
123 Avi to Gif Converter v1.0
123 Avi To Gif Converter v1.0.0.1
123 AVI to GIF v1.0
123 Bulk Email Direct Sender 2003 v3.40
123 CD Extractor 1.5
123 CD Extractor v1.5
123 CD Extractor v1.70
123 CD Extractor v2.10
123 CD Ripper v1.50
123 CD Ripper v1.70
123 CD Ripper v1.80
123 CD Ripper v2.10
123 CD to MP3 Ripper v1.60
123 Cleaner v3.20
123 Copy DVD Demo v1.6.2
123 File Splitter 4.0
123 File Splitter v4.0
123 File Splitter v4.0 2K
123 Flash Me v2.0 build 132
123 Flash Me v2.0 build 141
123 Flash Me v2.0.132
123 Flash Menu v1.02
123 Flash Menu v1.2
123 Flash Screensaver Builder Pro Plus v2.0.2.242
123 Flash Screensaver Builder Pro Plus v2.0.2.269
123 Flash Screensaver Maker Professional Plus Editor v2.0.2.242
123 Gif Jpg Optimizer v2.0
123 Gif/Jpg Optimizer
123 Gif/Jpg Optimizer v2.0
123 Graphic Converter v1.5
123 Graphic Converter v1.559
123 Graphic Converter v2.1.8.48
123 Graphic Converter XP v3.0.0.1
123 Hidden Sender v2.41
123 Hidden Sender v2.42
123 Icon Hunter v1.0
1-2-3 Key
123 MP3 Wav Converter & Player v3.0
123 MP3 Wav Converter & Player v3.1
123 MP3 Wav Converter 3.1
123 MP3 Wav Converter and Player
123 MP3 WAV Converter and Player v3.1
123 MP3 WAV Converter v3.1
123 MP3 Wav Converter&Player v3.1
123 Outlook Express Backup
123 Outlook Express Backup Enterprise Edition v1.10.052604
123 OutLook Express Backup Enterprise Edition v1.20
123 Outlook Express Backup v1.02
123 OutLook Express Backup v1.20
123 Passwords 98 v1.0
123 Photo Screensaver Builder Pro Plus v2.0.2.239
123 Photo Screensaver Builder Pro Plus v2.0.2.266
123 Photo Screensaver Builder Professional Plus v2.0.2.239
123 PosiTrax v1.02
123 Screensaver Maker v2.2
123 ScreenSaver Maker v3.0
123 Slide Master v1.0.56
123 Slide Master v1.0.61
123 Sound Recorder v1.60
123 Sound Recorder v1.60.us
123 Super Pair
1-2-3 SuperPairs
123 TERMINAL SERVER FINAL v1.0
123 Terminal Server v1.0 Final
123 Terminal Server v1.2 build 1628
123 WEB STORY v1.04
123 WebStory 1.04
123 WebStory 1.13
123 WebStory v1.04
123 WebStory v1.13
1-2-3 Word Search Maker
123 Word Search Maker v1.0.0.2
1-2-3 Word Search Maker v1.0.0.2
123 XPC Spy v2.10
123 ZIP v2.0
123 ZIP! 3.0
123 ZIP! v2.0
123 ZIP! v3.0
123!Zip v2.0
123.Flash.Me.v2.0.141
12345-Wizard v1.25
123Backup 1.70
123Backup v1.70
123ColorPicker v1.01
123ColorPicker v1.2
123Flash Me v2.0 Build 141
123Graphic Converter
123Graphic Converter v1.5
123GraphicConverter v1.5.2.3 keymaker
123GraphicConverter v1.5.5.9
123Icon Hunter 1.0
123Icon Hunter v1.0
123IconHunter v1.0
123Learn Barnyard Friends v1.6
123Learn Forest Field Trip v1.6
123Learn Jungle Adventure v1.6
123Learn Money Matters v1.6
123Learn Puzzle Pals v1.6
123Learn Sounds of the City v1.6
123Loganalyzer v2.10
123Pe v4.2.7
123Pet v4.2.5
123Pet v4.2.7
123Pet v4.2.8
123Pet v4.3.3
123Pet v4.3.4
123pet v4.3.5
123-Project Management Software v2.1H
123-Project Management Software v2.1L
123-Project Management v1.1a
123-Project Management v1.6h
123-Project Management v1.6K
123-Project v1.6M
123Tag v1.1.13
123Tag v1.1.20
123Tag v1.11
123Tag v1.11 regfile
123Tag v1.12.0
123Violino German v1.01
123Wash All Home Edition v3.42
123WashAll Professional v3.15
125% Service-Providers Marketing Software Win95
125% ServiceProviders Marketing Win95
128Gamma Encryption v3.0
128Gamma Encryption v3.0c
128Gamma Encryption v3.5
128Gamma v3.0
1-2-Convert v1.0
12Ghost SuperGee v6.0.10
12Ghosts
12Ghosts 21.02.1c
12Ghosts 21.0x
12Ghosts 21.50f
12Ghosts 21.51a
12Ghosts 21.5c
12Ghosts 2ndBackup 21.02e
12Ghosts Backup
12Ghosts Backup v7.05.3878
12Ghosts Backup v7.06.3928
12Ghosts Backup v7.07
12Ghosts DeskTOP
12Ghosts DeskTOP 21.02e
12Ghosts Desktop Utilities v2032
12Ghosts HiSpirit 08
12Ghosts HiSpirits XP
12Ghosts HiSpirits XP 10
12Ghosts HiSpirits XP 11
12Ghosts HiSpirits XP 12
12Ghosts HiSpirits XP 31
12Ghosts HiSpirits XP.0.2.0
12Ghosts HiSpirits XP.01
12Ghosts HiSpirits XP.02
12Ghosts HiSpirits XP.03
12Ghosts HiSpirits XP.04
12Ghosts HiSpirits XP.06
12Ghosts HiSpirits XP.08
12Ghosts HiSpirits XP.10
12Ghosts HiSpirits XP.11
12Ghosts HiSpirits XP.20
12Ghosts HiSpirts XP v5.05
12Ghosts HiSpirts XP.03
12Ghosts HiSpirts XP.04
12Ghosts JumpReg 21.02e
12Ghosts Notepad 21.02e
12Ghosts Office Pro v2032
12Ghosts Pro + all 12 single Programs v21.5.1.2
12Ghosts Pro + all 12 single Programs v21.5.20
12Ghosts Pro 21.01c
12Ghosts Pro 21.01d Halloween Edition
12Ghosts Pro 21.02
12Ghosts Pro 21.02a
12Ghosts Pro 21.02g
12Ghosts Pro 21.04a
12Ghosts Pro 21.05b
12Ghosts Pro 21.50d
12Ghosts Pro 21.50e
12Ghosts Pro 21.50f
12Ghosts Pro 21.52
12Ghosts Pro 21.53
12Ghosts Pro 21.54
12Ghosts Pro 21.6.0.0
12Ghosts Pro 21.60
12Ghosts Pro v21.02e
12Ghosts PRO v21.03c
12Ghosts Pro v21.05b
12Ghosts Pro v21.52
12Ghosts Pro v21.53
12Ghosts Pro v21.54
12Ghosts Pro v21.60
12Ghosts ProfileCopy
12Ghosts ProfileCopy 21.02e
12Ghosts Quickstart 21.02e
12Ghosts ReplaceInFiles 21.02e
12Ghosts SaveLayout 21.02e
12Ghosts ScreenSavMan 21.02e
12Ghosts Security System 2032
12Ghosts SetTextColor 21.02e
12Ghosts ShellX 21.02e
12Ghosts ShowTime 21.02e
12Ghosts Shredder 21.02e
12Ghosts ShutDown 21.02e
12Ghosts SuperGee Backup v1.02.3738
12Ghosts SuperGee Backup v7.02.3738
12Ghosts SuperGee Shredder v1.02.3738
12Ghosts SuperGee Shredder v7.02.3738 regfile
12Ghosts SuperGee v1.15
12Ghosts SuperGee v6.0
12Ghosts SuperGee v6.0 regfile
12Ghosts SuperGee v6.1.1
12Ghosts SuperGee v6.1.2
12Ghosts SuperGee v6.1.3
12ghosts Supergee V6.1.4
12Ghosts SuperGee v6.1.5
12Ghosts SuperGee v6.2.1
12Ghosts SuperGee v6.2.1.3598
12Ghosts SuperGee v7.0.4.3821
12Ghosts SuperGee v7.0.5
12Ghosts SuperGee v7.0.5.3878
12Ghosts SuperGee v7.0.6.3928
12Ghosts SuperGee v7.0.9.4093
12Ghosts SuperGee v7.05
12Ghosts SuperGee v7.05.3878
12Ghosts SuperGee v7.09
12Ghosts Synchronizer 21.02
12Ghosts Synchronizer 21.02e
12Ghosts Timer 21.02e
12Ghosts TrayClock 21.02e
12Ghosts v21.5d
12Ghosts Wash 21.0.25
12Ghosts Wash 21.02
12Ghosts Wash 21.02d
12Ghosts Wash XP v6.0
12Ghosts WinControl 21.02e
12Ghosts XP.0.3.0
12Ghosts XP/11 April-04-2002
12Ghosts XP/12
12Ghosts Zip
12Ghosts Zip 21.02e
12Ghosts.SuperGee.v7.02.3738
12Ghosts21.5.3.0
12Ghots SuperGee v6.16
13 Out Card Game for Windows v4.0
13 Photos de Sandra Bullock Denudee ScreenSaver
1-4 All v0.92 for Windows
1475 Leonardo da Vinci Calculator v1.21
1475 Leonardo da Vinci Calculator v1.22
1475 Leonardo da Vinci Calculator v1.23
1-4-All English Version
1-4-All HTML Editor 2.10
1-4-All HTML editor v1.0
1-4-ALL HTML Editor v2.1
1-4-All HTML Editor v2.10
14ALL HTML Editor Ver v2.1
1-4-All v2.10
14allCalc v1.4
15 Pack v1.29 us
15 Slide 1.00
15 Slide v1.00
150 Business ideas v1.25
150 Business ideas v2.0
1503 A.D : A New World
1503 A.D : Polish
1503 A.D: The New Wor
1503 A.D: The New World
1503 AD The New World
15Pack v1.25
15-Pack v1.25
15Pack v1.25 2K
15-Pack v1.29
15-Pack v1.x
15Slide v1.1
168 Digital Mixer Editor
168rc digital mixer editor v2.0
18 August 1998
18 Wheels Of Steel Pedal To The Metal
18 Wheels Of Steel Pedal To The Metal cheats
18 Wheels Of Steel: Pedal To The Metal Download
18 WoS Pedal To The Metal v1.02B NoCD
18-Aug-98
1930 Ford Screen Saver Retail
1939 BattleFleet
1939 BattleFleet v1.20.7
1939 BattleFleet v1.20.8
1939 BattleFleet v1.5
1939 BattleFleet v1.55
1939 BattleFleet v1.77.0.3
1939: BattleFleet v1.0
1941 Operation Typhoon v1.0b
1941 Operation Typhoon v1.0c
1942 Battlefield Road to Rome
1942 Battlefield Secret Weapons of WWII
1942 Campaign for Malaya v1.0
1945 Operation Konrad v1.0
1996 v1.0
1999 Fractal Calender
1999 New Year Slots v1.1
1999 The World Book Encyclopedia
1C
1C v7.7 HASP Emulator
1C-Buhgalteria v.7.5 & 7.7 HASP-emulator
1C-Buhgalteria v.7.5 & v7.7 HASP-emulator
1C-Buhgalteria v.X.X
1Cleanup v3.2
1CleanUp.v3.0
1Click & Lock v1.50
1Click and Lock v1.5
1Click and Lock v1.5 2K
1Click and Lock v1.50
1Click DVD Backup v3.2.0.10
1Click DVD Copy v3.0.0.5
1click DVD Ripper v1.03
1Click DVD Ripper v2.03
1Click DVD to Divx Avi v1.21
1Click DVD to Divx xVid Avi v1.21
1Click DVD to SVCD v2.12
1Click DVD to VCD v1.08
1Click DVD to VCD v2.08
1Click Unzip 2.1
1Click Unzip v2.1
1ClickDVDcopy
1ClickFormFiller v2.0
1ClickFormFilter
1ClickPicGrabber v2.0
1-Click-Quotes/Stock Watch v1.0.0
1ClickUnzip v3.00
1ClickUnzip v3.00 English
1ClickUnzip v3.00 English - Ghosthunter
1ClickWebSlideShow v2.0.0.24
1ClickWebSlideShow v2.0.0.25
1ClickWebSlideShow v2.0.0.27
1ClickWebSlideShow v2.0.0.28
1-Clik Calendar v1.2
1-Clik-Calculator 1.30
1-Clik-Calculator v1.3
1-Clik-Calculator v1.30
1-clik-calendar v1.2
1-Clik-Clock 1.1
1-clik-clock v1.1
1-Clik-Shutter 1.3
1-clik-shutter v1.2
1-Clik-Shutter v1.3
1D Stock Cutter v1.96
1Disk v.2.0.1
1Disk v2.0.0
1Disk v2.0.1
1DNest 2.1.2
1DNest v2.1.2
1DVDRiper v1.2.06
1Form Proposal Invoice v1.5
1lock V1.4
1Lock v1.4 regfile
1-More All Products
1-More PhotoCalendar
1-More PhotoCalendar 1.1
1-More PhotoCalendar v1.0
1-More PhotoCalendar v1.1
1-More PhotoCalendar v1.10
1-More PhotoCalendar v1.20
1-More PhotoCalendar v1.21
1-More PhotoCalendar v1.30
1-More PhotoCalendar v1.41
1-More PhotoCalendar v1.5
1-More PhotoCalendar v1.50
1-More PhotoCalendar v1.60 German
1-More PhotoCalendar v1.70 German
1-More PhotoCalendar v1.71 German
1-More PhotoCalendar v1.73
1-More PhotoCalender v1.0
1-More PhotoCalender v1.21
1-More PhotoManager v1.20
1-More PhotoShow v1.04 German
1-More Scanner
1-More Scanner v1.05
1-More Scanner v1.06
1-More Scanner v1.10
1-More Scanner v1.20
1-More Watermaker v1.10
1-More Watermark v1.10
1-More Watermarker
1-More Watermarker v1.0 German
1-More Watermarker v1.00
1-More Watermarker v1.00 German
1-More Watermarker v1.02
1-More Watermarker v1.10
1-More Watermarker v1.11
1-More WebCam v1.01
1-More-Scanner v1.06
1-More-Scanner v1.10
1-Net Pal v1.1b
1PixView v1.08 German
1-Pro-File v2.1.0.240
1Safe 3.2.96
1Safe v3.2.96
1split2x v2.22
1split2x v2.42
1st Account 1.3
1st Account v1.1
1st Account v1.3
1st Atomic Time 2.0
1st Atomic Time v2.0
1st Audio Mp3 Maker v1.13
1st Audio Splitter Extractor v1.25
1st Benison All Recorder v2.0.12
1st Benison All Recorder v2.1.1
1st Bulk Email Direct Sender 2002 build 1.59
1st Bulk Email Direct Sender 2002 Build v1.59
1st Bulk Email Direct Sender 2002 v1.59
1st Bulk Email Direct Sender 2002 v2.24
1st Bulk Email Direct Sender v2.10
1st Bulk Email Direct Sender v2.15
1st Calculator v1.13
1st Calculator v1.15
1st CD Maker v3.0.1
1st CD Maker v3.0.5
1st CD Ripper 3.1
1st CD Ripper v3.1
1st CD Ripper v4.1.1
1st CD Ripper v5.0.1
1st CD Ripper v5.0.2
1st Choice Accountant v4.0
1st Choice Browse 2000 v5.03
1st Choice Browse 2000 v5.20
1st Choice Browse 2000 v5.22
1st Choice Browse 98 v4.0
1st Choice Browse2000 v5.22
1st Choice Browse2000 v5.3
1st Choice Database 4.10
1st Choice Database v4.10
1st Choice FTP Pro 2000 v7.03
1st Choice FTP Pro 2000 v7.50
1st Choice FTP Pro 2000 v7.60
1st Choice FTP Pro 2000 v7.70
1st Choice FTP Pro 2000 v8.20
1st Choice FTP Pro 2000 v8.4
1st Choice FTP Pro v8.30
1st Choice FTP Pro2000 v7.2
1st Choice FTPPro v8.00
1st Choice FTPPro v8.30
1st Choice FTPPro v8.50
1st Choice FTPPro v8.54
1st Choice FTPPro2000 v7.6
1st Choice FTPPro2000 v7.60
1st Choice FTPPro2000 v7.70
1st Choice FTPPro2000 v7.80
1st Choice FTPPro2000 v8.4
1st Choice HotKeys v4.10
1st Choice Perl Database v4.20
1st Choice Teacher v4.0
1st Choice Zip 4.30
1st Choice Zip 4.40
1st Choice Zip v4.0
1st Choice Zip v4.30
1st Choice Zip v4.40
1st Choics Browse 98 v4.0
1st Class 3000
1ST CLASS IMAGE VIEWER v6.0.1
1st Class Image Viewer v6.01
1st Class View and Print v1.4
1st Clock 2.0
1st Clock v2.0
1st Contact 16-bit v1.05.00 Win
1st Contact 32-bit v1.07.00 Win95/NT4
1st Contact Pro v3.02
1st CONTACT v1.05.00
1st Contact v2.0.04
1st Contact v3.00.0
1st Desktop Guard v1.4
1st Desktop Guard v1.5
1st Desktop Guard v1.50
1st Desktop Guard v1.51
1st Directory Email Spider 2002
1st Directory Email Spider 2002 v1.18
1st DVD Backup Professional v3.0.1 loader
1st DVD Ripper 4.5
1st DVD Ripper v2.7
1st DVD Ripper v4.3
1st DVD Ripper v4.4
1st DVD Ripper v4.5
1st DVD Ripper v4.52
1st DVD Ripper v4.6
1st DVD Ripper v4.7
1st DVD Ripper v4.8
1st DVD Ripper v4.8.2
1st DVD Ripper v4.8.4
1st DVD Ripper v5.0.1
1st DVD Ripper v5.0.2
1st DVD Ripper v5.0.7
1st DVD ripper v5.0.7JCreator Pro v3.10.008
1st DVD Ripper v5.04
1st Email Addres Harvester 2002
1st Email Address Harvester 2002
1st Email Address Harvester 2002 v1.46
1st Email Address Harvester 2002 v2.02
1st Email Address Harvester v1.46
1st Email Address Spider 2002 v2.83
1st Email Address Spider v2.83
1st Email Address Spider v2.94
1st Email Address Verifier 2002 b1.10 regcode
1st Email Address Verifier V1.10
1st Email Address Verifier v1.17
1st Evidence Remover
1st Evidence Remover v1.6
1st Evidence Remover v1.7
1st Evidence Remover v1.73
1st Evidence Remover v2.0
1st Evidence Remover v2.5
1st File Hider v3.22
1st Go Warkanoid 2 WildLife
1st Go Warkanoid 2 WildLife v2.10.1 16 to 32 Bits
1st Go Warkanoid 3 Story Book v3.3.0 trainer
1st Go Warkanoid 3 Story-book v3.3.0 regfile
1st Go Warkanoid II
1st Go Warkanoid II Total Edition v1.89
1st Go Warkanoid II Total Edition v2.89
1st Go Warkanoid II Total v2.7.7
1st Go Warkanoid II Total v2.7.8
1st Go Warkanoid II Total v2.75
1st Go Warkanoid II Total v2.77 Multilingual
1st Go Warkanoid Ii Total V2.8.0
1st Go Warkanoid II Total v2.8.9
1st Go Warkanoid II Total v2.8.9 Multilingual
1st Go Warkanoid II Total v2.89
1st Go Warkanoid II Total v2.9.1
1st Go Warkanoid II Total v2.9.1 trainer
1st Go Warkanoid II v2.7.7
1st Go Warkanoid II WildLife v2.10.0 regfile
1st Go Warkanoid II WildLife v2.10.0 trainer
1st Go Warkanoid II WildLife v2.4
1st Go Warkanoid II WildLife v2.7
1st Go Warkanoid II WildLife v2.7.8
1st Go Warkanoid II WildLife v2.75
1st Go Warkanoid II WildLife v2.77
1st Go Warkanoid II WildLife v2.77 Multilingual
1st Go Warkanoid II WildLife v2.8.0
1st Go Warkanoid II WildLife v2.8.1
1st Go Warkanoid II WildLife v2.8.3
1st Go Warkanoid II WildLife v2.8.4
1st Go Warkanoid II WildLife v2.8.6
1st Go Warkanoid II WildLife v2.8.7
1st Go Warkanoid II WildLife v2.8.9
1st Go Warkanoid II WildLife v2.80
1st Go Warkanoid II WildLife v2.9.0
1st Go Warkanoid II WildLife v2.9.0 trainer
1st Go Warkanoid II WildLife v2.9.1
1st Go Warkanoid II WildLife v2.9.1 trainer
1st Go Warkanoid II WildLife v2.90
1st Go Warkanoid II: Total v2.4.1
1st Go Warkanoid II: Total v2.75
1st Go Warkanoid II: WildLife v2.7
1st Go Warkanoid II: WildLife v2.75
1st Go Warkanoid II: WildLife v2.8.9
1st Go Warkanoid II: WildLife v2.82
1st Go Warkanoid.II Total v2.7.8 Multilingual
1st Go Warkanoid.II WildLife v2.7.7
1st HTML Editor v2.03
1st HTML Editor v2.1 Build 6
1st Ip Port Scanner v2.0
1st Ip Port Scanner v2.0.0.1
1st JAVA Navigator 2000 5.5.0.188
1st JAVA Navigator 2000 v5.5.0.188
1st JAVA Navigator v4.0.0.299
1st JAVA Navigator v4.1
1st JAVA Navigator v5.3.0.355
1st Javascript Library v3.1.1.188
1st Jump v2.0.4
1st Look 2.0.1
1st Look v 2.01
1st Look v v2.01
1st Look v2.0
1st Look v2.0.1
1st Mail Bomber Pro
1st Mail Bomber Pro v8.8
1st Mail Bomber v8.8
1st Mail Bomber v9.0
1st Mail Bomber v9.1
1st Mail Sender v2.4
1st Mail Sender v2.5
1st Mass Mailer v1.8
1st Mass Mailer v2.1
1st Mass Mailer v2.2
1st Mass Mailer v2.3
1st Mass Mailer v2.4
1st Mass Mailer v2.5
1st Mass Mailer v2.6
1st Master Player
1st Mp3 Wav Converter v2.6
1st MP3 Wav Converter v2.60
1st Note 3.0
1st Note v1.13
1st Note v2.0
1st note v3.0
1st Popup Killer And IE Assistant v1.6
1st Position v2.03
1st Position v2.05
1st Position v2.5.2.1
1st Riada Billboard 1.10
1st Riada Billboard v1.10
1st Riada Billboard v1.11.6
1st Riada Headline 1.11
1st Riada Headline v1.11
1st Riada Headline v1.12.2
1st Riada Headline v1.12.5
1st Riada Melt 1.0
1st Riada Melt v1.0
1st Riada Melt v1.10.9
1st Screen Lock v5.3
1st Screen Lock v6.0
1st Screensaver Flash Studio Pro Plus v2.02.297
1st Screensaver Flash Studio Pro Plus v2.02.335
1st Screensaver Flash Studio Pro Plus v2.02.361
1st Screensaver PHOTO Studio Pro Plus
1st Screensaver PHOTO Studio Pro Plus v2.02.177
1st Screensaver Photo Studio Pro Plus v2.02.294
1st Screensaver Photo Studio Professional v2.0.2.293
1st Screensaver PHOTO Studio Standard
1st Screensaver PowerPoint Studio Plus v2.0.2.362
1st Screensaver PowerPoint Studio Pro Plus v2.0.2.362
1st Screensaver PowerPoint Studio Professional Plus v2.0.2.324
1st Screensaver PowerPoint Studio v2.02
1st Screensaver Studio All Products
1st ScreenSaver Studio Standard v2.01
1st ScreenSaver Studio Standard v2.01 NEW
1st Scrensaver Flash Studio PRO v2.0.2.127
1st Scrensaver Flash Studio PRO+ v2.0.2.128
1st Scrensaver Flash Studio Standard v2.0.2.117
1st Scrensaver Photo Studio PRO+ v2.0.2.122
1st Scrensaver Photo Studio Standard v2.0.2.118
1st Scrensaver PowerPoint Studio PRO+ v2.0.2.122
1st Security Administrator Pro
1st Security Administrator Pro v9.2
1st Security Administrator v9.2
1st Security Agent 1.2
1st Security Agent 2.1
1st Security Agent v1.2
1st Security Agent v1.3
1st Security Agent v2.1
1st Security Agent v3.2
1st Security Agent v3.3
1st Security Agent v4.1
1st Security Agent v4.2
1st Security Agent v4.6
1st Security Agent v4.7
1st Security Agent V4.8
1st Security Agent v5.0
1st Security Agent v5.1 Working
1st Security Agent v5.2
1st Security Agent v5.3
1st Security Agent v6
1st Security Agent v6.0
1st Security Agent with 1st Screen Lock v4.3
1st Security Agent with 1st Screen Lock v6.0
1st Security Agent with IE Internet Security v6.0
1st Security Agents v5.2
1st Security Center
1st Security Center Pro v4.2
1st Security Center Pro v4.3.1.1
1st Security Center v3.1.1.2
1st Simple HTML Editor 2.0 build 3
1st Simple HTML Editor v1.1 Build 5
1st Simple HTML Editor v2.0 build 3
1st Simple HTML Editor v2.0.3
1st Simple HTML Editor v2.1 build 5
1st Simple HTML Editor v2.1 Build.5
1st Simple HTML Editor v2.1 Build5
1st Simple HTML Editor v2.1.6
1st SMTP Server 2.0
1st SMTP Server v2.0
1st SMTP Server v2.1
1st SMTP Server v2.2
1st SMTP Server v2.3
1st SMTP Server v2.4
1st SMTP Server v2.5
1st SMTP Server v2.50
1st Sound Recorder
1st Sound Recorder 2.5
1st Sound Recorder v2.5
1st Sound Recorder v2.54
1st Sound Recorder v2.54 Hungarian Language Pack
1st Sound Recorder v4.1.63
1st Sound Recorder v4.1.71
1st Sound Recorder v4.1.75
1st Sound Recorder v4.1.76
1st Source 1.0
1ST SOURCE v1.0
1st STMP Server v2.5
1st Studio Screensaver All Products
1st Tangram Pro v2.0
1st Tangram Pro v2.0 Datecode 20030929
1st Tangram Pro v2.0.DC.20030929
1st There 1.0.0
1st There v1.1
1st TurboRun v1.0
1st Turborun v2.0 loader
1st Up Mail Server v5.0.3
1st Up Net Proxy Server v5.02
1st Up Net Proxy Server v5.03
1st UpNetServer v4.1
1st Video Convert v5.03
1st Video Converter v4.2
1st Video Converter v4.3
1st Video Converter v4.4.2
1st Video Converter v4.42
1st Video Converter v5.0.1
1st Video Converter v5.0.3
1st Video Converter v5.01
1st Video Converter v5.1.1
1st Video Converter v5.1.2
1st Video Converter v5.2.1
1st Video Converter v5.2.2
1st Video Converter v5.2.3
1st Video Converter v5.2.4
1st Video Converter v5.3.1
1st Video Converter v5.3.2
1st Video Converter v5.3.6
1st Video Converter v5.3.7
1st Video Converter v5.3.8
1st Video Converter v5.4.1
1st Warkanoid II : Total v2.8.2
1st Warkanoid II : WildLife v2.8.1
1st Warkanoid II : WildLife v2.9.0
1st Warkanoid II Wildlife v2.0.9
1st Webcollector v1.68
1st.Go.Warkanoid.II.Total v2.7.7
1st.Go.Warkanoid.II.Total v2.7.8 *Multilingual*
1st.Go.Warkanoid.II.WildLife v2.7.7
1stClass 1.01 for Delphi 5
1stClass 3000.0.5 Gold for Delphi 6
1stclass 3000.5
1stClass Professional 2000
1stClass Professional 2000.5
1stClass v1.0 Pre Release 1
1stClass v1.00 Final For Delphi n C
1stClass v1.01
1stClass v1.01 for Delphi 5
1-Step Audio Publisher V2.22
1step MP to CD.maker v1.2.2
1Step MP3 To Audio CD Maker v2.0.0
1Step MP3 To Audio CD Maker v2.0.0 WinAL
1-Step RoboPDF Desktop v3.0
1-Step RoboPDF Server v3.0
1Step UnZip 2.0
1Step UnZip v2.0
1Step.MP3.To.Audio.CD.Maker.v2.0.0
1stImpact v1.2
1stJournal v1.1
1stNote 3.0
1stNote v2.0
1stNote v2.0 *KeyGen*
1stNote v3.0
1-Stop Organizer v1.4
1stRiadaBillboard 1.11.3
1stRiadaBillboard 1.13
1stRiadaBillboard v1.10
1stRiadaBillboard v1.11.3
1stRiadaBillboard v1.11.6
1stRiadaBillboard v1.12.2
1stRiadaBillboard v1.13
1stRiadaBillboard.v1.12.2
1stRiadaButton 1.0.38
1stRiadaButton v1.0.38
1stRiadaHeadline 1.12.2
1stRiadaHeadline 1.12.5
1stRiadaHeadline 1.13.5
1stRiadaHeadline v1.10
1stRiadaHeadline v1.11
1stRiadaHeadline v1.11 build 12
1stRiadaHeadline v1.12
1stRiadaHeadline v1.12.2
1stRiadaHeadline v1.12.5
1stRiadaHeadline v1.13.5
1stRiadaHeadline.v1.12.2
1stRiadaMelt 1.10.6
1stRiadaMelt v1.0
1stRiadaMelt v1.10 build 6
1stRiadaMelt v1.10.6
1stRiadaMelt v1.10.9
1stSource v1.0
1stUp Net Server 5
1TabView v1.0
1to5 FileProcessor 1.0 build Feb-16-2002
1to5 FileProcessor v1.0 build 16.02.2002
1to5 FileProcessor v1.0 build Feb-16-2002
1toX
1toX 2.0
1toX 2.01
1toX 2.52
1toX 2.56
1toX 2.57 May 2001
1toX 2.58
1toX v 2.0
1toX v 2.56 March2001
1toX v 2.58 - September 2001
1toX v v2.56 March2001
1toX v v2.58 - September 2001
1toX v1.51
1toX v1.61
1toX v1.62
1toX v1.63
1toX v1.64
1toX v1.70
1toX v2.0
1toX v2.01
1toX v2.01 -July 2000
1toX v2.03
1toX v2.04
1toX v2.5 - mOcHiVsEh
1toX v2.52
1toX v2.53
1toX v2.54
1toX v2.55
1toX v2.56
1toX v2.57
1toX v2.57 May 2001
1toX v2.57a
1toX v2.58
1toX v2.59
1toX v2.5x
1toX v2.5x (2.59 - January 2002)
1toX v2.60
1toX v2.62
1toX v2.63
1toX v2.64
1toX v2.x
1toX v2.xx (All Versions)
1toX v2.xx All Versions
1toX Version 2.01 -July 2000
1toX.v1.63
1Vision vSERV v3.7
1Way 2.0
1Way Shareware Locking v3.3
1X Net Browser v1.0.0 b67
1X Net Browser v1.0.0 build 67
1x2 STUDIO 2001
1-Zip 2.00.088
1-Zip v2.00.088
2 Block Buster
2 Circuits 1.2
2 Circuits v1.1
2 Circuits v1.2
2 Clear?
2 Dozen Roses 1.1
2 Dozen Roses v1.1
2 Find MP3 5.0
2 Hooked 1.0
2 Hooked 1.1
2 Hooked v1.0
2 Hooked v1.1
2 Hooked! 1.0
2 Hooked! v1.0
2 Phasen Springen v5.3 German
2 Player vs Head To Head [Original] v0.1 - 19-2-2002
2 Plus Block Buster v1.0
2 Plus Block Buster v1.0 trainer
2 Plus Block Buster v1.1
2 Plus Block Buster v1.1 trainer
2 Power 1.1
2 Power v.1.1
2 Power v1.1
2 Power v1.1 Game
2 Thumbs Up v2.0
2 Thumbs Up! 1.0
2 Thumbs Up! 2.0
2 Thumbs Up! v1.0
2+ Block Buster
2+ Block Buster us
20 20 Vision v1.0
20/20 PC Install DOS
20/20 PC-Install for DOS v4.2
20/20 PC-Install for DOS v4.2 Code
20/20 PC-Install for Win95 v4.16
20/20 PC-Install for Win954.16 Code
20/20 PC-Install for Windows v4.16
20/20 PC-Install for Windows v5.08
20/20 PC-Install for Windows4.16 Code
20/20 PC-Install for Windows5.08 Code
20/20 PC-Install Pro v5.08
20/20 Pc-Install Pro v5.08 Code
20/20 softSENTRY Lite for Win95 v1.03
20/20 softSENTRY Lite for Windows v1.03
20/20 softSENTRY Lite forWin95 v1.03 Code
20/20 softSENTRY Lite forWindows v1.03 Code
20/20 softSENTRY v1.03
20/20 softSENTRY v1.03 Code
20/20 v2.2.7
2000 firestorm v1.3
2000 Fractal Calendar
2000LitePC v1.00.0174
2000th FireStorm 2.00
2000th FireStorm Screen Saver
2000th FireStorm Screen Saver v2.0
2000th FireStorm Screensaver
2000th FireStorm ScreenSaver 2.0
2000th FireStorm ScreenSaver 2.00
2000th FireStorm ScreenSaver v2.0
2000th FireStorm screensaver v2.5
2000th FireStorm v1.3
2000th FireStorm v1.30
2000th FireStorm v1.xx
2000th FireStorm v2.0 ME
2000th Firestorm v2.0 PC
2000th Firestorm v2.0 Screensaver
2000th HellFire Screen Saver
2000th HellFire Screen Saver v2.20
2000th HellFire Screensaver
2000th HellFire ScreenSaver 2.20
2000th HellFire ScreenSaver 2.22
2000th HellFIRE screensaver v2.5
2001 Life Explosion ScreenSaver v6.x and v7.0 v4.5
2001 Life Explosion ScreenSaver v7.0
2001 Life Explosions screen saver v7.0
2001 TetRize
2001 Tetrize 1.31
2001 TetRize v1.11
2001 TetRize v1.25 Beta
2001 Tetrize v1.31
2001 TetRize v1.32
2001 TetRize v2.14
2001.TetRize.v2.14
2002 CD Eject 1.75
2002 CD Eject v1.75
2002 FireMagic! Screensaver
2002 Life Explisions 1.a
2002 Life Explisions v1.a
2002 Life Explosions v1.a
2002 Lucky calculator 1.52
2002 Lucky Calculator 1.54
2002 Lucky Calculator v1.52
2002 Lucky Calculator v1.54
2002 Lucky Calculator v1.55
2002 Max Faktura2 v2.830sd
2003 BackGammon 4r
2003 Backgammon v1.0
2003 Backgammon v3r
2003 Backgammon v4r
2003 FireMagic ScreenSaver v2.5
2003 Mahjongg 1r
2003 Mahjongg v1r
2003 Windows Server
2003th FireMagic! screensaver v2.5
2004 Mahjongg v1r
2004 Mahjongg v2r
2020 Install Creator DOS
2020 PC-Install Pro v5.08
2020 PC-Install v4.16 Win
2020 PC-Install v5.08 Win
2020 SoftSentry v1.03
2020 SoftSentry v1.11 Lite Win
20-20 v2.2.7
21 And Fast v1.01
21 And Fast v1.01a
21 And Fast v1.05
21 And Fast v1.10
21 And Fast v1.11 Update
21 And Fast v1.25
21 and Fast v1.26
21 And Fast v1.26.1
21 Dic v5.0
21 Flying Images
21 Flying Images Screen Saver
21 Flying Images ScreenSaver
21 Flying Images ScreenSaver v2.0
21 Flying Images v2.0
21 Hearts
21 Hearts v1.0
21 Media 1.20
21 Media v1.2
21 Media v1.20
21 Run Game Suite v2.01
21 Run Game Suite v4.0
21 Run Game Suite v4.1
21 Run Game Suite v6.0
21 Run GameSuite v1.0
21 Solitaire V1.0.0.0
21 Solitaire v1.0.1.0
21 solitaire v1.0.1.0 loader
21.And.Fast.v1.26.1
21CN Dictonary v1.0
21Dic v5.0
21Hex DockIT ActiveX 1.14
21-Run Game Suit
21st Century Lawyer v3.0
21st Media v1.2
23rd Browser 3.02
23RD Browser v3.02
24x7 Automation Suite v1.4.13
24x7 Automation Suite v1.4.16
24x7 Automation Suite v3.4.1
24x7 Automation Suite v3.4.16
24x7 Automation Suite v3.4.17
24x7 Automation Suite v3.4.18
24x7 Automation Suite v3.4.21
24x7 Automation Suite v3.4.22
24x7 Automation Suite v3.4.5
24x7 Automation Suite v3.4.6
24x7 Automation Suite v3.4.7
24x7 Automation Suite v3.4.8
24x7 Scheduler v1.0
24x7 Scheduler v1.5.0
24x7 Scheduler v1.6.3
24x7 Scheduler v1.61
24x7 Scheduler v2.4.0
25 Number Game v1.4
27 Tools-in-1 Wichio Browser v3.3
2Bitmap v3.4
2CaptureEasy v1.1
2D & 3D A v1.5
2D & 3D Animator 1.2
2D & 3D Animator v1.2
2D & 3D Animator v1.5
2D 3D Animator v1.2
2D 3D Puzzle Dreamy Kiss v1.0
2D 3D Puzzle Dreamy Kiss v1.0 trainer
2D 3D Puzzle Flowers No1 v1.0
2D 3D Puzzle Flowers No1 v1.0 trainer
2D 3D Puzzle Say I Do v1.0
2D 3D Puzzle Say I Do v1.0 trainer
2D 3D Puzzle War Craft No1 v1.0
2D 3D Puzzle War Craft No1 v1.0 trainer
2D and 3D Animator Deluxe v1.4
2D and 3D Animator v1.2
2D and 3D Animator v1.5
2D and 3D Animator v1.5 loader
2D Dwarf Digger v1.0
2D Magic Square v1.0
2D to 3D Red Blue Converter 2.5
2D to 3D Red Blue Converter v2.5
2D Vector Pak for ACDSee v1.0
2D Vector Pak v1.0
2D&3D Animator v1.5
2day v1.31 for PalmOS
2Flyer Screensaver Builder (Standard and Pro) 5.2
2Flyer Screensaver Builder (Standard and Pro) 6.0.1
2Flyer Screensaver Builder (Standard and Pro) 6.0.1 (fixed)
2Flyer Screensaver Builder 3.0
2Flyer Screensaver Builder 5.0.2 Standard and Pro
2Flyer Screensaver Builder 5.2.1 Standard and Pro
2Flyer Screensaver Builder Pro
2Flyer ScreenSaver Builder Pro 3.0
2Flyer Screensaver Builder Pro 6
2Flyer Screensaver Builder Pro and Standard v4.6
2Flyer Screensaver Builder Pro v 3.5
2Flyer Screensaver Builder Pro v v3.5
2Flyer ScreenSaver Builder Pro v3.0
2Flyer Screensaver Builder Pro v4.71
2Flyer ScreenSaver Builder Pro v4.71 v4.8
2Flyer Screensaver Builder Pro v4.8
2Flyer Screensaver Builder Pro v4.8.2
2Flyer Screensaver Builder PRO v5.0.0
2Flyer Screensaver Builder PRO v5.0.2
2Flyer Screensaver Builder Pro v5.2.1
2Flyer Screensaver Builder Pro v6.2
2Flyer Screensaver Builder Pro v6.2.1
2Flyer Screensaver Builder Pro v6.2.2
2Flyer Screensaver Builder Pro v6.21
2Flyer Screensaver Builder Pro v6.22
2Flyer Screensaver Builder Pro v6.3
2Flyer Screensaver Builder Pro v6.3.5
2Flyer Screensaver Builder Pro v6.35
2Flyer ScreenSaver Builder Professional and Standard v6.0.1 (18-August Update)
2Flyer ScreenSaver Builder Professional v4.5
2Flyer Screensaver Builder Professional v4.7
2Flyer Screensaver Builder Professional v4.71
2Flyer Screensaver Builder Professional v4.8
2Flyer Screensaver Builder Professional v4.8.2
2Flyer Screensaver Builder Professional v4.9
2Flyer ScreenSaver Builder Professional v5.0.0
2Flyer Screensaver Builder Professional v5.0.1
2Flyer Screensaver Builder Professional v5.1
2Flyer Screensaver Builder Professional v5.2
2Flyer Screensaver Builder Professional v5.2.1
2Flyer Screensaver Builder Professional v5.2.3
2Flyer ScreenSaver Builder Professional v6.0.1
2Flyer ScreenSaver Builder Professional v6.0.2
2Flyer Screensaver Builder Professional v6.1
2Flyer Screensaver Builder Professional v6.2.2
2Flyer Screensaver Builder Professional v6.20
2Flyer Screensaver Builder Standard and Pro 5.1
2Flyer Screensaver Builder Standard and Pro 6.0
2Flyer Screensaver Builder Standard and Pro v5.0.2
2Flyer Screensaver Builder Standard and Pro v5.1
2Flyer Screensaver Builder Standard and Pro v5.2
2Flyer Screensaver Builder Standard and Pro v5.2.1
2Flyer Screensaver Builder Standard and Pro v6.0
2Flyer Screensaver Builder Standard and Pro v6.0.1
2Flyer ScreenSaver Builder Standard v3.0
2Flyer ScreenSaver Builder Standard v3.5
2Flyer ScreenSaver Builder Standard v4.8
2Flyer ScreenSaver Builder Standard v5.0.0
2Flyer Screensaver Builder Standard v5.0.2
2Flyer ScreenSaver Builder Standart 3.0
2Flyer Screensaver Builder Standart 3.5
2Flyer ScreenSaver Builder Standart v3.0
2Flyer Screensaver Builder Standart v3.5
2Flyer Screensaver Builder Standart v4.8
2Flyer Screensaver Builder v3.0
2Flyer ScreenSaver Builder v3.5
2Flyer Screensaver Builder v5.0.2
2Flyer Screensaver Builder v5.0.2 Standard and Pro
2Flyer Screensaver Builder v5.2.1 Standard and Pro
2Flyer Screensaver Builder v6.0.1
2Flyer Screensaver Builder v6.0.2
2Gif v2.7
2GIF v3.4
2JPEG 1.02
2Jpeg v2.7
2JPEG v3.4
2JPEG v4.0
2LKit Java Encryptor-Obfuscator 1.1
2M Arcade Bubbles 1,3
2M Arcade Bubbles v1.1
2M Arcade Bubbles v1.2
2M Arcade Bubbles v1.3
2M Arcade Bubbles v1.4
2M Arcade Bubbles v1.4a
2M Arcade Bubbles v1.5
2M Arcade Bubbles v1.6
2M Arcade Bubbles v1.7
2M Arcade Bubbles v1.8
2M Arcade Bubbles v1.9
2M Arcade Bubbles v1.9 French
2M Block Swapper v1.7a
2M Blocks Swapper
2M Blocks Swapper v1.0
2M Blocks Swapper v1.2
2M Blocks Swapper v1.4
2M Blocks Swapper v1.5
2M Blocks Swapper v1.6
2M Blocks Swapper v1.7
2M Blocks Swapper v1.7a
2M Blocks Swapper v1.8
2M Blocks Swapper v2.0
2M Blocks Swapper v2.1
2M Blocks Swapper v2.1a
2M Blocks Swapper v2.2
2M Blocks Swapper v2.3
2M Blocks Swapper v2.4
2M Blocks Swapper v2.4a
2M Bubble Lines v1.0a
2M Flower Garden 1,1
2M Flower Garden v1.0
2M Flower Garden v1.1
2M Flower Garden v1.1a
2M Flower Garden v1.2
2M Flower Garden v1.3
2M Flower Garden v1.4
2M Flower Garden v1.4a
2m Puzzles Letters v1.0
2m Puzzles Letters v1.0a
2M Puzzles Letters v1.2
2M Puzzles Letters v1.3
2m Puzzles Letters v1.3b
2m Puzzles Letters v1.3b French
2M Solitaires Collection 1,8
2M Solitaires Collection v1.1
2M Solitaires Collection v1.10
2M Solitaires Collection v1.12
2M Solitaires Collection v1.3
2M Solitaires Collection v1.4
2M Solitaires Collection v1.5
2M Solitaires Collection v1.6
2M Solitaires Collection v1.7
2M Solitaires Collection v1.8
2M Solitaires Collection v1.9
2M Solitaires Collection v2.0
2M Solitaires Collection v2.0a
2M Solitaires Collection v2.0a FRENCH
2M Solitaires v1.3
2M SolitairesCollection v1.1
2M Tetrix Collection
2M Tetrix Collection v1.0
2M Tetrix Collection v1.1
2M Tetrix Collection v1.1a
2M Tetrix Collection v1.2
2M Tetrix Collection v1.4
2M Tetrix Collection v1.5
2M Tetrix Collection v1.6
2M Tetrix Collection v1.7a
2M Tetrix Collection v1.8
2M Tetrix Collection v2.1
2M Tetrix Collection v2.1a
2M Tetrix Collection v2.2
2M Tetrix Collection v2.3
2M Tetrix Collection v2.4
2M Tetrix Collection v2.4a
2M Tetrix Collection v2.5
2M Tetrix Collection v2.5 French
2M Words Collection v1.0
2m Words Collection v1.1
2M Words Collection v1.2
2M Words Collection v1.21a
2M Words Collection v1.2a
2M-Games Multi
2MIDI 1.1
2Mouse v1.00
2nd Millenium Invisible Calculator v1.35
2nd Millennium Invisible Calculator 3.1
2nd Millennium Invisible Calculator v3.1
2nd Speech Center 1.0
2nd Speech Center 1.30
2nd Speech Center v1.0
2nd Speech Center v1.00
2nd Speech Center v1.00 Build 020131
2nd Speech Center v1.10
2nd Speech Center v1.10 build 020415
2nd Speech Center v1.10 Build 020425
2nd Speech Center v1.21
2nd Speech Center v1.21.020904
2nd Speech Center v1.21.021022
2nd Speech Center v1.3
2nd Speech Center v1.30
2nd Speech Center v1.5
2nd Speech Center v1.50
2nd Speech Center v1.50.040216
2nd Speech Center v110 Build 020415
2nd Speech Center v2.00 Build 041216
2nd Speech Center v2.00.041201
2NG v1.4
2Parse v1.0.20
2Remember 1.02
2Remember v1.01
2Remember v1.01 build 1016
2Remember v1.02
2Remind!
2Remind! v1.0
2Remind! v1.0 NEW
2Server Service 1.0.1
2ServerService 1.0.1
2ServerService v1.0.1
2ServerService v1.01
2sky v1.2
2sky v1.2 for PalmOS
2sky v1.22
2sky v1.22 for PalmOS
2Split v1.0
2Split v2.0
2Split! v1.0
2Split! v2.0 Beta
2Spy v1.41
2TGA v1.4
2thumbs up v2.0
2UTimeRecorder v3.7
2WBMP v1.4
2x Cherries Slots 1.1
2X Cherries v1.1
2X Cherries v1.2
2X Cherry Slots
2x Cherry Slots All
2X Cherry Slots v1.2
2x Dynamite Slots 1.1
2x Dynamite Slots 2.0
2x Dynamite Slots V1.1
2x Dynamite Slots v2.0
2X Sevens 2.1
2X Sevens Slots
2X Sevens Slots 3.0 Trainer
2X Sevens Slots v3.0
2x Sevens v2.1
2x Spicy Slots
2x Spicy Slots v1.1
2x Wild Star Slots V1.1
2X Wild Stars
2x Wild Stars Slots 1.1
2X2mas TaskBar 1.0.0.0
2xCalc Business Pack v5.3.4 PalmOS
2xCalc v5.2
2xCalc v5.3.3
2xCalc v5.3.3 for PalmOS
2xCalc v5.3.4 French for PalmOS
2Z's Login Manager
2Z's The Inserter 1.02.0005
3 Blaster 1.1
3 Blaster v1.1
3 Card Rummy Drop 2.0
3 Card Rummy Drop v1.1
3 Card Rummy Drop v2.0
3 Lawyer Dx for PalmOS
3 Magic Sticks 1.0
3 Peak Space
3 Peak Space Cards
3 Peak Space Cards v2.5
3 Solitaires Pack v1.0
3 Strip_It! Digital v5.7.0.218
30 Happy Easter Riddles Screen Saver v5.0
30 Happy Easter Riddles Screen Saver v5.00
30 Happy Easter Riddles Screen Saver v5.00 Us
30 Happy Easter Riddles ScreenSaver v5.0
30 Happy Easter Riddles ScreenSaver v5.00
30 Happy Easter Riddles v5.00
30 Wildlife Scenes Screen Saver v5.0
30 Wildlife Scenes Screen Saver v5.00
30 Wildlife Scenes ScreenSaver v5.00
30 Wildlife Scenes v5.00
3001 Space Oddities Screen Saver v1.1.1
3001 Space Oddities ScreenSaver v1.1.1
3001 Space Oddities ScreenSaver v1.1.x
3001 Space Oddities v1.1.4
3001 Space Oddities v1.1.x
31 for Windows95 Release 5
31 release 4 null
32 BIT EMAIL BROADCASTER v9.25.09
32 bit Email BroadCaster v9.25.16
32 BIT FAX v9.24.01
32 BIT FAX v9.25.09
32 bit FAX v9.25.16
32 bit FaxMail Network n9.34.01
32 BIT FTP v9.25.09
32 BIT FTP v9.32.01
32 BIT WEB BROWSER v9.24.01
32 BIT WEB BROWSER v9.25.09
32 BIT WEB BROWSER v9.25.16
32 Bit Web Browser W9.67.01
32 BITS EMAIL BROADCASTER v9.22.01
32 BITS EMAIL BROADCASTER v9.24.01
32 BITS EMAILBROADCASTER v9.23
32 Card Bridge for Windows v1.6
32 Card Bridge v1.5
32 Card Bridge v1.6
32 Coolmaps Components and Bundles for NetObjects Fusion 5.0
32 EMAIL BROAD CASTER FTP v9.32.01
321 Studio DVD Copy Plus
321 Studio Games X Copy v5.0
321 Studios DVD Copy Plus v4.2
321 studios DVD X Copy Platinum v4.0.3.8
321 Studios Dvd-x-point V2.1.0
321Studios DVD X Copy Platinum v3.2.1
321Studios DVD X Maker v2.0
321Studios DVD X Point v2.0
321Studios DVD X Show 2.0 Full
321Studios DVD X Show v2.0
321Studios DVDXCopy Platinum v3.2.1
321Studios DVDXCopy XPRESS v3.2.1
32bit Convert It
32bit Convert it 32bit Convert It c9.47.14
32Bit Convert It c9.34.01
32bit Convert It c9.35.18
32bit Convert It c9.36.18
32-bit Convert It c9.36.18
32bit Convert It c9.37.01
32bit Convert It c9.38.01
32bit Convert It c9.39.01
32bit Convert It c9.40.01
32bit Convert It c9.41.01
32bit Convert It c9.43.01
32bit Convert It c9.44.01
32bit Convert It c9.44.22
32bit Convert It c9.45.01
32bit Convert It c9.45.11
32bit Convert It c9.46.01
32bit Convert It c9.48.01
32bit Convert It c9.50.01
32bit Convert It c9.60.18.2003
32bit Convert It c9.63.16
32bit Convert It c9.64.01
32bit Convert It c9.65.01
32bit Convert It c9.66.01
32bit Convert It c9.66.19
32bit Convert It c9.67.01
32bit Convert It c9.68.01
32bit Convert It c9.69.01
32bit Convert It c9.70.01
32Bit Convert It c9.72.01
32Bit Convert It c9.72.18
32bit Convert It v.c9.35.01
32bit Convert It v.c9.35.11
32Bit Convert It v.c9.36.18
32Bit Convert It v.c9.37.01
32Bit Convert It v.c9.37.01 NEW
32Bit Convert It v.c9.39.01
32Bit Convert It v.c9.40.01
32Bit Convert It v.c9.47.14
32bit Convert It v.c9.59.01
32bit Convert It v.c9.60.01
32bit Convert It v.c9.60.18
32bit Convert It v.c9.64.01
32bit Convert It v.c9.65.01
32bit Convert It v.c9.65.14
32bit Convert It v.c9.66.01
32bit Convert It v.c9.67.01
32bit Convert It v.c9.68.01
32bit Convert It v.c9.69.01
32bit Convert It v.v9.62.01
32bit Convert It v.v9.65.01
32bit Convert It v.v9.66.01
32bit Convert It v.v9.66.19
32bit Convert It v.v9.67.01
32bit Convert It v.v9.68.01
32bit Convert It v1.57.23
32bit Convert It v9.33.01
32Bit Convert It v9.34.01
32bit Convert It v9.35.01
32Bit Convert It v9.36.01
32bit Convert It v9.36.18
32Bit Convert It v9.39.01
32bit Convert it v9.40.01
32bit Convert It v9.42.01
32bit Convert It v9.44.01
32bit Convert It v9.44.22
32bit Convert IT v9.45.01
32bit Convert IT v9.45.11
32bit Convert It v9.47.01
32bit Convert It v9.47.14
32bit Convert It v9.48.01
32bit Convert It v9.49.01
32Bit Convert It v9.50.01
32bit Convert It v9.51.01
32bit Convert It v9.52.01
32bit Convert It v9.53.01
32bit Convert It v9.54.01
32bit Convert It v9.55.01
32bit Convert It v9.56.01
32bit Convert It v9.56.15
32bit Convert It v9.57.01
32bit Convert It v9.57.23
32bit Convert It v9.58.01
32bit Convert It v9.59.01
32bit Convert It v9.60.01
32bit Convert It v9.60.18
32bit Convert It v9.61.01
32bit Convert It v9.61.19
32bit Convert It v9.62.01
32bit Convert It v9.63.01
32bit Convert It v9.63.16
32bit Convert It v9.64.01
32bit Convert It v9.65.01
32bit Convert It v9.65.14
32bit Convert It v9.66.01
32bit Convert It v9.66.19
32bit Convert It v9.67.01
32bit Convert It v9.68.01
32bit Convert It v9.69.01
32bit Convert It v9.70.01
32bit Convert It v9.71.01
32bit Convert It vc9.42.01
32bit Convert It vc9.54.01
32bit Convert v c9.72.01
32bit Email Broadcaster
32bit Email Broadcaster E9.19.01
32bit Email Broadcaster e9.24.01
32bit Email Broadcaster e9.27.01
32bit Email Broadcaster e9.29.01
32bit Email Broadcaster e9.31.01
32bit Email Broadcaster e9.32.01
32bit Email Broadcaster e9.33.01
32bit Email Broadcaster e9.34.01
32bit Email Broadcaster e9.35.18
32bit Email Broadcaster e9.37.01
32-bit Email Broadcaster e9.37.01
32Bit Email Broadcaster e9.38.01
32bit Email Broadcaster e9.39.01
32bit Email Broadcaster e9.40.01
32bit Email Broadcaster e9.43.01
32bit Email Broadcaster e9.44.01
32bit Email Broadcaster e9.44.22
32bit Email Broadcaster e9.45.01
32bit Email Broadcaster e9.45.11
32bit Email Broadcaster e9.46.01
32bit Email Broadcaster e9.48.01
32bit Email Broadcaster e9.50.01
32bit Email Broadcaster e9.51.01
32bit Email Broadcaster e9.60.18
32bit Email Broadcaster e9.63.16
32bit Email Broadcaster e9.64.01
32bit Email Broadcaster e9.65.01
32bit Email Broadcaster e9.66.19
32bit Email Broadcaster e9.67.01
32bit Email Broadcaster e9.68.01
32bit Email Broadcaster e9.69.01
32bit Email Broadcaster e9.70.01
32Bit Email Broadcaster e9.72.01
32Bit Email Broadcaster e9.72.18
32bit Email Broadcaster e9.73.01
32bit Email Broadcaster e9.74.01
32bit Email Broadcaster e9-30-01
32bit Email Broadcaster v.e9.35.01
32bit Email Broadcaster v.e9.35.11
32Bit Email Broadcaster v.e9.37.01
32Bit Email Broadcaster v.e9.37.01 NEW
32Bit Email Broadcaster v.e9.38.01
32Bit Email Broadcaster v.e9.39.01
32Bit Email Broadcaster v.e9.40.01
32Bit Email Broadcaster v.e9.41.01
32bit Email Broadcaster v.e9.51.01
32bit Email Broadcaster v.e9.59.01
32bit Email Broadcaster v.e9.60.01
32bit Email Broadcaster v.e9.60.18
32bit Email Broadcaster v.e9.64.01
32bit Email Broadcaster v.e9.65.01
32bit Email Broadcaster v.e9.65.14
32bit Email Broadcaster v.e9.66.01
32bit Email Broadcaster v.e9.66.19
32bit Email Broadcaster v.e9.67.01
32bit Email Broadcaster v.e9.68.01
32bit Email Broadcaster v.e9.69.01
32bit Email Broadcaster v.v9.65.01
32bit Email Broadcaster v.v9.65.14
32bit Email Broadcaster v.v9.66.01
32bit Email Broadcaster v.v9.66.19
32bit Email Broadcaster v.v9.67.01
32bit Email Broadcaster v1.57.23
32bit Email Broadcaster v9.18.01
32Bit Email Broadcaster v9.19.01
32Bit Email Broadcaster v9.20.01
32BIT EMAIL BROADCASTER v9.21.01
32bit Email Broadcaster v9.22.01
32bit Email Broadcaster v9.24.01
32bit Email Broadcaster v9.25.01
32bit Email Broadcaster v9.25.23
32bit Email Broadcaster v9.26.01
32bit Email Broadcaster v9.27.01
32bit Email Broadcaster v9.28.17
32bit Email Broadcaster v9.29.01
32bit Email Broadcaster v9.30.01
32bit Email Broadcaster v9.32.01
32bit Email Broadcaster v9.33.01
32bit Email Broadcaster v9.34.01
32Bit Email Broadcaster v9.35.01
32Bit Email Broadcaster v9.35.11
32bit Email Broadcaster v9.35.18
32Bit Email Broadcaster v9.36.01
32bit Email Broadcaster v9.37.01
32Bit Email Broadcaster v9.39.01
32bit Email Broadcaster V9.44.01
32bit Email Broadcaster v9.44.06
32bit Email Broadcaster v9.44.22
32bit Email Broadcaster v9.45.01
32bit Email Broadcaster v9.45.11
32bit Email Broadcaster v9.47.14
32bit Email Broadcaster v9.48.01
32bit Email Broadcaster v9.49.01
32bit Email Broadcaster v9.50.01
32bit Email Broadcaster v9.51.01
32bit Email Broadcaster v9.52.01
32bit Email Broadcaster v9.53.01
32bit Email Broadcaster v9.54.01
32bit Email Broadcaster v9.56.01
32bit Email Broadcaster v9.56.15
32bit Email Broadcaster v9.57.01
32bit Email Broadcaster v9.57.23
32bit Email Broadcaster v9.58.01
32bit Email Broadcaster v9.59.01
32bit Email Broadcaster v9.60.01
32bit Email Broadcaster v9.60.18
32bit Email Broadcaster v9.61.01
32bit Email Broadcaster v9.61.19
32bit Email Broadcaster v9.62.01
32bit Email Broadcaster v9.63.01
32bit Email Broadcaster v9.63.16
32bit Email Broadcaster v9.64.01
32bit Email Broadcaster v9.65.01
32bit Email Broadcaster v9.65.14
32bit Email Broadcaster v9.66.01
32bit Email Broadcaster v9.66.19
32bit Email Broadcaster v9.67.01
32bit Email Broadcaster v9.68.01
32bit Email Broadcaster v9.69.01
32bit Email Broadcaster v9.70.01
32bit Email Broadcaster v9.71.01
32bit Email Broadcaster ve9.42.01
32bit Email Broadcaster version e9.37.01
32bit Fax
32bit Fax 9.43
32bit Fax v.v9.62.01
32bit Fax v.v9.65.01
32bit Fax v.v9.65.14
32bit Fax v.v9.66.01
32bit Fax v.v9.66.19
32bit Fax v.v9.67.01
32bit Fax v.x9.35.01
32Bit Fax v.x9.37.01
32Bit Fax v.x9.39.01
32Bit Fax v.x9.40.01
32Bit Fax v.x9.57.01
32bit Fax v.x9.58.01
32bit Fax v.x9.59.01
32bit Fax v.x9.60.01
32bit Fax v.x9.64.01
32bit Fax v.x9.65.01
32bit Fax v.x9.65.14
32bit Fax v.x9.66.01
32bit Fax v.x9.66.19
32bit Fax v.x9.67.01
32bit Fax v.x9.68.01
32bit Fax v.x9.69.01
32bit Fax v1.57.23
32bit Fax v3.68.01
32bit Fax v9.09.01
32bit Fax v9.11.01
32bit Fax v9.12.01
32bit Fax v9.12.08
32bit Fax v9.13.01
32bit Fax v9.14.01
32bit Fax v9.16.01
32Bit Fax v9.16.11
32bit Fax v9.17.01
32Bit Fax v9.19.01
32Bit FAX v9.20.01
32bit Fax v9.21.01
32bit Fax v9.22.01
32bit Fax v9.23.01
32bit Fax v9.25.01
32bit Fax v9.25.23
32bit Fax v9.26.01
32bit Fax v9.27.01
32bit Fax v9.29.01
32bit Fax v9.30.1
32bit Fax v9.33.01
32bit Fax v9.34.01
32BIT Fax v9.35.01
32Bit Fax v9.35.18
32bit Fax v9.36.01
32Bit Fax v9.39.01
32bit Fax v9.40.01
32bit Fax v9.42.01
32bit Fax v9.43
32bit Fax v9.44.01
32bit Fax v9.44.06
32bit Fax v9.44.22
32bit Fax v9.45.01
32bit Fax v9.45.11
32bit Fax v9.46.14
32bit Fax v9.47.14
32bit Fax v9.48.01
32bit Fax v9.48.11
32bit Fax v9.49.01
32Bit Fax v9.50.01
32bit Fax v9.51.01
32bit Fax v9.52.01
32bit Fax v9.53.01
32bit Fax v9.54.01
32bit Fax v9.55.01
32bit Fax v9.56.01
32bit Fax v9.57.01
32bit Fax v9.57.23
32bit Fax v9.58.01
32bit Fax v9.59.01
32bit Fax v9.60.01
32bit Fax v9.60.18
32bit Fax v9.61.01
32bit Fax v9.61.19
32bit Fax v9.62.01
32bit Fax v9.63.01
32bit Fax v9.63.16
32bit Fax v9.64.01
32bit Fax v9.65.01
32bit Fax v9.65.14
32bit Fax v9.66.01
32bit Fax v9.66.19
32bit Fax v9.67.01
32bit Fax v9.69.01
32bit Fax v9.70.01
32bit Fax v9.71.01
32bit Fax v9.72.01
32bit Fax v9.72.18
32-bit Fax Vx9.37.01
32bit Fax x9.17.01
32bit Fax x9.34.01
32bit Fax x9.39.01 English
32bit Fax x9.40.01
32-bit Fax x9.40.01
32bit Fax x9.42.01
32bit Fax x9.43.01
32bit Fax x9.50.01
32bit Fax x9.57.01
32bit Fax x9.60.18
32bit Fax x9.63.16
32bit Fax x9.64.01
32bit Fax x9.65.01
32bit Fax x9.66.19
32bit Fax x9.67.01
32bit Fax x9.68.01
32bit Fax x9.69.01
32bit Fax x9.70.01
32bit Fax x9.74.01
32bit FaxAmatic
32bit FaxAmatic a9.34.01
32bit FaxAmatic a9.39.01 English
32bit FaxAmatic a9.65.01
32bit FaxAmatic a9.68.01
32bit FaxAmatic a9.72.18
32bit FaxAmatic p9.35.18
32bit FaxAmatic p9.37.01
32bit FaxAmatic v1.57.23
32Bit FaxAmatic v9.40.01
32bit FaxAmatic v9.45.01
32bit FaxAmatic v9.45.11
32bit FaxAmatic v9.49.01
32bit FaxAmatic v9.54.01
32bit FaxAmatic v9.55.01
32bit FaxAmatic v9.57.01
32bit FaxAmatic v9.57.23
32bit FaxAmatic v9.59.01
32bit FaxAmatic v9.60.01
32bit FaxAmatic v9.63.16
32bit FaxAmatic v9.65.01
32bit FaxAmatic v9.65.14
32bit FaxAmatic v9.70.01
32bit FaxMail for Windows v9.45.01
32bit FaxMail for Windows v9.45.11
32bit FaxMail for Windows v9.49.01
32bit FaxMail for Windows v9.65.14
32bit FaxMail for Windows v9.70.01
32bit FaxMail Network for Windows v.v9.62.01
32bit FaxMail Network for Windows v.v9.65.14
32bit FaxMail Network for Windows v.v9.66.01
32bit FaxMail Network for Windows v.v9.66.19
32bit FaxMail Network for Windows v9.45.01
32bit FaxMail Network for Windows v9.45.11
32bit FaxMail Network for Windows v9.49.01
32bit FaxMail Network for Windows v9.62.01
32bit FaxMail Network for Windows v9.65.14
32bit FaxMail Network for Windows v9.66.01
32bit FaxMail Network for Windows v9.66.19
32bit FaxMail Network for Windows v9.69.01
32bit FaxMail Network for Windows v9.70.01
32bit FaxMail Network n9.35.18
32bit FaxMail Network n9.37.01
32BIT FaxMail Network v9.35.01
32Bit Faxmail Network v9.40.01
32bit FaxMail Network v9.54.01
32bit FaxMail Network v9.55.01
32bit FaxMail Network v9.57.01
32bit FaxMail Network v9.59.01
32bit FaxMail Network v9.63.16
32bit FaxMail Network v9.68.01
32bit FaxMail v9.53.01
32bit FaxMail v9.54.01
32bit FaxMail v9.55.01
32bit FaxMail v9.59.01
32Bit FTP
32bit FTP 9.21.01
32bit FTP f9.35.01
32bit FTP f9.68.01
32bit FTP f9.71.01
32bit FTP f9.72.18
32bit FTP p9.08.01
32bit FTP p9.27.01
32bit FTP p9.29.01
32Bit FTP p9.30.01
32bit FTP p9.31.01
32bit FTP p9.33.01
32-bit FTP p9.33.01
32bit FTP p9.35.18
32bit FTP p9.37.01
32bit FTP p9.39.01
32bit FTP p9.39.01 English
32bit FTP p9.40.01
32bit FTP p9.44.01
32bit FTP p9.44.22
32bit FTP p9.45.01
32bit FTP p9.45.11
32bit FTP p9.46.01
32bit FTP p9.50.01
32bit FTP p9.51
32bit FTP p9.54.01
32bit FTP p9.55.01
32bit FTP p9.60.01
32bit FTP p9.60.18
32bit FTP p9.63.16
32bit FTP p9.64.01
32bit FTP p9.65.01
32bit FTP p9.66.19
32bit FTP p9.67.01
32bit FTP p9.68.01
32bit FTP p9.69.01
32bit FTP p9.70.01
32Bit FTP p9.72.01
32Bit FTP p9.72.18
32bit FTP p9.74.01
32Bit FTP p9-27-01
32bit FTP v p9.29.01
32bit FTP v.f9.35.11
32Bit FTP v.p9.37.01
32Bit FTP v.p9.37.01 NEW
32Bit FTP v.p9.39.01 NEW
32Bit FTP v.p9.40.01
32bit FTP v.p9.51
32bit FTP v.p9.54.01
32bit FTP v.p9.59.01
32bit FTP v.p9.60.01
32bit FTP v.p9.60.18
32bit FTP v.p9.64.01
32bit FTP v.p9.65.01
32bit FTP v.p9.65.14
32bit FTP v.p9.66.01
32bit FTP v.p9.67.01
32bit FTP v.p9.68.01
32bit FTP v.p9.69.01
32bit FTP v.v9.62.01
32bit FTP v.v9.65.01
32bit FTP v.v9.65.14
32bit FTP v.v9.66.01
32bit FTP v.v9.66.19
32bit FTP v.v9.67.01
32bit FTP v.v9.68.01
32bit FTP v9.06.01
32bit FTP v9.07.01
32bit FTP v9.08.01
32Bit FTP v9.14.01
32bit FTP v9.15.01
32bit FTP v9.16.01
32Bit Ftp v9.16.20
32Bit Ftp v9.17.01
32bit FTP v9.19.1
32Bit Ftp v9.20.01
32bit FTP v9.21.01
32bit FTP v9.22.1
32bit FTP v9.23.01
32Bit FTP v9.25.01
32bit FTP v9.25.09
32-bit FTP v9.25.16
32bit FTP v9.25.23
32bit FTP v9.26.01
32bit FTP v9.26.15
32bit FTP v9.27.01
32bit FTP v9.29.01
32bit FTP v9.30.1
32bit FTP v9.33.01
32Bit FTP v9.34.01
32bit FTP v9.35.01
32Bit FTP v9.36.01
32Bit FTP v9.39.01
32bit FTP v9.42.01
32bit Ftp V9.44.01
32BIT FTP v9.44.06
32bit FTP v9.44.22
32bit FTP v9.45.01
32bit FTP v9.45.11
32bit FTP v9.46.14
32bit FTP v9.47.22
32bit FTP v9.48.01
32bit FTP v9.48.11
32Bit FTP v9.49.01
32Bit FTP v9.50.01
32bit FTP v9.51.01
32bit FTP v9.52.01
32bit FTP v9.53.01
32bit FTP v9.54.01
32bit FTP v9.56.01
32bit FTP v9.56.15
32bit FTP v9.57.01
32bit FTP v9.57.23
32bit FTP v9.58.01
32bit FTP v9.59.01
32bit FTP v9.60.01
32bit FTP v9.60.18
32bit FTP v9.61.01
32bit FTP v9.61.19
32bit FTP v9.62.01
32bit FTP v9.63.01
32bit FTP v9.63.16
32bit FTP v9.64.01
32bit FTP v9.65.01
32bit FTP v9.65.14
32bit FTP v9.66.01
32bit FTP v9.66.19
32bit FTP v9.67.01
32bit FTP v9.68.01
32bit FTP v9.69.01
32bit FTP v9.70.01
32bit FTP v9.71.01
32Bit FTP Version p9.33.01
32-bit FTP Vf9.37.01
32bit FTP vf9.42.01
32bit FTP vp9.28.01
32bit Internet Fax
32bit Internet Fax i9.63.16
32bit Internet Fax i9.64.01
32bit Internet Fax i9.65.01
32bit Internet Fax i9.67.01
32bit Internet Fax i9.68.01
32bit Internet Fax i9.69.01
32bit Internet Fax i9.70.01
32bit Internet Fax i9.74.01
32bit Internet Fax v.i9.59.01
32bit Internet Fax v.i9.60.01
32bit Internet Fax v.i9.64.01
32bit Internet Fax v.i9.65.01
32bit Internet Fax v.i9.65.14
32bit Internet Fax v.i9.66.01
32bit Internet Fax v.i9.66.19
32bit Internet Fax v.i9.67.01
32bit Internet Fax v.i9.68.01
32bit Internet Fax v.i9.69.01
32bit Internet Fax v.v9.62.01
32bit Internet Fax v.v9.65.01
32bit Internet Fax v.v9.65.14
32bit Internet Fax v.v9.66.01
32bit Internet Fax v.v9.66.19
32bit Internet Fax v.v9.67.01
32bit Internet Fax v.x9.51.0
32bit Internet Fax v1.57.23
32bit Internet Fax v3.68.01
32bit Internet Fax v9.50.01
32bit Internet Fax v9.51.01
32bit Internet Fax v9.53.01
32bit Internet Fax v9.54.01
32bit Internet Fax v9.55.01
32bit Internet Fax v9.56.01
32bit Internet Fax v9.56.15
32bit Internet Fax v9.57.01
32bit Internet Fax v9.57.23
32bit Internet Fax v9.58.01
32bit Internet Fax v9.59.01
32bit Internet Fax v9.60.01
32bit Internet Fax v9.60.18
32bit Internet Fax v9.61.01
32bit Internet Fax v9.61.19
32bit Internet Fax v9.62.01
32bit Internet Fax v9.63.01
32bit Internet Fax v9.63.16
32bit Internet Fax v9.63.16 German
32bit Internet Fax v9.64.01
32bit Internet Fax v9.64.01 German
32bit Internet Fax v9.65.01
32bit Internet Fax v9.65.01 English
32bit Internet Fax v9.65.01 German
32bit Internet Fax v9.65.14
32bit Internet Fax v9.66.01
32bit Internet Fax v9.66.19
32bit Internet Fax v9.67.01
32bit Internet Fax v9.67.01 English
32bit Internet Fax v9.67.01 German
32bit Internet Fax v9.69.01
32bit Internet Fax v9.70.01
32bit Internet Fax v9.71.01
32bit Internet Fax v9.72.01
32bit Internet Fax v9.72.18
32bit Internet Fax x9.51.0
32bit Multi Clipboard m9.39.01
32bit Multi Clipboard m9.68.01
32bit Multi Clipboard m9.71.01
32bit Multi Clipboard m9.72.18
32BIT Multi Clipboard v9.35.0
32Bit Multi Clipboard v9.40.01
32bit Multi Clipboard v9.45.01
32bit Multi Clipboard v9.45.11
32bit Multi Clipboard v9.49.01
32bit Multi Clipboard v9.54.01
32bit Multi Clipboard v9.57.01
32bit Multi Clipboard v9.59.01
32bit Multi Clipboard v9.63.01
32bit Multi Clipboard v9.63.16
32bit Multi Clipboard v9.65.01
32bit Multi Clipboard v9.65.14
32bit Multi Clipboard v9.70.01
32bit Service Monitor
32bit Service Monitor s9.35.01
32bit Service Monitor s9.35.11
32bit Service Monitor s9.35.18
32bit Service Monitor s9.37.01
32bit Service Monitor s9.39.01
32bit Service Monitor s9.40.01
32bit Service Monitor s9.44.01
32bit Service Monitor s9.44.22
32bit Service Monitor s9.45.01
32bit Service Monitor s9.45.11
32bit Service Monitor s9.46.01
32bit Service Monitor s9.50.01
32bit Service Monitor s9.60.18
32bit Service Monitor s9.63.16
32bit Service Monitor s9.64.01
32bit Service Monitor s9.65.01
32bit Service Monitor s9.66.19
32bit Service Monitor s9.67.01
32bit Service Monitor s9.68.01
32bit Service Monitor s9.69.01
32bit Service Monitor s9.70.01
32Bit Service Monitor s9.72.01
32Bit Service Monitor s9.72.18
32bit Service Monitor s9.73.01
32bit Service Monitor s9.74.01
32Bit Service Monitor v.s9.37.01
32Bit Service Monitor v.s9.37.01 NEW
32Bit Service Monitor v.s9.40.01
32bit Service Monitor v.s9.59.01
32bit Service Monitor v.s9.60.01
32bit Service Monitor v.s9.64.01
32bit Service Monitor v.s9.65.01
32bit Service Monitor v.s9.65.14
32bit Service Monitor v.s9.66.01
32bit Service Monitor v.s9.66.19
32bit Service Monitor v.s9.67.01
32bit Service Monitor v.s9.68.01
32bit Service Monitor v.s9.69.01
32bit Service Monitor v.v9.62.01
32bit Service Monitor v.v9.65.01
32bit Service Monitor v.v9.65.14
32bit Service Monitor v.v9.66.01
32bit Service Monitor v.v9.67.01
32bit Service Monitor v.v9.68.01
32bit Service Monitor v1.57.23
32bit Service Monitor v9.35.01
32bit Service Monitor v9.38.01
32Bit Service Monitor v9.39.91
32bit Service Monitor v9.40.01
32bit Service Monitor V9.44.01
32bit Service Monitor v9.44.22
32Bit Service Monitor v9.45.01
32Bit Service Monitor v9.45.11
32bit Service Monitor v9.47.14
32bit Service Monitor v9.48.01
32bit Service Monitor v9.49.01
32Bit Service Monitor v9.50.01
32bit Service Monitor v9.51.01
32bit Service Monitor v9.52.01
32bit Service Monitor v9.53.01
32bit Service Monitor v9.54.01
32bit Service Monitor v9.55.01
32bit Service Monitor v9.56.01
32bit Service Monitor v9.56.15
32bit Service Monitor v9.57.01
32bit Service Monitor v9.57.23
32bit Service Monitor v9.58.01
32bit Service Monitor v9.59.01
32bit Service Monitor v9.60.01
32bit Service Monitor v9.60.18
32bit Service Monitor v9.61.01
32bit Service Monitor v9.61.19
32bit Service Monitor v9.62.01
32bit Service Monitor v9.63.01
32bit Service Monitor v9.63.16
32bit Service Monitor v9.64.01
32bit Service Monitor v9.65.01
32bit Service Monitor v9.65.14
32bit Service Monitor v9.66.01
32bit Service Monitor v9.66.19
32bit Service Monitor v9.67.01
32bit Service Monitor v9.68.01
32bit Service Monitor v9.69.01
32bit Service Monitor v9.70.01
32bit Service Monitor v9.71.01
32bit Service Monitor vs9.34..01
32bit Service Monitor vs9.42.01
32bit Service Monitor vs9.60.01
32bit Service Monitor.v9.57.23
32bit Service s9.35.01
32-bit Service s9.35.01
32bit Web Browser
32bit Web Browser 32 v9.49.01
32bit Web Browser 9.55.01
32bit Web Browser v.v9.65.01
32bit Web Browser v.v9.65.14
32bit Web Browser v.v9.66.01
32bit Web Browser v.v9.66.19
32bit Web Browser v.v9.67.01
32bit Web Browser v.v9.68.01
32Bit Web Browser v.w.9.47.14
32bit Web Browser v.w9.35.01
32bit Web Browser v.w9.35.11
32Bit Web Browser v.w9.37.01
32Bit Web Browser v.w9.37.01 NEW
32Bit Web Browser v.w9.40.01
32bit Web Browser v.w9.59.01
32bit Web Browser v.w9.60.01
32bit Web Browser v.w9.61.x
32bit Web Browser v.w9.64.01
32bit Web Browser v.w9.65.01
32bit Web Browser v.w9.65.14
32bit Web Browser v.w9.66.01
32bit Web Browser v.w9.66.19
32bit Web Browser v.w9.67.01
32bit Web Browser v.w9.68.01
32bit Web Browser v1.57.23
32bit Web Browser v9.24.01
32bit Web Browser v9.25.01
32bit Web Browser v9.25.23
32bit Web Browser v9.26.01
32bit Web Browser v9.27.01
32bit Web Browser v9.28.01
32bit Web Browser v9.29.01
32bit Web Browser v9.30.01
32BIT WEB BROWSER v9.32.01
32bit Web Browser v9.33.01
32bit Web Browser v9.34.01
32bit Web Browser v9.35.01
32Bit Web Browser v9.36.01
32Bit Web Browser v9.39.01
32Bit Web Browser v9.40.01
32bit Web Browser v9.44.01
32bit Web Browser v9.44.06
32bit Web Browser v9.44.22
32bit Web Browser v9.45.01
32bit Web Browser v9.45.11
32bit Web Browser v9.47.14
32bit Web Browser v9.48.01
32bit Web Browser v9.49.01
32Bit Web Browser v9.50.01
32bit Web Browser v9.51.01
32bit Web Browser v9.52.01
32bit Web Browser v9.53.01
32bit Web Browser v9.54.01
32bit Web Browser v9.55.01
32bit Web Browser v9.56.01
32bit Web Browser v9.56.15
32bit Web Browser v9.57.01
32bit Web Browser v9.57.23
32bit Web Browser v9.58.01
32bit Web Browser v9.59.01
32bit Web Browser v9.60.01
32bit Web Browser v9.60.18
32bit Web Browser v9.61.01
32bit Web Browser v9.61.19
32bit Web Browser v9.62.01
32bit Web Browser v9.63.01
32bit Web Browser v9.63.16
32bit Web Browser v9.64.01
32bit Web Browser v9.65.01
32bit Web Browser v9.65.14
32bit Web Browser v9.66.01
32bit Web Browser v9.66.19
32bit Web Browser v9.67.01
32bit Web Browser v9.68.01
32bit Web Browser v9.69.01
32bit Web Browser v9.70.01
32bit Web Browser v9.71.01
32bit Web Browser vw9.24.01
32bit Web Browser vw9.60.01
32bit Web Browser w.9.47.14
32bit Web Browser w9.27.01
32bit Web Browser w9.31.01
32bit Web Browser w9.34.01
32bit Web Browser w9.35.18
32bit Web Browser w9.37.01
32bit Web Browser w9.38.01
32bit Web Browser w9.38.01 English
32bit Web Browser w9.40.01
32bit Web Browser w9.42.01
32bit Web Browser w9.43.01
32bit Web Browser w9.44.22
32bit Web Browser w9.45.01
32bit Web Browser w9.45.11
32bit Web Browser w9.46.01
32bit Web Browser w9.60.18
32bit Web Browser w9.61.x
32bit Web Browser w9.63.16
32bit Web Browser w9.64.01
32bit Web Browser w9.65.01
32bit Web Browser w9.66.19
32bit Web Browser w9.67.01
32bit Web Browser w9.68.01
32bit Web Browser w9.69.01
32bit Web Browser w9.70.01
32Bit Web Browser w9.72.01
32bit Web Browser w9.72.18
32bit Web Browser w9.73.01
32Bit Web Browser w9-27-01
32bit Web Browser wn9.70.01
32bit Webbrowser v9.46.01
32bit.Convert.It.v9.42.01
32Bit.Email.Broadcaster.v9.25.23
32Bit.Email.Broadcaster.v9.26.15
32Bit.Email.Broadcaster.v9.28.01
32Bit.Email.Broadcaster.v9.28.17
32Bit.Fax.v9.25.23
32Bit.Fax.v9.26.15
32Bit.Fax.v9.28.01
32Bit.Fax.v9.30.6
32Bit.FaxMail.Network.v9.25.23
32Bit.FaxMail.Network.v9.26.15
32Bit.FaxMail.Network.v9.28.01
32Bit.FaxMail.Network.v9.30.6
32Bit.FTP.v9.26.1
32Bit.FTP.v9.28.01
32Bit.FTP.v9.30.6
32Bit.Multi.Clipboard.v9.28.01
32Bit.Multi.Clipboard.v9.30.6
32Bit.Web.Browser.v9.25.23
32Bit.Web.Browser.v9.26.15
32Bit.Web.Browser.v9.30.6
32bitFax vx9.24.01
32BitFtp vp9.42.22
32VerSee v2.31
35.000 Rezepte mit Le Chef
355 Monitor v2
355 Monitor v2.0
355 Monitor v3.0.0.1
355 Monitor v3.0.2.0
360 Professional Suite
360 Spinball
360 Spinball v1.1
360 Ultimate Spinball
369 Way Vegas Keno v3.0.0.1
37th Res Ex v2.x.x
386 Max v7.0
386 MaX v8.0
386 MaX v8.0 2
3aLab iRadio v1.1.0.152
3aLab iRadio v1.1.0.155
3aLab iRadio v1.1.0.158
3aLab iRadio v1.2
3aLab iRadio v1.2.0.199
3aLab iRadio v1.2.0.201
3aLab iRadio v1.2.0.205
3aLab iRadio v1.3.0.310
3aLab IRadio v1.3.0.311
3aLab iRadio v1.3.0.313
3aLab iRadio v1.3.0.316
3AlarmHack 2.0 for PalmOS
3aline OpenGLScreenSaver v1.4.0.1
3aline Screen Saver v1.5
3ALINE SCREENSAVER 1.4.0.1
3ALINE SCREENSAVER v1.4.0.1
3aline ScreenSaver v1.7
3aline ScreenSaver v1.7.0.1
3aline Screensaver v1.7.2.9
3aline ScreenSaver v1.7.x
3aline Screensaver v1.7.x.x
3aline ScreenSaver v1.8.3.2
3aline Screensavor v1.7.0.1
3aline v1.7.2.9
3C Card Parade v2.3
3C Chess v1.2
3C Poker & CardParade v2.03
3C Poker and CardParade v2.03
3C Poker and CardParade v2.04
3click Budget v1.1.16.0
3click Budget v1.1.18.0
3clickBudget v1.1.18.0
3COM Network Supervisor Advanced Package v2.0
3COM NETWORK SUPERVISOR V3.0 FINAL
3COM Transcend Network Supervisior 2.0
3D 4-in-a-Row 5.0
3D 4-in-a-Row v5.0
3D Active Chart v1.2
3D ACTIVE MULTIMEDIA BUTTON ACTIVEX v3.3
3D Album Commercial Suite v3.0
3D Album PicturePro Platinum v3.1
3D Aliens Glu3D v1.1.49 for 3DSMax R6
3D Analog Clock
3D Animated WallPaper
3D Animated Wallpaper 1.0.0.1
3D Animated Wallpaper 3.0
3D Animated Wallpaper v1.0.0.1
3D Animated Wallpaper v1.1
3D Animated Wallpaper v3.0
3D Animation v5.0
3D Aqua Clock
3D Aqua Clock 1.0
3D Aqua Clock v1.0
3D Arctic Bear Advanced v1.5
3D Arctic Bear Advanced v1.6 Screensaver
3D Art Screen Saver v5.0
3D Art Screen Saver v5.00
3D Art Screen Saver v5.00 Us
3D Art ScreenSaver v5.00
3D ASTEROID IMPACT
3D Asteroid Impact v3.01
3D Audio 1.1b c
3D Audio V.1.0
3D Audio v0.99b
3D Audio v0.99b for Windows
3D Audio v0.99b Win
3D Audio v1.0
3D Audio v1.0a
3D Audio v1.1a
3D Ball of Defiance
3D Ball of Defiance 2.0
3D Ball of Defiance v2.0
3D BattleShip v1.0
3D BattleShip v1.01
3D Belote
3D Belote 2 French
3D Belote v1.2C French
3D Belote v2 French
3D Bikini Clock Screensaver v1.0
3D Blackjack and Trainer v1.0
3D BLACKJACK TRAINER 1.10
3D BlackJack Trainer Lite v1.10
3D BlackJack Trainer Lite v2.0.2
3D BlackJack Trainer v1.01
3D BLACKJACK TRAINER v1.10
3D BlackJack Trainer v2.0
3D BLITZ
3D Blitz - m3gadeth
3D Blitz (32bit)
3D BLITZ New
3D BLITZ New Trainer
3D BLITZ Trainer
3D Blitz v2.2 trainer
3D Blocks 1.6
3D Blocks 2000
3D Blocks 2000 v1.0
3D Blocks 2000 v1.3
3D Blocks 2004 v1.04
3D Blocks 2004 v1.04 trainer
3D Blocks 2004 v1.2
3D Blocks v1.02
3D Blocks v1.2
3D Blocks v1.5
3d Blocks v1.6
3D Blocks v1.6 -
3D Bloobs v2.01
3D Bloobs v2.05
3D Bloobs v2.09
3D Breakout Distraction Style v1.21
3D Brickanoid v1.1
3D Browser 4.02
3D Browser Pro v6.0
3D Browser Pro v6.1
3D Browser v4.11
3D Browser v5.1
3D Browser v5.51
3D Browser v5.51 & Polygon Cruncher for 3D Browser v5.51
3D Bungalow Aquarium Screensaver v1.0
3D Business Graphics Server Pro v3.0
3D Button Creator Gold
3D Button Creator Gold 1.0
3D Button Creator Gold 3.01
3D Button Creator Gold v1.0
3D Button Creator Gold v3.01
3D Button Creator Gold v3.02
3D Button Creator Pro
3D Button Creator Pro v3.01
3D Button Creator v3.01
3D Button Creator v3.02
3D Calendar 32 v2.30
3D Calendar 32 v2.50
3D Calendar 32 v3.01
3D Calendar 32 v4.0
3D Calendar 32 v5.0
3D Calendar Clock ScreenSaver v1.0
3D Calendar Clock v1.0
3D Calendar v1.0.05
3D Calendar v2.40
3D Calendar v2.5
3D Calendar v2.50
3D Calendar v3.0
3D Calendar v3.01
3D Calendar v3.2
3D Calendar v4.0.0 Build 153
3D Calender 32bit v2.40
3D Calender v2.40
3D Caliper for Pro Engineer Wildfire v2.0 license
3D Cannon
3D Canvas 5 Pro
3D Canvas Pro v1.0
3D Canvas Pro v1.0.1
3D Canvas Pro v1.0.1.2
3D Canvas Pro v3.1a
3D Canvas Pro v3.2
3D Canvas Pro v4.0
3D Canvas Pro v4.22
3D Canvas Pro v5.08
3D Canvas Pro v5.5
3D Canvas Pro v5.5b
3D Canvas Pro v5.5c
3D Canvas Pro v5.7
3D Canvas Pro v5.7a
3D Canvas Pro v6.0
3D Canvas Pro v6.0 R3
3D Canvas Pro v6.0 R4
3D Canvas Pro v6.0.0.4
3D Canvas Pro v6.0.1.2
3D Canvas Pro v6.01
3D Canvas tm v2.0
3D Canvas v3.3
3D Canvas v3.32
3D Canvas v5.7A
3D Canvas v6.0
3D Canvas(tm) 2.0
3D Canyon Flight ScreenSaver
3D Canyon Flight Screensaver v2.0
3D Card Maker v1.2.1
3D Casino v.1.2
3D Cayon Flight v2.0
3D Chains ScreenSaver v1.1
3D Charter v1.2
3D Checkers v1.0
3D Christmas Slots v1.1
3D Christmas Tree Screensaver v1.0
3D Christmas Tree Screensaver v1.01
3D Combine V.2.3.0
3D Combine v1.2
3D Combine v2.1
3D Combine v2.2.1
3D Combine v2.3
3D Combine v2.3.0
3D Combine v2.5.0
3D Combine v2.5.3
3D Combine v2.6.1
3D Combine v2.6.7
3D Combine v2.6.9
3D Combine v2.8.2
3D Combine v2.9
3D Combine v2.9.0
3D Combine v3.2
3D Combine v3.20
3D Combine v3.4
3D Combine v3.4.0
3D Combine v3.4.1
3D Crash Icons Screensaver
3D Crash Icons Screensaver v1.1
3D Creatures v1.0a
3D Cuballs 1.1
3D Custom ScreenSaver 1.0.278
3D Custom ScreenSaver v1.0.276
3D Custom ScreenSaver v1.0.278
3D Custom Screensaver v1.0.325
3D Custom ScreenSaver v3.73
3D Custom ScreenSaver v3.80
3D Custom Screensaver V3.80 V3.80 From ZDNET
3D Dandesign SpeedSurf v2.0
3D Dart v1.0
3D Decor v 2.0.5
3D Decor v v2.0.5
3D Decor v2.1.x
3D Delays v1.0
3d Design All Products
3D Designer v9.014
3D Desktop Destroyer v 2.0
3D Desktop Destroyer v v2.0
3D Desktop Destroyer v1.6
3D Desktop Destroyer v1.8
3D Desktop Destroyer v2.0
3D Desktop Pets v0.05
3D Diamond Slots
3D DNA Screensaver 1.0
3D DNA Screensaver v1.0
3D Dominoes v1.0
3D Dominos v1.4
3D Dragon Castle trainer
3D Earth Screensaver 1.1
3D Earth Screensaver v1.1
3D Earth: Armageddon Edition Screensaver 1.0
3D Earth: Armageddon Edition Screensaver v1.0
3D EasyCut 3.0
3D Effects 1 Plugin for GIF Construction Set Pro v2.0.9a
3D Effects 1 Plugin for PNG MNG Construction Set v2.0.9a
3D Effects 1 v2.0.6a Plugin for GIF Construction Set Pro
3D Effects 1 v2.0.6a Plugin for PNG MNG Construction Set
3D Effects 1 v2.0.8a Plugin for GIF Construction Set P
3D Effects 1 v2.0.8a Plugin for GIF Construction Set Professional
3D Effects 1 v2.0.8a Plugin for PNG MNG Construction S
3D Effects 1 v2.0.8a Plugin for PNG MNG Construction Set
3D Effects 1 v2.0.9a Plugin for GIF Construction Set Pro
3D Effects 1 v2.0.9a Plugin for PNG MNG Construction Set
3D Elite MahJongg v3.96
3D Euchre Deluxe v1.6
3D Exploration v1.02
3D Exploration v1.03
3D Exploration v1.1
3D Exploration v1.11.5
3D Exploration v1.11.5 BETA
3D Exploration v1.5.3
3D Exploration v1.81
3D Exploration v1.831 Enterprise
3D Exploration v1.833
3D EXPLORER 1.00.00
3D Explorer 1.1
3D Explorer V1.00.00
3D Explorer v1.1
3D Explorer v1.2.3 For TrueSpace
3D Express
3D Express for Windows 95
3D Express Win95
3D Falling Icons Screensaver v1.1
3D Fancy Puzzle v4.0
3D Field 1.8.9.0
3d Field v1.21
3d Field v1.22
3d Field v1.30
3d Field v1.35
3D Field v1.41
3D Field v1.47
3D Field v1.49
3d Field v1.50
3d Field v1.52
3d Field v1.53
3d Field v1.55
3d Field v1.61
3d Field v1.75
3d Field v1.77
3d Field v1.78
3D Field v1.8.9.0
3D Field v1.81
3d Field v1.82
3d Field v1.83
3d Field v1.84
3d Field v1.86
3d Field v1.9.3
3d Field v1.9.6.0
3d Field v1.92
3d Field v1.95
3d Field v1.97
3d Field v1.98
3d Field v1.99
3D Field v2.0.2.0
3d Field v2.01
3D Field v2.03
3D FISH ! V2.65E
3D Fish Aquarium
3D Fish School 2 v2.22
3D Fish School Screensaver v1.6
3D Fish School SS v1.5
3D Fish School v2.0b Licence code
3D Fish School v2.21
3D Fish School v2.22
3D FISH V2.661E
3D FISH!
3D Fish! Screensaver 2.65e
3D Fish! Screensaver v2.65e
3D FISH! ScreenSaver v2.70e
3D FISH! v2.65e
3D FISH! v2.70e
3D Flash Animator v3.72
3D Flash Animator v4 Release 5
3D Flashbox v1.50
3D Flowers ScreenSaver v1.0
3D Flying Icons Screensaver v1.2 regfile
3D FlyingSaver v3.10
3D Fontz 1.0
3D Fontz v1.0
3D Foto Studio v1.2
3-D Fotocube
3D FotoStudio 1.2
3D FotoStudio 1.2 German
3D FotoStudio v1.2
3D FotoStudio v1.2 German
3D FotoTools v2.0
3D Four in a Row v5.0
3D Frog Frenzy
3D FTP 1.53
3D FTP 6,01
3D FTP v1.0
3D FTP v1.50
3D FTP v1.52
3D FTP v1.53
3D FTP v3.0 Beta 1
3D FTP v4.0
3D FTP v5.0
3D FTP v6.01
3D Funny Mirror 1.1
3D Funny Mirror v1.1
3D Game Studio v4.21
3D Game Studio V5.12
3D Game Studio V5.12 English + German Search And Replace
3D Game Studio v5.12 English Full
3D Game Studio V5.12 English Full-
3D Game Studio v5.12 English+German
3D Game Studio V5.12 German
3D Game Studio v5.12 German Full
3D GameStudio 5.10 English
3D GameStudio 5.10 German
3D GameStudio 5.203
3D GameStudio 5.203 English
3D GameStudio V5.10 English
3D GameStudio V5.10 German
3D GameStudio v5.203
3D GameStudio v5.203 English
3D Geometrical Objects 1,3
3D Geometrical Objects 1.0
3D Geometrical Objects v1.3
3D Geometrical Objects v1.4
3D Geometrical Objects v2.3
3D Gif Anim v2.21
3D GIF Designer
3D GIF Designer 2.2
3D Gif Designer 2.21
3D GIF DESIGNER V2.2
3D GIF Designer v2.21
3D GIF Designer v2.2x
3D GIF Designer version 2.2x
3D Goldfish Aquarium
3D GoldFish Aquarium ScreenSaver v0.9
3D GoldRush
3D GoldRush Slots
3D Goldrush Slots 1.0
3D Graph Generator v1.0.0
3D Graph Saver 2.0
3D Graph Saver v2.0
3D Graph Saver v2.00
3D Grapher 1.0
3D Grapher v1.11
3D Grapher v1.2
3D GraphSaver v2.0
3-D GraphSaver v2.0
3-D GraphSaver v2.0 keymaker
3D GraphSaver v2.00
3D Gravity v1.0
3D Groove Sky Racer Shockwave
3D Ground Zero
3D Hand Clock Screensaver v3.5
3D Hand Clock v3.5
3D Hand Clock v3.5 -
3D Hand Clock v4.0 Screensaver
3D HandClock 2.0
3D HandClock ScreenSaver v3.5
3D Hard Core
3D Hard Core v3.0 trainer
3D Heading v3.0.2.140
3D Headings v1.0.140
3D Headings v2.0.140
3D Headings v3.0.2.140
3D Hearts Deluxe v1.6
3D Hockey v1.2
3D Hockey v1.51
3D Hockey v1.52
3D Hockey v1.52 Retail
3d Home Architect Landscape Design Deluxe v6.0
3D Horizontal Bar Graph v3.3
3D Hot Slots
3D Hotslots
3D Hotslots v3.0
3D ImageCube 2.0
3D ImageCube v2.0
3D ImageScene
3D ImageScene 1.0
3D Impact 1.25 pro
3D Impact Pro 1.25
3D Impact v1.25 pro
3D Interstellar Voyager Screensaver v1.1
3D Interstellar Voyager Screensaver v1.3
3D Invigorator Pro for Adobe After Effects v3.08
3D Invigorator Pro v4.0
3D Invigorator Pro v4.0.1 for Adobe AfterEffects
3D Invigorator v2.2 AE
3D Invigorator v3.08 PRO for After Effects
3D It 1.0
3D KeyBoard v2.4 for Win95
3D KeyBoard v2.4 forWindows 95
3D KeyBoard v2.4 Win95
3-D Keyboard v2.52
3D Launcher
3D Launcher 1.0
3D Launcher v1.0
3D Launcher v1.2
3D Launcher v3.0
3D Line Graph v3.3
3D Line Grapher v1.8
3D Lines
3D Lines and Blocks v1.0
3D LINES v1.0
3D Lines v1.1
3D Lines v1.2
3D Liquid Desktop 1.0
3D Liquid Desktop ScreenSaver v2.0
3D Liquid Desktop v 1.1
3D Liquid Desktop v 2.0
3D Liquid Desktop v v1.1
3D Liquid Desktop v v2.0
3D Liquid Desktop v1.0
3D List Screensaver v1.0
3D Live Borobudur Screensaver v1.0
3D Live Pool v2.32 Trial
3D Live Pool v2.34 Trial
3D Magic
3D Magic 1.10
3D Magic v1.10
3D Mail Effects (3DME) v6.0.3
3D Mail Effects (3DME) v6.03 Full
3D Mail Effects v3.6.1
3D Mail Effects v5.0
3D Mail Effects v5.5.0
3D Mail Effects v6.0.3
3D Mail Effects v6.0.4
3D Mail Effects v6.04
3D Maker for Photoshop v1.2
3D Maker v1.0.0
3D Maker v1.1.0
3D Maker v1.2.0
3D Maker v2.0.0
3D Maker v2.1.0
3D Manatees
3D Mark
3D Mark 03 PRO v3.1.3
3D Mark 2000
3D Mark 2000 Build 335
3D Mark 2000 Pro Build 335
3D Mark 2000 Pro V1.1
3D Mark 2000 v1.0 FINAL
3D Mark 2000 v1.1
3d Mark 2001
3d Mark 2001 Pro
3D Mark 2001 Pro Build 200
3D Mark 2001 Pro regfile
3D MARK 2001 SE
3D Mark 2005
3D MARK 99
3D Mark 99 Build 100
3D Mark 99 Max
3D MARK 99 Max Pro - Build 200
3D Mark 99 Pro
3d mark Pro
3D Mark Pro 2001
3D MARS MISSION
3D Mars Mission 4.0 Plus 3 Trainer
3D Mars Mission v1.0
3D Master v1.0
3D MasterSuite & PlotMaster v3.6
3D Matrix
3D Matrix Corridors Screensaver
3D Matrix Screensaver
3D Matrix Screensaver Inside the Matrix
3D Matrix Screensaver 'Inside the Matrix'
3D Matrix Screensaver The Endless Corridors
3D Matrix ScreenSaver v1.0
3D Matrix Screensaver v1.0.us
3D Matrix ScreenSaver: Inside the Matrix
3D Matrix ScreenSaver: The Endless Corridors
3D Max v5.1
3D Maze Cube v1.0
3D Maze Cube v1.0 kegen
3D Meditator v1.50
3D Minesweeper v1.0
3D MineSweeper v1.21
3D Mini Golf v1.0
3D Miracle 1.72
3D Miracle And 3D Monster Toolkit v4.9
3D Miracle V v1.5
3D Miracle v1.01
3D Miracle v1.15
3D Miracle v1.22
3D Miracle v1.25
3D Miracle v1.3
3D Miracle v1.50
3D Miracle v1.60
3D Miracle v1.70
3D Miracle v1.71
3D Miracle v1.72
3D Miracle v1.73
3D Mobile saver Nature
3D Monster 1.53
3D Monster v1.2
3D Monster v1.3
3D Monster v1.31
3D Monster v1.35
3D Monster V1.5
3D Monster v1.51
3D Monster v1.52
3D Monster v1.53
3D Monster v1.54
3D Morfit 3D WorldBuilder 3.5
3D Morfit 3D WorldBuilder v3.5
3D Morris Retail v1.56
3D Morris v1.11
3D Morris v1.21
3D Morris v1.22
3D Morris v1.25
3D Morris v1.33
3D Morris v1.4
3D Morris v1.56
3D Morris v1.56 Retail
3D MotoRacer v1.08 for UIQ
3D MP3 Recorder v3.1.1
3D MP3 Recorder v3.6.6.3
3D MP3 Recorder v3.7.5
3D MP3 Sound Recorder 3.4.1
3D MP3 Sound Recorder 3.4.6 Multilingual
3D MP3 Sound Recorder v3.1.2
3D MP3 Sound Recorder v3.4.1
3D MP3 Sound Recorder v3.4.2
3D MP3 Sound Recorder v3.4.3
3D MP3 Sound Recorder v3.4.6 Multilingual
3D MP3 Sound Recorder v3.5
3D MP3 Sound Recorder v3.6.1
3D MP3 Sound Recorder v3.6.2
3D MP3 Sound Recorder v3.6.4
3D MP3 Sound Recorder v3.6.5
3D MP3 Sound Recorder v3.6.5.1
3D MP3 Sound Recorder v3.6.5.10
3D MP3 Sound Recorder v3.6.5.3
3D MP3 Sound Recorder v3.6.5.5
3D MP3 Sound Recorder v3.6.5.6
3D MP3 Sound Recorder v3.6.5.7
3D MP3 Sound Recorder v3.6.5.8
3D MP3 Sound Recorder v3.6.6.2
3D MP3 Sound Recorder v3.6.6.3
3D MP3 Sound Recorder v3.6.6.4
3D MP3 Sound Recorder v3.6.6.6
3D MP3 Sound Recorder v3.6.6.7
3D MP3 Sound Recorder v3.6.6.8
3D MP3 Sound Recorder v3.7
3D MP3 Sound Recorder v3.7.2
3D MP3 Sound Recorder v3.7.3
3D MP3 Sound Recorder v3.7.4
3D MP3 Sound Recorder v3.7.5
3D MP3 Sound Recorder v3.7.5 silent update
3D MP3 Sound Recorder v3.7.6
3D Muehle v1.53
3D Muehle v155
3D Museum ScreenSaver v2.2
3D Museum v2.2
3D Myhome Designer Pro v1.0
3D Nature
3D Nature v1.0
3D Night Viper
3D Nomaad v1.5
3D Object Converter 1.10
3D Object Converter v1.06
3D Object Converter v1.10
3D Object Converter v1.14
3D Object Converter v1.20
3D Object Converter v1.40
3D Object Converter v1.44
3D Object Converter v1.46
3D Object Converter v2.0
3D Object Converter v2.10
3D Object Converter v2.80
3D Object Converter v2.90
3D Object Converter v3.10
3D Object Converter v3.20
3D Object Dropper ScreenSaver v1.2
3D Objects Screen Saver I v4.0
3D OBJECTS ScreenSaver IV3.3
3D Off-Road Cars v2.3
3D Pacmaniac v1.3 trainer
3D Panner Studio v1.1
3D Pda3dware Blockout
3D Pda3dware Tennis
3D Photo Album Screensaver v1.0.0.3
3D Photo Browser Pro v7.03
3D Photo Builder v1.1
3D Photo Builder v1.2
3D Photo Studio
3D Photo Studio 1.1
3D Photo Studio v1.1
3D PhotoBrowser Pro v7.03
3D PhotoStudio 1.1
3D PhotoStudio v1.1
3D PhotoStudio v1.2
3D PhotoStudio v1.2 Win9xNT
3D Pim v1.0
3D PINS v1.2
3D Pitch Setback Deluxe v1.6
3D Pitch Setback v1.6
3D PIX Stereoscopic Image Editor v3.4
3D PIX v1.5 with 3D PIX Plugin v1.3
3D PLANET ATTACK
3D Planet Attack v1.0
3D Planet Attack v2.0
3D Polypus v2.0
3D Pong v1.3
3D PopArt & 3D Words v1.0
3D PopArt v1.0 & 3D Words v1.0
3D Producer v1.1
3D Producer v1.4
3D Proslots
3D Pulsoid 1.2
3D Puzzle Cube v1.0
3D Rad Brain Editor v6.2
3D Rad Brain Editor v6.3
3D Rad Brain Editor v6.4
3D RAD BRAIN EDITOR v6.4b
3D RAD BRAIN EDITOR v6.5
3D RAD BRAIN EDITOR v6.5a
3D RAD BRAIN EDITOR v6.5b
3D Rad Brain Editor v6.5c
3D RAD BRAIN EDITOR v6.5d
3D RAD BRAIN EDITOR v6.5e
3D Rad v1.4
3D Rad v1.4.3
3D Rad v1.5
3D Rad v1.5.2
3D RAD v1.5.3
3D Rad v2.4.3
3D Rad v2.5.4
3D RainDrop Screensaver v1.0
3D Raindrop Screensaver v2.0
3D Raindrop v2.0 Screensaver
3D Roulette
3D Roulette v1.2
3D Sapper v1.1
3D Sapper v1.1 GAME
3D ScreenSavers v1.5
3D Seahorses v1.2
3D Sexy Russian Girls Screen Saver
3D Shape X ScreenSaver v1.2
3D Shop Factory PRO v3.5 Developer Edition
3D Shop Factory Professional v4.30
3D Shop Factory v4.30 FIX
3D ShopFactory Professional Edition 4.40
3D Sliders v 1.3
3D Sliders v v1.3
3D Slip Sliding Xmas Penguins Screen Saver v1.2
3D Slip Sliding X-Mas Penguins Screensaver v1.2
3D SmartView 1.0
3D SmartView 2000 v1.0
3D SmartView v1.0
3D Snake Arena v1.0
3D Snowflake 3D v 1.0
3D Snowflake 3D v v1.0
3D Solar System Screensaver v1.03
3D Solar Taveler Screensaver v1.03
3D Solar Traveler Screensaver v1.03
3D Soma
3D Soma Puzzle
3D Soma Puzzle v1.5
3D SOMA PUZZLE v1.6
3D Soma Puzzle v2.0
3D Soma Puzzle v2.2
3D Space Mob
3D Spades Deluxe v1.6
3D Special Effects v1.3
3D Spinball
3D Spinball v3.4
3D Spins! v1.3
3D Sport Cars Screen Saver 2.1
3D Sport Screen Saver v2.1
3D Stacked Horizontal Bar Graph v4.6
3D Stacked Vertical Bar Graph v4.6
3D STARS & STRIPES
3D Stars and Stripes v3.0
3D Stereo Image Factory v1.50
3D Stereo Image Factory Ver 1.35
3D Stereo Image Factory Ver v1.35
3D STEREO IMAGE FACTRY V1.50
3D Stereo v2.0
3D Stroke for Adobe After Effects v1.0
3D Stroke v1.0.1
3D Stroke v1.0.1 for Adobe After Effects
3D Stroke v2.02 for Adobe After Effects
3D Studio max /w authorization code
3D Studio Max 2
3D Studio MAX 2.5
3D Studio MAX 3 Italian
3D Studio MAX 3.1
3D Studio MAX 3DSMAX v2.0 Build 220
3d Studio Max 4
3D Studio MAX 4.2
3D Studio MAX 5
3d studio max 6
3D studio max 6 new
3D Studio MAX Magma M045
3D Studio Max R3
3D Studio MAX R4 Final
3d studio max v1.0
3D Studio Max v2.0
3D Studio Max v2.5
3D Studio Max v3.0
3D Studio Max v3.1
3D Studio Max V4.0
3D Studio MAX v4.0 , v5.0
3D Studio MAX v4.2
3D Studio MAX v4.2 2K
3D Studio MAX v4.2 Working
3D Studio Max v4.x - v5.x maybe v6.x
3D Studio MAX v4.x v5.x v6.x
3D Studio Max v5.0
3D Studio Max v6.0
3D Studio MAX3DSMAX v2.0 Build 220
3D Studio R4
3D Studio Viz R2
3D StudioMAX for Windows 95
3D StudioMAX v2.0 Build 220 Win95
3D StudioMAX Win95
3D Supernova Screensaver v1.1
3D SurfTris v1.0
3d SwapBalls v1.5
3D Swapp Balls v1.00
3D Tetris 1.1 for PalmOS
3d Tetris v1.1
3D Text Factory v1.0
3D TextBeauty 2.0.6
3D Thorns ScreenSaver v1.2
3D Tracer 1.1
3D Tracer v1.1
3D Tubes ScreenSaver v1.0
3D Twister A-E-C 2.000 build 6.018
3D Ultra Pinball
3D Ultra Pinball Real
3D Ultra Pinball Real Games
3D Ultra Pinball Thrill Ride
3D Ultra Pinball Thrillride Demo v1.0
3D Ultra Pinball Thrillride v1.0
3D Ultra Pinball v1.01
3D Undersea Slots 2.2
3D Undersea Slots v2.2
3D UZ v3.0
3D v1.2
3D Vertical Bar Graph v4.6
3D View
3D View null
3D View v1.0 Win
3D View v3.0 SP2
3D View v3.0SP2
3D Virtual Reality ActiveX v2.0.0.2
3D Vista flash exporter
3D Vista Studio v1.9.1
3D Waves in Your Monitor Screensaver v2.0.0.0
3D web botton 1.7
3D Web Browser v2.1
3D Web Button v1.3
3D Web Button v1.5
3D Webbutton 1.7
3D Webbutton v1.7
3D WebButtons 1.7
3D WebButtons v1.7
3D Webmaster 5.50 build 4018
3D Webmaster v5.50 build 4018
3D Website Builder
3D Website Builder 10
3D Website Builder v1.0
3-D Website Builder v1.0
3D Wohnen
3D World Map v1.0
3D World Map v1.2
3D World Map v1.20
3D World Map v2.0
3D X-Mas Slots
3d Xmas Tree v1.05
3D Yams (french)
3D Yams french
3D Yams XP 2 French
3D Yams XP French
3D Yams XP v2 French
3D Yams XP v2.0 regfile
3D.Blocks.2000.v1.5
3D.Blocks.2000.v1.6
3D.decor v2.1.x
3D.Explorer.v1.1
3D.Object.Converter.v1.04
3D.Object.Converter.v1.06
3D-Album Commercial Suite v3.0
3DAliens Glu3D v1.1.56 for 3DSMAX 6
3DAliens Glu3D v1.1.64 for 3DSMAX 6
3D-Audio v1.0a
3Day Organizer Pro v1.0.102
3DBlitz
3DBlocks v1.6
3DButton Creator v3.02
3DCanvas v3.1
3DChart ActiveX v7.0.0.0 build 4
3DCloner v2.0
3DCombine 2.3
3DCombine v2.6.1
3DCombine v3.0.1
3DCreatures v1.0a
3Ddeep Screensaver Cars
3Ddeep Screensaver Celebrities v2.3
3Ddeep Screensaver Constructs v2.3
3Ddeep Screensaver Erotic v2.3
3Ddeep Screensaver Scenes I. v2.3
3D-DOCTOR for Windows v3.5.011019
3D-DOCTOR v2.0.990715
3D-DOCTOR v3.03a
3D-Doctor v3.5
3D-Doctor v3.5 Datecode 031001
3dDom v1.6
3dDom.v2.0
3Deep v3.4
3DEM 10.0.8
3DEM v10.1.3
3DEM v10.1.4
3DEM v11.0.0
3DEM v15.3
3DEM v8.0.4
3DEM v8.0.5
3DEM v8.04
3DEM v8.3.5
3DEM v8.4.1
3DEM v8.4.3
3DEM v8.4.4
3DEM v8.48
3D-Express
3DField
3DField 1.75
3DField v 1.43
3DField v v1.43
3DField v1.57
3DField v1.61
3DField v1.71
3DField v1.72
3DField v1.75
3DField v1.77
3Dfield v1.86
3DField v1.89
3DField v1.9.2.0
3DField v1.9.3.0
3DField v1.9.4.0
3DField v1.9.5.0
3DField v1.9.7.0
3DField v1.9.9.0
3DField v1.92
3DField v1.93
3DField v1.96
3DField v1.97
3DField v1.99
3DField v1.xx
3DField v2.0.0.0
3DField v2.0.3
3DField v2.0.3.0
3DField v2.00
3DField v2.09
3DField.v1.79
3DField.v1.80
3dFlashBox
3D-Flat 2002 v6.1
3dflyingsaver v2.20
3DFlyingsaver v2.28
3DFlyingSaver v3.0
3Dflyingsaver v3.10 regfile
3DFlyingSaver v3.10.
3Dfm v1.0
3D-FTP v3.0 Beta 1
3D-FTP v4.0
3D-FTP v6.0
3D-FTP v6.01
3D-FTP v7.01
3D-FTP version 2.0
3D-FTP version v2.0
3dfx Video Renderer 1.1
3DFX Video Renderer v1.1
3DFX Video Renderer v1.2
3DImageCube v2.0
3DImageScene v.1
3DJongg v2.5
3DMark
3DMark `99 MAX
3DMark 03 build v3.3.0
3DMark 03 Pro
3DMark 03 Pro v3.1.3
3DMark 03 Pro v3.2.0
3DMark 19100 v1.1
3DMark 19100 v1.1.Pro Build 340
3DMark 1999
3DMark 1999 Pro v1.0
3dMark 2000 Pro
3DMark 2000 v1.1
3DMark 2000 v1.1.Pro Build 340
3DMark 2001
3DMark 2001 Build 200
3DMark 2001 Pro v1.0
3DMark 2001 SE
3DMark 2001 SE Pro Build 330
3DMark 2003
3DMark 2003 1st Release
3dMark 2003 build 330
3DMark 2003 Pro
3DMark 2003 Profesional Edition
3DMark 2003 v3.2.0
3DMark 2003 V3.4.0
3DMark 2003 v3.4.0 PRO
3DMark 99
3DMark 99 build 100
3DMark 99 LiTE
3Dmark 99 MAX (build 200)
3DMark 99 MAX build 200
3DMark 99 MAX Pro
3DMark 99Pro build 100
3DMark Pro 03
3DMark03
3DMark03 2003 (c) Futuremark
3DMark03 2003 v3.2.0
3DMark03 3.1.3.0
3DMark03 320
3DMark03 b340
3DMark03 build 330
3DMark03 Build v3.4.0
3DMark03 Pro
3DMark03 Pro v3.1.3
3DMark03 Pro v3.2.0
3DMark03 Professionnal Edition build 340
3DMark03 Registrator v3.1.3.0
3DMark03 RegKey
3DMark03 v3.1.3.0
3DMark05 Build v1.0.0
3DMark05 Pro
3DMark2000
3DMark2000 - Build 335
3DMark2000 Pro
3DMark2000 v1.1
3DMark2000 v2.1
3DMark2001
3DMark2001 build 200
3DMark2001 Pro
3DMark2001 Pro v1.0 SE
3DMark2001 SE
3DMark2001 SE build 330
3DMark2001 SE Pro v1.0
3dMark2001.Second.Edition
3DMark2003
3Dmark2K
3DMark99
3DMax
3dmax 6
3DMeNow v1.5
3DMeNow v1.5 BioVirtual
3DMeNow v1.5.111
3DMiracle 1.72
3DMiracle and 3DMonster Toolkit v4.8
3DMiracle and 3DMonster Toolkit v4.9
3DMiracle v.x.xx-v1.72
3DMiracle v1.01
3DMiracle v1.15
3DMiracle v1.16
3DMiracle v1.2
3DMiracle v1.22
3DMiracle v1.23
3DMiracle v1.25
3DMiracle v1.3
3DMiracle v1.30
3DMiracle v1.40
3DMiracle v1.50
3DMiracle v1.60
3DMiracle v1.70
3DMiracle v1.71
3DMiracle v1.72
3DMiracle v1.73
3DMiracle x.xx-1.72
3DMobiles ScreenSaver v1.0
3DMobiles v1.0 ScreenSaver
3DMonster 1.53
3DMonster v1.2
3DMonster v1.3
3DMonster v1.31
3DMonster v1.35
3DMonster v1.50
3DMonster v1.51
3DMonster v1.53
3DMonster v1.54
3DNA Desktop 1.0
3DNA Desktop v1.0
3DNA Desktop v1.0.1
3DNA Desktop v1.1
3DNA Loft Package v1.0.0
3DNomaad v1.5
3DNomaad v1.6
3DPanner Studio VST & DX v1.1.210
3Dphoto Studiov v1.1
3DPlus v1.x 2D to 3D MPEG1 Player
3ds max 4
3ds max v.4.2 authorization
3ds max v4.2
3ds max v4.2 Authorization Patch Working
3ds max v5.0
3ds max v5.0.0
3ds max v5.1
3ds max v6.0
3ds max v6.0 and Character Studio v4.2
3DS MAX v7.0 Final
3DS Max VIZ Standalone v1.0
3DS Max VIZ Standalone v1.0 v1.0
3dsmax 5
3dsmax v5.0.0 retail
3DSMax v6.0
3dsmax5
3DSoma Puzzle 2.2
3DSoma Puzzle v2.2
3DSoma v2.2
3DSpaceTour Multi
3DSpins v1.3
3DSpins! v1.3
3DStudio Max v6.0
3dstudiomax 4
3DSwapBalls 1.7
3DSwapBalls v1.0
3DSwapBalls v1.3
3DSwapBalls v1.7
3Dt v1.1
3DView 3.5 build 670
3DView 3.5 build 675
3DView 3.5 build 675 German
3DView 3.5 build 680
3D-View v3.5
3DVista Flash Exporter v1.0
3DVista Flash VT Exporter v3.0
3DVista Publisher Pro v2.0
3DVista Show v1.0 RC4
3DVista Skin Editor Standard v2.0
3DVista Skin Editor v1.5.1
3DVista Stitcher v2.0
3DVista Studio Pro v1.8
3DVista Studio v1.8
3dVista Studio v1.9
3DVista Studio v1.9 Final
3DVista Studio v1.9.2
3DVista Studio v1.9.3
3DVista v1.9
3DVista.Publisher Pro v2.0
3DWatch v2.4.306
3DWatch v2.4.306 SnR
3DWebButton 1.7
3DWebButton v1.0
3DWebButton v1.0 v1.7
3DWebButton v1.2
3DWebButton v1.4
3DWebButton v1.5
3DWebButton v1.7
3DWebButtons v1.2
3DWin SuperBundle v4
3DWin SuperBundle v4.x
3Dx Fun Pack v1.4
3DYAMS 2nd edition
3DZ 2D to 3D v2.0
3DZ EXtreme v5.0
3DZ Infinity v2.0
3Flex v1.3.1
3IAB Three In A Bed v3.0
3IAB Three In A Bed v5.0
3IAB Three In A Bed v5.2
3-in-1 Solitaire Drop Pack
3-IN-A-BED v2.01
3M Post-It Notes for Win95
3M Post-It Software Notes 1.5.320.259
3MB Tech DVD Jaguar v2.4.1.0.21
3MB Tech DVDPro v2.00
3MB TECH MEPEG ENCODER v1.0.0.1
3MB Tech Mpeg Encoder v1.0.0.1
3Mouse v1.0
3Mouse v1.0 for Win95/NT
3nity v1.26 German for PalmOS
3nity v1.26 German PDA
3nity v1.41 for PalmOS
3nity v1.41 PDA
3Prong v1.0
3rd Block 1.1
3rd Block 2.4.0 build 57
3rd block II v2.2.1
3rd Block v1.1
3rd Degree Burn 2003 v1.1.2102
3rd Degree Burn 2003 v1.1.2111
3rd Folder Image v1.0
3rd PlanIt v4.02.005
3rd PlanIt v6.00.008
3rd PlanIt v6.02.012
3rd PlanIt v6.03.001
3rd PlanIt v7.0
3rd PlanIt v7.03
3rd PlanIt v7.04.10
3rd PlanIt v7.04.12
3rd PlanIt v7.04.13
3rd PlanIt v7.05.29
3rd PlanIt v7.07.009
3rd PlanIt v7.08.016
3rd PlanIt v7.09.0
3rd PlanIt v7.10.0
3rd PlanIt v7.10.06
3rd PlanIt v7.10.06 new
3rd PlanIt v7.10.6
3rd Plantit v7.03
3S Simplified Sales System v1.0 regfile
3S v1.6
3SI Accounting and Inventory Management v2.0
3six5 1.0
3six5 Personal Pictures v1.0
3six5 Public Pictures v1.0
3six5 v1.0
3six5 v3.1
3wget v1.0 Beta Build 80
3wGet v1.0.80 Beta
3wGet v1.2
3wGet v1.42 build 139
3wGet v1.5 build 151
3X Mosaic v1.5 for PalmOS
3x3 Labeler 1.0
3x3 Labeler v1.0
3Z Project Tracker v3.5
3Z Project Tracker v4.0
4 Atomic Synchronization v1.00.01
4 Card Keno v.2.0
4 Card Keno v2.0
4 Card Keno v2.5
4 Card Video Keno v2.0
4 Card Video Keno v2.5
4 Corners Solitaire 3.1 for PalmOS
4 Corners Solitaire v3.1
4 Corners v4.2
4 Corners v4.2 PalmOS
4 dos 601
4 Elements RayDream Studio
4 Expensive Poker v6.0
4 Expensive Solitaire v3.0
4 Free Poker v6.0
4 Free Solitaire v3.0
4 Gewinnt v1.2
4 in 1 Line v1.0
4 in 1 row
4 in 1 v1.0
4 In A Row
4 In A Row 1.1
4 In A Row v1.1
4 In A Row v1.1 Game
4 In A Row v2.0
4 Kingdoms v1.0
4 Link Calculator v1.1
4 Link Calculator v2.0
4 Orbs
4 Screens v2.15
4 Seasons Slots v1.0
4 WPlay v1.70
4.0 Student v5.00
4.0 Student v5.3
404 No More v1.0 Build 101
40Thieves-on-the-Palm
40Thieves-on-the-Palm v1.08
40Thieves-on-the-Palm v1.22
40TUDE CAMSS 0.9
40TUDE CAMSS v0.9
40TUDE HTML V3.0.1
40TUDE HTML V3.2
40tude HTML v3.3.1.10
40tude HTML v3.4.1.7
40tude HTML v3.4.1.7 Keyfilemaker - EMBRACE
40TUDE PHONE
42 Better Email Enable Everything (BEEE) v 2.22
42 Better Email Enable Everything (BEEE) v2.11
42 Better Email Enable Everything (BEEE) v2.12
42 Better Email Enable Everything (BEEE) v2.2
42 Better Email Enable Everything (BEEE) v2.22
42 Better Email Enable Everything (BEEE) v2.23
42 Better Email Enable Everything (BEEE) v2.24
42 Better Email Enable Everything BEEE v v2.22
42 Better Email Enable Everything BEEE v2.01
42 Better Email Enable Everything BEEE v2.01 BETA
42 Better Email Enable Everything BEEE v2.12
42 Better Email Enable Everything BEEE v2.24 2K
42 Better Email Enable Everything v2.01
42 Better Email Enable Everything v2.01 Beta
42 Better Email Enable Everything v2.11
42 Better Email Enable Everything v2.12
42 Better Email Enable Everything v2.2
42 Better Email Enable Everything v2.21
42 Better Email Enable Everything v2.22
42 Better Email Enable Everything v2.23
42 Better Email Enable Everything(BEEE)v2.01
42 Better Email Enable Everything(BEEE)v2.01 BETA
43000 Word Hangman v2.02
4454600011B82436847640000
1B9A6372737200171BA66D63746200031CC650494354002D1CF6 70706174000
456 PUZZLE v1.0
4-Bad v2.0
4C (4 in a row) v1.1
4C (4 in a row+chat) v1.0
4C 4 in a row v1.1
4C 4 in a row+chat v1.0
4C Game v1.0
4C Game v1.0.1
4C Game v1.1
4C v1.0
4-Card Video Keno 2.5
4-Card-Keno v4.0.0.1
4cK 4-Card Video Keno v4.0
4Corners Solitaire v2.1
4Corners Solitaire v4.2
4Corners Solitaire v4.2 English
4D 2003
4D 4th Dimension 4D/4D Runtime
4D 4th Dimension v3.5.1
4D 4th Dimension v6.0
4D 4th Dimension v6.0.5J
4D 4th Dimension v6.5
4D 4th Dimension v6.7
4D 4th Dimension v6.7mc3
4D All-In-One v2003.3
4D BackUp v1.2
4D BackUp v1.5
4D BackUp v1.5.x
4D Backup v1.5? for the MAC
4D Backup v1.5x Mac
4-D Boxing
4D Buddy v1.0
4D Calc v1.5
4D Calc v1.5.x
4D Calc v1.5? for the MAC
4D Calc v1.5x Mac
4D Chart v1.1.x
4D Chart v1.1? for the MAC
4D Chart v1.1x Mac
4D Classic Runtime v3.5
4D Compiler Pro v2.5.1
4D Compiler Pro v2.5.2
4D Compiler v2.3
4D Compiler v2.3 for the MAC
4D Compiler v2.3 mac
4D Compiler v6.0.2
4D Compiler v6.0.5
4D Compiler v6.0.6
4D Compiler v6.0.x
4D Compiler v6.0J
4D Connectivity v1.5 for the MAC
4D Connectivity v1.5 Mac
4D Connectivity v1.x
4D Desktop v6.0.1
4D Desktop v6.0.6
4D Developer v2.2
4D Developer v3.0
4D Developer v3.0.1
4D Developer v3.0.1 and v3.2 mac
4D Developer v3.2
4D Developer v3.5.x
4D Developer v3.5? for the MAC and Win
4D Developer v3.5x Mac and Win
4D Developer v6.0.x
4D Developer v6.5
4D Draw v1.1
4D Draw v6.0.x
4D Engine v3.5.x
4D Engine v6.0.x
4D First v1.2
4D for Oracle v6.0.x
4D French v6.0
4D Insider v2.0.1
4D Insider v2.5
4D Insider v2.5.x
4D Insider v2.5? for the MAC
4D Insider v2.5x Mac
4D Insider v2.x.x
4D Insider v6.0.5r3
4D Insider v6.0.x
4D Insider v6.0J
4D Internet Extension v6.5
4D ODBC Drivers v6.0.5
4D Online Help v3.0.5 mac
4D Online Help v3.15 for the MAC/Win
4D Online Help v3.15 Mac and Win
4D Online Help v3.x.x
4D Open v6.0.x
4D Runtime Classic v3.5
4D Runtime Classic v3.5 Mac
4D Runtime Classic v3.5.x
4D Runtime Classic v6.0.5
4D Runtime Classic v6.0.x
4D Runtime v2.01
4D Runtime v2.01 2
4D Runtime v2.01 use over networks
4D Server 2003
4D Server 2003 Expansion
4D Server NEW!
4D Server v1.5x Mac
4D Server v6.0.2
4D Server v6.0.x
4D Server v6.0J
4D Server v6.5
4D Server v6.7
4D SQL Server v6.0.x
4D Web Smart Server v3.5
4D Web SmartServer v3.5x Mac
4D Write
4D Write v2.1
4D Write v2.5
4D Write v2.5.1
4D Write v2.5.x
4D Write v2.5x Mac
4D Write v6.5
4D-Boxing v1.0
4Dev Support Fetch Dog v1.0
4Dev Tectomatic v1.0
4Developers COM Explorer v1.6
4Developers.Com Explorer
4Developpers Active X Manager 1.4
4Developpers Active X Manager v1.4
4Developpers Talking Stocks 3.0
4Developpers Talking Stocks v3.0
4Developpers Textomatic 1.0
4Developpers Textomatic v1.0
4DIntel Music Tuner v3.2
4Disk Clean Gold v4.0
4Disk Clean Gold v4.50
4Disk Clean v1.3c
4DiskClean 1.3
4DiskClean 1.5
4DiskClean Gold 2.00
4DiskClean Gold 2.5
4DiskClean Gold 4.0
4DiskClean Gold 4.00a
4DiskClean Gold v2.0
4DiskClean Gold v2.00
4DiskClean Gold v2.5
4DiskClean Gold v3.0
4DiskClean Gold v3.0 -
4Diskclean Gold v3.00
4DiskClean Gold v4.0
4DiskClean Gold v4.00
4DiskClean Gold v4.00a
4DiskClean Gold v4.0a
4DiskClean Gold v4.5
4DiskClean Gold v4.5.120804
4DiskClean Gold v4.5.us
4DiskClean GOLD v4.50
4DiskClean GOLD v4.50a
4DiskClean GOLD v4.50b
4DiskClean GOLD v4.50c
4DiskClean Gold v4.5a
4DiskClean Gold v4.5b
4DiskClean Gold v4.5c
4DiskClean Gold v5.0
4DiskClean Gold v5.0.122104
4DiskClean Lite 1.5
4DiskClean Lite v1.5
4DiskClean Lite v3.0
4Diskclean Lite v3.0.us
4DiskClean v1.2
4DiskClean v1.3
4DiskClean v1.5
4DiskClean v4.0 Gold
4Diskcleaner v3.0.
4DiskCleanGold4.0(sn)
4DOS 601
4DOS v5.00
4DOS v5.x v6.x for DOS
4DOS V6.02A FIXED
4DOS v7.01A
4DOS v7.01a build 54
4DPaint Rembrandt
4FiLes +v3.30
4Files v3.30
4Files v3.30+
4Front OSS/3D v7.0
4GL Interactive Debugger v7.30.UC6
4GL Rapid Development System Run Time Facility v7.30.UC6
4GL Rapid Development System v7.30.UC6
4GL Run Time Facility v7.30.UC6
4GL v7.30.UC6
4Good 2.0
4Good v2.0
4HTML Assistant v1.0
4Level eZeeScroller v1.0
4MP3 2.0
4-MP3 v2.4 all builds
4Musics OGG to MP3 Converter v1.4
4-Net v1.1
4-Net v2.0
4-Net v2.1
4NT v3.01A
4NT v3.x
4NT v4.00 Build 49
4NT v4.01a
4NT v5.0
4NT v6.0 ASCII
4NT v6.0 Unicode
4Pinball PC Edition v1.0
4Pinball PC Edition v1.0 cheat
4Pinball PC Edition v1.0 trainer
4PLAY
4PLAY 4.95.38
4PLAY All
4Play v4.95.30 for Win-95/NT
4Play v4.95.30 Win95/NT
4PLAY v5.0.19
4Pos Retail v24.00.14.00
4POS RETAIL v32.0.14.0
4Safe StrongDisk 2.8.2.4
4Safe StrongDisk Pro v3.0
4SAFE STRONGDISK v2.8.0.2
4SAFE STRONGDISK v2.8.1.2
4SAFE STRONGDISK v2.8.2.1
4Safe StrongDisk v2.8.2.5
4Screens
4Screens 2.15
4Screens v1.24
4Screens v1.27
4Screens v2.14
4Screens v2.15
4Screens v3.19
4-Sight Fax v3.1
4-Sight ISDN Manager v4.1
4slideshow v1.0.0.1
4T AV v1.8 CD-Version for PalmOS
4T AV v1.8 DVD-Version for PalmOS
4T NOX 1.1 for PalmOS
4T Nvntory 1.0 for PalmOS
4T Nvntory 1.8 for PalmOS
4T Pet 1.1 for PalmOS
4T Publication 1.0 for PalmOS
4T Publication 1.2 for PalmOS
4Team for Microsoft Outlook 2002 v1.50.0202 Retail
4Team for MS Outlook 2002 1.90.0044
4Team for MS Outlook 2002 v1.90.0044
4Tek WebDB v1.0
4th Dimension Server v6.0.6
4th Dimension SQL Server v6.0.6
4th Dimension v2.0.11
4th Dimension v3.5.1
4th Dimension v6.0
4th Dimension v6.0J
4TH DIMENSION V6.5
4th Pass Source Guard Enterprise Edition v4.0
4th Right
4th Right Mac
4th Software Checklist Server v2.0.1
4th Software Checklist v2.0.3
4U AVI MPEG Converter v1.2.8
4U WMA MP3 Converter v1.2.3
4U WMA MP3 Converter v1.3.8
4U WMA MP3 Converter v2.2.1
4U WMA MP3 Converter v2.2.3
4U WMA MP3 Converter v2.3.8
4U WMA MP3 Converter v3.0.8
4U WMA MP3 Converter v3.1.0
4U WMA MP3 Converter v3.1.5
4U WMA MP3 Converter v3.1.5.us
4U WMA MP3 Converter v3.2.8
4U WMA MP3 Converter v3.28
4U WMA MP3 Converter v3.6.0
4U WMA MP3 Converter v3.6.2
4U WMA MP3 Converter v3.60
4U WMA MP3 Converter v3.62
4U WMAMP3 Converter v2.2.3
4UOnly v1.1.2
4UOnly v1.1.5
4UOnly v1.1.8
4W WebMerge v2.2
4Winds v1.0
5 Addictive Card Games
5 Ball Deluxe
5 Card Dash
5 Card Poker Coll v1.1
5 Card Poker Collection v1.3
5 Card Poker Collection v2.0
5 Card Slingo Deluxe v1.0.7
5 Card Stud Poker v1.0
5 clicks - a Screen Capture Program v2.1 regcode
5 Clicks 4.01 Spider
5 Clicks Screen Capture v4.2
5 Clicks Screen Capture v4.2 regfile
5 Clicks v2.1
5 Clicks v4.0
5 Clicks v4.0 regfile
5 clicks v4.0.1
5 Clicks v4.01 Spider
5 Clicks v4.1
5 Clicks v4.1 (Spider)
5 Clicks v4.1 regfile
5 Clicks v4.2
5 Clicks v4.2 regfile
5 Clicks v4.3 regfile
5 Dices v1.0
5 Dices v1.0 German
5 Min Scrabble v1.3
5 on Lines v1.0 us
5 Or More v2.0a
5 Solitaires Pack v1.0
5 Spots v1.2.0
5 Star Word Engine 2.5
5 Star Word Engine v2.5
5 Star Zip 2001 v1.0
5 Star Zip v1.0
5 StarsZip 1.0.Us
5 StarsZip v1.0.Us
5 StarZIP 2001 v1.0
5 StarZIP-2001 v1.0
5 StarZip-2001 v1.0 loader
5.StarZIP.2001.v1.0
500 Cards v1.10
500 Supreme v1.0
501 Tangram Challenges v1.1
50States v1.0
55mm v3.0 for AVX
55mm v3.01 for AE
59 Plus Log Lite v1.4.0
5Account R2.4
5D PDF Creator 1.50
5D PDF Creator Ninak v1.5
5D PDF Creator v1.5
5D PDF Creator v1.52
5FiLes +v3.30
5mHerbal v6.0.177 for PocketPC
5mHerbal v6.0.177 PocketPC
5mID v4.0.176 for PocketPC
5mID v4.0.176 PocketPC
5mOrtho v4.0.178 for PocketPC
5mOrtho v4.0.178 PocketPC
5-OR-MORE v1.0a
5-Or-More v1.0a Win
5orMore v2.0
5-Or-More v2.0
5OrMore v2.0a
5-Or-More!
5-Or-More! 2.0a
5-Or-More! v2.0
5-Or-More! v2.0a
5PM Term
5PM Term v2.2
5PM Term v3.1.4
5PM Term v3.5.1
5star BeeLines v1.1
5star Gomoku 1.6
5star Gomoku v1.6
5StarZip 2001 1.0
5StarZip 2001 v1.0
5Talk v1.01
5Time v3.2
5Xpence v3.9
602 Internet Server v3.32c
602 LAN Suite v2004.0.04.0909
602 Messaging Server v3.32c
602 Pro Internet Server 32bit v3.32a
602 Pro Internet Server v3.32a
602 Pro LAN Suite 2000.0.0.60
602 Pro LAN Suite 2000a.0.1.34
602 Pro LAN Suite v1.35
602 Pro Messaging Server v3.32b
602 Pro Messaging Server v3.32c
602 Pro Office Server v3.32a
602 Pro PC Search 2000b
602 Pro PC Suite 2000b
602 Pro PC Suite 99a.03
602 Pro PC Suite 99a.04
602 Pro PC Suite v4.0.04.0401
602 Pro Personal Office Server v3.32b
602 Pro Personal Office Server v3.32b v1.754
602 Pro Personal Office Server v3.32c v1.1013
602 Pro Plus Pack 2000b
602 Pro Plus Pack 99 1999a
602 Pro Web Forum v5.1g
602 Software Messaging Server PRO v3.32c
602LAN Suite v2004.0.04.0813
602LAN Suite v2004.0.04.1104
602LAN Suite v2004.0.04.1207
602PC SUITE Multi-User v4.1.04.0903
602PC Suite v4.1.04.0903
602PC Suite v4.1.04.0908
602Print Pack v1.0
602Print Pack v3.0
602Print Pack v4.1.04.1027
602Pro LAN Suite 2000a
602Pro LAN SUITE 2000A build 2000.0.1.24
602Pro LAN SUITE 2000A Build 2000.0.1.34
602Pro LAN SUITE 2000A build 2000.0.1.37
602Pro LAN SUITE 2000a0.1.27
602Pro LAN Suite 2002
602Pro Lan Suite 2002 build 2002.0.02.0314
602Pro Lan Suite 2002 Build 2002.0.02.0731
602Pro Lan Suite 2002 v2002.0.02.0731
602Pro LAN Suite 2002.0.02.0912
602Pro LAN Suite 2002.0.03.0212
602Pro LAN Suite 2003.0.03.0609
602Pro LAN Suite 2003.0.03.0828
602Pro Lan Suite v1.24
602Pro LAN SUITE v2002
602Pro Lan Suite v2002.0.03.0212
602Pro Lan SUITE v2003.0.03.0609
602Pro LAN Suite v2004.0.04.0303
602Pro LAN Suite v2004.0.04.0419
602Pro LAN Suite v2004.0.04.0715
602Pro LAN Suite v2004.0.04.0723
602pro Office Server v3.32a
602Pro PACK PLUS 2000
602Pro PC SUITE 2000
602Pro PC Suite 2001
602Pro PC Suite Plus 2001
602Pro PC SUITE Plus v2001.1.02.1204
602Pro PC Suite PLUS v2001.1.03.0113
602Pro PC Suite v2000b
602Pro PC Suite v4.0 (25 Users)
602Pro PC Suite v4.0.03.1006
602Pro PC Suite v4.0.03.1006 Multi-User
602Pro PC Suite v4.0.04.0401
602Pro PC Suite v99
602Pro PRINT PACK
602Pro PRINT PACK 2001
602Pro Print Pack v2002.1.03.0310
602Pro Print Pack v3.0.03.1202
602Pro Print Pack v4.0.04.0727
602pro Web Forum v5.1g
602SQL Server v8.0.27
602SQL Server v8.0a
68000 Assembler
68000 Integrated Development Environment v1.35
68000 Integrated Development Environment v1.36
68000.Integrated.Development.Environment.v1.10
68000.Integrated.Development.Environment.v1.20
68000.Integrated.Development.Environment.v1.30
68332 Compiler, IDEA and ZAP Sim v2.9E
68HC11 Simulator Toolbox v2.0
6Screens v1.2
6sense v2.5
6x86 Configuration Control Center 3.21.06
7 in 1 Poker
7 in 1 Poker Patience 1.1.0.0
7 Tuner v1.7
7 View Slide Show v2.0.0
7 View Slide Show v3.1
7 way v0.24
70 210 TestPro (revision 3f1) v3.1
70 215 TestPro (revision 3d) v3.1
70_210 TestPro revision 3f1 v3.1
70_215 TestPro revision 3d v3.1
72 t Distribution Software v4.21
72t Distribution Software v4.21
767 PILOT COMMAND
767 Pilot in Command
777 Slots
777 SLOTS 1.2
777 Slots v1.1
777 Slots v1.2
777 Slots V2.0
7-max v3.01b
7-max v3.02
7Office Sales Management Standalone v2.2 for Windows
7th Sense 1.2 for PalmOS
7th Sense v1.51-PDA
7tools DVD Grab&Burn v1.0
7View Slide Show v1.0.0
7Way Email Checker v1.26
7Way EMail Checker v1.41
7Way Email Checker v1.50
7Way Email Checker v1.51
7Way Email Checker v1.6
7Way Email Checker v1.60
7Way Email Checker v1.72 En
7Way Email Checker v1.80
7Way EMail Checker v1.81
7Way Email Checker v1.xx
7Way v1.26
7-ZIP Archiver 2.10
7-Zip Archiver 2.11
7-Zip Archiver 2.23
7-Zip Archiver 2.4
7-ZIP Archiver v2.10
7-ZIP Archiver v2.11
8 Away
8 Ball Deluxe
8 Ball Deluxe v1.0.1
8 Ball Deluxe v2.0
8 Ball Slots v1.1
8 Ball Slots v1.2
8 Ball Slots v1.3
8 Ball Slots v2.0
8 Signs Firewall v2.2
80-20 Retriever v2.5 for Outlook
8051 IDE v1.20
8052 Simulator v3.6
8085 Simulator Ide v1.64
8085 Simulator IDE v1.80
8085 Simulator v1.5
80C196 C-compiler v5.0
88 Edit v1.05
8Ball DeLuxe II
8-Ball Emulator v9.2
8-Ball Slots
8leg Web Studio
8Mile
8mm2avi v1.3
8signs Firewall Remote Administration Tool v2.25
8signs Firewall Remote Administration Tool v2.26
8Signs Firewall v2.1.2
8Signs Firewall v2.1.3
8signs Firewall v2.25
8Signs Firewall v2.26
8signs Firewall v2.2a
8Signs Remote Administration Tool v2.2a
8Tuner v3.x.x
9.95 FTP v2.1.4b
90Z CD-MP3 Music Converter v1.5
90z MP3 Player v1.1
90z Post Tools v1.1
95 System Backup v3.0 for Win-95
95 Systeme Backup v3.0 Win95
98lite III Professional
98lite Pro v2.0
98lite Professional v4.7
98lite v4.0 Me
98lite v4.0 Millennium Edition
99 Bottles
99 Bottles v1.0
99 Bottles v1.0 trainer
9-Ball Pinball v1.1.1 for PalmOS
9Lives 1.0 build 1004
9Lives v1.0 build 1004
9x MetaMagic v1.1
9X Webspider 3.9.13
9x WebSpider v3.7.71 Win95/NT
9x WebSpider v3.9.13
9x WebSpider v3.9.20
9XALTERNATOR v1.0.7
9xMetaMagic v1.1
9xWebSpider v3.9.20
A AtomicTimeSync v3.3.0
A AtomicTimeSync v3.4.0
A AtomicTimeSync v3.7.1
A Beautiful Sunset Screensaver v1.0
A Better Finder Attributes v1.1.x
A Better Finder Creator and Types v1.3
A Better Finder Creator and Types v1.x
A Better Finder Creator and Types v2.0.1
A Better Finder Rename v1.0.1
A Better Finder Rename v1.x
A Better Finder Rename v2.2
A Better Finder Select v1.0
A Better Finder Select v1.2.1
A Certification Theory & Study Guide
A ChessExpert Professional Edition v3.7.1
A Christmas at Santa's v2.72
A Christmas at Santas v2.9
A Christmas at Santa's v2.9
A Christmas at Santa's v2.9 new
A Christmas Tree Screensaver 3D v1.01
A Custom Browser 5.1
A Custom Browser v5.1
A Daily Backup v3.5.0
A Daily Backup v3.6.1
A DailyBackUp v3.4.1
A dailyBackup v3.4.2
A Dot Mess v3.0
A Dream Lotto v1.6.1 Multilingual
A Email Spam Filter v1.0
A Email Spam Filter v2.0
A General Practice Library v2.0.100
A General Practice Library v2.0.99
A General Practice Library v2.1.121
A Key Word Thing v1.01.01
A Key Word Thing v1.01.01 regfile
A Lex English Dictionary v1.7
A Little Vietnamese v1.2
A Miracle in a Thought Screen Flash
A Miracle In a Thought Screen Flash ScreenSaver
A Miracles in a Thought Screen Saver
A music sequencer
A Music Sequencer - Seq303 v2.0.0.4
A Musical Generator v0.9.2.219
A Musical Generator v2.0
A Musical Generator v2.0.0.288
A Musical Generator v2.0.288
A Musical Generator v3.0
A Musical Generator v3.0 Beta 7
A Personal Todo List v1.0
A Plus Calc v1.1
A Plus Calc v1.1b
A Plus Email Spam Filter v2.0.0
A Plus Exam Prep v4.0
A Plus Exame Prep V4.0
A Plus File Naming System v1.1.0
A Plus File Naming System v1.1.1
A Plus File Protection v2.1
A Plus File Protection v2.1.0.1
A Plus File Renaming System v1.2.5
A Plus PopUp Blocker v2.1
A Plus Screensaver Creator v3.23
A Plus Screensaver Creator v3.24
A Plus Screensaver Creator v3.4
A Plus Web ScreenSaver v2.0
A Plus Web ShowMaker v2.0.0
A Practical Guide to Enterprise Architecture - eBook
A Real Validator
A Real Validator 1.01
A Real Validator 1.11
A Real Validator v1.01
A Real Validator v1.1
A Real Validator v1.11
A Rob Fantastic MP3 Encoder 1.3
A Rob Fantastic MP3 Encoder v1.3
A Rob Fantastic MP3 Encoder v1.4
A Rob Fantastic MP3 Encoder v2.0
A Rob Fantastic MP3 Encoder v2.0 Regfile
A Rob Fantastic MP3 Networked Encoder v1.4
A RobFantastic MP3Encoder v1.3
A Screensaver Creator
A Screensaver Creator v3.23
A ScreenSaver Creator v3.33
A Sea of Pebbles v1.1
A shutdown 3.3.3 By Tsrh
A ShutDown Professional Edition v3.7.1
A ShutDown v3.3.4
A Shutdown v3.4.0
A Simple Task Reminder v2.0
A Small Image (Trivista)
A Small Image Trivista
A Smaller Gif 1.07
A Smaller Gif v.1.06 16 + 32 B.
A Smaller Gif v1.04 Win
A Smaller Gif v1.04+
A Smaller Gif v1.06
A Smaller Gif v1.06 16/32
A Smaller Gif V1.06 16and32bit
A Smaller Gif v1.07
A Smaller Gif v1.10
A Smaller Gif v1.2.2b1J
A Smaller Gif v1.3
A Smaller Image
A Smaller Image 1.0
A Smaller Image v1.0
A Smaller Image v1.0 regfile
A Smaller Image v1.00
A Smaller Image v2.00
A Smaller Note 2.09
A Smaller Note 99
A Smaller Note 99 V2.05
A Smaller Note 99 V2.06
A Smaller Note 99 v2.08
A Smaller Note 99 v2.09
A Smaller Note 99 v2.09 loader
A Smaller Note 99 v2.10
A Smaller Note 99 v2.10 DE
A Smaller Note 99 v2.10 ger
A Smaller Note 99 v2.10 German
A Smaller Note v2.08
A Smaller Note v2.09
A Smaller Note v2.09 loader
A Snake's Life
A Speeder 2.8.0.122
A Speeder v2.1
A Speeder v2.3
A Speeder V2.5
A Speeder v2.6
A Speeder v2.7.0.119
A Speeder v2.8.0.122
A Speeder v2003.11.8.138
A Speeder v2004.12.2.4470
A Speeder v2004.4.17.3218
A Speeder v2004.8.2.4281
A Speeder v2004.9.4.4373
A StockAlert Professional.Edition v3.7.1
A StockAlert v3.3.0
A to Z Digital Address Book v1.02
A Touch of Love Screen Saver Slide
A Touch of Love ScreenSaver Slide
A Valentine Wish Screen Saver v5.0
A Valentine Wish Screen Saver v5.00
A Valentine Wish Screen Saver v5.00 Us
A Valentine Wish Screensaver v5.0
A Valentine Wish Screensaver v5.00
A Valentine Wish v5.00
A Vos Vins v3.0
A Vos Vins v3.0.0.5
A Web Screen Saver v2.0.0
A!K Mouse Off-road v2.11
A!K Smart WorkTime Tracker Professional v1.0.1.131
A!K Smart WorkTime Tracker Professional v1.1
A. Unit Converter v1.2
A. ZIP Password Rec. Tool v0.9
A.D. 1503
A.D. Comparison and Synchronization v1.12
A.D.A.M Interactive Anatomy
A.D.A.M The Inside Story
A.I.D v2.1
A.I.D v3.1.5
A.I.D. v2.0.2
A.I.D. v4.01
A.M.O. Crackme v0.4
A.Real.Validator.v1.11
A.S.C v3.0
A.S.C. v3.0
A.T. Ceuls Fox v2.0
A.X.E. - Advanced Hex Editor
A.X.E. v2.0
A/Plus Enterprise v2.34
A_AtomicTimeSync v3.3.0
A_DailyBackUp v3.4.1
A_dailyBackup v3.4.2
A_dailyBackup v3.5.0
A_dailyBackup v3.6.1
A_dailyBackUp v3.6.2
A_dailyBackUp v3.7
A_ShutDown v3.3.3
A_ShutDown v3.3.4
A_Shutdown v3.4.0
A_StockAlert v3.3.0
A_StockAlert v3.4.1
A+ 2nd Speech Center v1.0
A+ Certification Theory & Study Guide Code
A+ Core TestPro (revision 2.2) v2.1
A+ Core TestPro revision v2.2 v2.1
A+ Email Spam Filter v2.0.0
A+ Enterprise v2.34
A+ Exam Prep v4.0
A+ File Protection v2.1
A+ Math
A+ Math v.1.0
A+ Math v1.0
A+ MathMAT v1.0.0
A+ OS TestPro (revision 2.2) v2.1
A+ OS TestPro revision v2.2 v2.1
A+ Pop Up Blocker v2.1
A+ PopUp Blocker v2.1
A+ Screen Saver Creator 3.22
A+ Screen Saver Creator v3.22
A+ ScreenSaver
A+ Screensaver Creator
A+ Screensaver Creator 3.2
A+ Screensaver Creator 3.23
A+ Screensaver Creator v3.0
A+ Screensaver Creator v3.2
A+ Screensaver Creator v3.22
A+ Screensaver Creator v3.23
A+ Screensaver Creator v3.24
A+ ScreenSaver Creator v3.33
A+ Screensaver Creator v3.4
A+ Web Screen Saver v2.0.0
A+ Web ScreenSaver v2.0
A++Zip 1.1
A++Zip v1.1
A+Calc v1.1
A+Screensaver
A+Screensaver 3.33
A+Screensaver v3.33
A+Web Screen Saver 2.0.0
A+Web Screen Saver v2.0.0
A1 Audio Ripper v1.0
A1 Audio Ripper v1.00
A1 Data Pick v3.0.0
A1 DVD Audio Ripper Professional v1.1.28
A1 DVD Audio Ripper Professional v1.1.29
A1 DVD Audio Ripper v1.1.21
A1 DVD Audio Ripper v1.1.23
A1 DVD Audio Ripper v1.1.24
A1 DVD Audio Ripper v1.1.25
A1 DVD Audio Ripper v1.1.26
A1 DVD Audio Ripper V1.1.27
A1 DVD Audio Ripper v1.1.28
A1 DVD Audio Ripper v1.1.29
A1 DVD Ripper Pro v1.0.0.5
A1 DVD Ripper Pro v1.1.05
A1 DVD Ripper Pro v1.1.21
A1 DVD Ripper Professional v1.1.02
A1 DVD Ripper Professional v1.1.03
A1 DVD Ripper Professional v1.1.04
A1 DVD Ripper Professional v1.1.05
A1 DVD Ripper Professional v1.1.06
A1 DVD Ripper Standard v1.0.08
A1 DVD Ripper v1.0.0.5 Professional
A1 DVD Ripper v1.0.02
A1 DVD Ripper v1.0.04
A1 DVD Ripper v1.0.04 Professional
A1 DVD Ripper v1.1.02
A1 DVD Ripper v1.1.06 bata
A1 Email Address Extract v2.4
A1 E-Mail Address Extract v2.4
A1 Email Address Extract v2.4.0
A1 Email Address PRO v2.0.2
A1 E-Mail Address Pro v3.0.3
A-1 Image Screen Saver
A-1 Image Screen Saver v4.1
A-1 Image ScreenSaver
A-1 Image ScreenSaver v4.1
A1 Image Screensaver v4.2
A-1 Image Screensaver v4.2
A-1 Image ScreeSaver
A1 Monitor v2.2.0
A1 Monitor v2.2.2
A1 Monitor v3.7.3
A1 Monitor v4.1.0
A1 Monitor v4.2.0
A1 Monitor v5.5.0
A1 Multiplicatron
A1 Quick Tray 2.0
A1 Quick Tray v 2.1
A1 Quick Tray v v2.1
A1 QUICK TRAY v2.0
A1 Software
A1 SpeechTEK v1.0
A1 Surf v11.2.0
A1 Surf! v.2.0
A1 Text Finder v4.0.1
A1 Text Finder v4.0.2
A1 Text Finder v4.02
A1 Text Picker v3.0.0
A-1 Wallpaper Pro v.1.0
A1 Wallpaper Pro v1.0
A-1 Wallpaper Pro v1.1
A1 WINScreen v4.0
A1 World Exchange Calculator 2.0.7
A1 World Exchange Calculator v2.0.7
A1 World Exchange Calculator v2.1.2
A1 World Exchange Calculator v2.2
A1 World Exchange Calculator v2.3.1.3
A1 World Exchange Calculator v2.3.1.3 regfile
A1 World Exchange Calculator v2.3.1.4 regfile
A-10 Attack - version 1.1
A-10 Attack - version v1.1
A-10 Attack 1
A-10 Attack v1.0
A-10 Attack v1.1
A-10 Attack v1.3
A-10 AttackMac
A-10 Cuba Activision
A-10 Cuba v1.x
A-10 Cuba Win95 fullplay
A138win Windows Programm v2.00
A1-Image Screensaver 4.0
A1-Image Screensaver v4.0
A1Monitor 2001 v5.6.3
A1Monitor 2004 v6.1.7
A1Monitor 2004 v6.2.1
A1Monitor 2004 v6.3.2
A1Monitor 3.0.0
A1Monitor 5.5.0
A1Monitor v2.1.1
A1Monitor v2.2.2
A1Monitor v3.0.0
A1Monitor v3.5.2
A1Monitor v3.6.1
A1Monitor v3.6.2
A1Monitor v3.6.3
A1Monitor v3.7.0
A1Monitor v3.7.1
A1Monitor v3.7.5
A1Monitor v3.7.6
A1Monitor v3.8.0
A1Monitor v3.8.1
A1Monitor v3.8.4
A1Monitor v4.0
A1Monitor v4.0.0
A1Monitor v4.0.2
A1Monitor v4.1.0
A1Monitor v4.2.0
A1Monitor v4.2.1
A1Monitor v4.2.2
A1Monitor v5.0.0
A1Monitor v5.0.1
A1Monitor v5.0.2
A1Monitor v5.5.0
A1Monitor V5.6.0
A1Monitor v5.6.4
A1Monitor v5.6.5 2001
A1Monitor v5.7.0
A1Monitor v5.9.9
A1Monitor v6.0.5
A1MONITOR v6.1.0 Beta
A1Monitor v6.2.0
A1Monitor v6.2.1
A1Monitor v6.2.2
A1Monitor v6.2.3
A1Monitor v6.3.8
A1Tech Alertwall Personal Firewall Spyware Blocker v2.6.0
A1Tech Alertwall Personal Firewall Spyware.Blocker v2.6.0
A2Soft CD Creator v1.0
A2Soft CD Creator v1.1
A2Soft CD Creator v1.1.011704
A2Soft CD Creator v1.2
A2Soft Logic Balls v1.0
A2Soft Logic Balls v1.0.us
A2Z Collection Manager v2.4
A2Z Collection Manager v2.4.77
A2Z Gradebook 32-bit v3.2
A2Z Gradebook v3.2
A2Z Gradebook v3.4
A2Z Gradebook v4.0.1.5
A2Z Hangman v3.10
A2Z Hangman v3.20
A2Z Hangman v4.0.0.5
A2Z hangman v4.3.0.1
A2Z hangman v4.3.0.1 trainer
A2Z Home Inventory 1.6.1
A2Z Home Inventory 1.6.2
A2Z Home Inventory v1.1.73
A2Z Home Inventory v1.5
A2Z Home Inventory v1.5.19
A2Z Home Inventory v1.6 Build 21
A2Z Home Inventory v1.6.1
A2Z Home Inventory v1.6.2
A2Z Home Inventory v1.6.21
A2Z Home Inventory v1.61.37
A2Z Home Inventory v1.62.42
A2Z Home Inventory v2.0 Build.68
A2Z Home Inventory v2.0.68
A2Z Home Inventory v2.1.73
A2Z Home Inventory v3.0.96
A2Z Home Inventory v3.1.108
A2Z Home Inventory v3.3.128
A32 WipeErase Professional v2.0
A3D ParaLogix Level Two v2.5
A3E 1.21-1.22
A3E v1.21-1.22
A3E v1.x
A3E v1.x edit A3E.KEY
A4 Desk 2.00e
A4 Desk v2.00e
A4 DVD Shrinker v4.0
A4 Proxy 2.01
A4 Proxy v2.01
A4 Video Converter v2.3
A-40 v1.4 crack
A4Desk v2.5
A4Mark v1.00
A4Mark v6.00
A4Proxy
A4proxy v2.02
A4proxy v2.5.2
AA Allocation Manage System
AA Scripter v1.8
AAA Audio MP3 Maker v1.05
AAA Audio MP3 Maker v1.08
AAA Audio MP3 Maker v1.12
AAA CC Proxy Server v4.31
AAA CD to MP3 Maker v1.0
AAA CD To MP3 Maker v1.01
AAA CD to Mp3 Maker v1.10
AAA ColorPicker 1.0
AAA ColorPicker v1.0
AAA EasyGrid ActiveX v3.51
AAA FTP easy v.4.0
AAA FTPeasy v4.0
AAA Magic 3D v1.0
AAA MP3 CD Maker v1.60
AAA MP3 WAV Converter v2.52
AAA MP3 WAV Converter v2.65
AAA Password Protector v.1.0
AAA QuickSearch 3.02
AAA QuickSearch v3.01
AAA Real MP3 Recorder v1.7
AAA Real Recorder v1.7
AAA Real Recorder v1.70
AAA Screen Capture v1.0
AAA Screen Capture v1.1
AAA Screen Capture v2.1
AAA Screen Capture V2.1 Trial to Full
AAA Store Password v1.0
AAA Wave v3.1.23
AAAnalyzer v1.61.110
AAApeg Image Browser v1.04
AAApeg Image Browser v1.06
AAAwave v4.0
Aadvanced dialer v2.1
Aaer CD Ripper v3.1
Aaer MP3 Sound Recorder v3.0
Aaerus IconCommander v1.14
aAlarm WorldAlarm v4.2 for PalmOS
AALog v2.0 Beta 5
AALog v2.0 Final
AALog v2.44
AALog v2.44 keyfile
AALog v2.45
AALog v2.45 keyfile
AALog v2.46 keyfile
AALog v2.47 regfile
AandE Tracker v2.0.2
Aaragon Deluxe Gold Edition All Levels Cheat
Aardvark Compare for VB v.1.0.88
Aardvark Compare for VB v1.0.88
Aardvark Compare For Visual Basic v1.069
Aardvark Polisher for VB 6.0.84
Aardvark Polisher for VB 6.0.xx
Aardvark Polisher for VB v6.0.80
Aardvark Polisher for VB v6.0.xx
Aardvark Polisher For Visual Basic v6.059
Aardvark Pretty Printer for VB v6.0.106
Aardvark Pretty Printer For Visual Basic v6.064
AARDVARK PRO 3.0.1
Aardvark Pro 3.01
Aardvark Pro 32 HTML Editor v32.2.4.2
Aardvark Pro HTML Editor v.3.0.1 32 Bit
Aardvark Pro HTML Editor V2.0.4
Aardvark Pro HTML Editor v3.0.1
Aardvark Pro HTML Editor v3.0.1 crack
AardVark Pro v2.30 Win95
Aardvark Pro v3.0
Aardvark PRO v3.0 HTML Editor
AARDVARK PRO v3.0.1
Aardvark v3.0.0
Aare Avi to VCD Converter v3.0
Aare AVI to VCD DVD SVCD Converter v3.1
Aare AVI to VCD DVD SVCD MPEG Converter v4.0
Aare AVI to VCD DVD SVCD MPEG Converter v4.1
Aare AVI to VCD DVD SVCD MPEG Converter v4.5
Aare AVI to VCD DVD SVCD MPEG Converter v5.0
Aare AVI to VCD DVD SVCD MPEG Converter v6.1
Aare AVI To VCD/DVD/SVCD Converter v3.0
Aare AVI to VCD/DVD/SVCD Converter v3.2
Aare AVI to VCD/DVD/SVCD Converter V5.0
Aare AVI to VCD/DVD/SVCD/MPEG v4.0
Aare AVI to VCD_DVD_SVCD_MPEG Converter v6.1
Aare AVI to VCD-DVD-SVCD Converter v3.2
Aare AVI to VCD-DVD-SVCD-MPEG Converter v6.1
Aare AVI to VCD-DVD-SVCD-MPEG v4.0
Aare CD Ripper
Aare CD Ripper v3.0
Aare CD Ripper v3.1
Aare CD Ripper v3.1.1
Aare CD Ripper v3.2
Aare French Dialogs v1.01
Aare French Dialogs v2.0
Aare German Dialogs v1.01
Aare German Dialogs v2.0
Aare Italian Dialogs v1.01
Aare Italian Dialogs v2.0
Aare MP3 Sound Recorder v1.0
Aare MP3 Sound Recorder v3.0
Aare MP3 WAV Converter 3.6
Aare MP3 Wav Converter Plus v4.0
Aare MP3 WAV Converter Plus v4.1
Aare MP3 WAV Converter Plus v4.5
Aare MP3 Wav Converter v3.6
Aare MP3 Wav Converter v3.6.1
Aare MP3 WAV Converter v3.6.2
Aare MP3 Wav Converter v3.6.3
Aare MP3 Wav Converter v4.5
Aare MP3 Wave Converter v3.6.3
Aare Recite French Words v2.0
Aare Recite German Words v2.0
Aare Recite Italian Words v2.0
Aare Recite Spanish Words v1.1
Aare Recite Spanish Words v2.0
Aare Screen Saver Maker v3.0
Aare Spanish Dialogs v1.01
Aare Spanish Dialogs v2.0
Aareus IconCommander v1.13
Aareus IconCommander v1.14
Aareus IconSlide 4.01
Aareus InfoClip 1.14
Aareus MenuSlide99 v1.0
Aareus UpClose 3.21
Aargon Deluxe
Aargon Deluxe - Real Arcade
Aaron News Stand v1.0
Aaron v1.1.3
Aaron's WebVacuum v2.00f
Aaron's WebVacuum v2.30f
AAS E-Mail List Manager v1.1.0
AATools v4.0c
AATools v5.0
AAuction v1.06
AAVoice V1.40
AaxBattery v1.0.0
aaxDriveManager v1.0.0
Aaxdrivemanager.v1.0.0
aaxIniFile v1.0.0
Aaxinifile.v1.0.0
aaxRegistry v1.0.0
Aaxregistry.v1.0.0
AB Calculator 1.1
AB Calculator v1.1
AB Commander Classic Edition v6.7 regfile
AB Commander ME 5.3
AB Commander ME 6,4
AB Commander ME Edition v6.2
AB Commander ME Edition v6.6
AB Commander ME v1.6
AB Commander ME v5.3
AB Commander ME v6.0
AB Commander ME v6.2
AB Commander ME v6.4
AB Commander ME v6.5
AB Commander ME v6.5a
AB Commander ME v6.6
AB Commander Millennium Edition v5.3
AB Commander Millennium v6.3
AB Commander v6.3 XP Edition
Ab Commander v6.4
AB Commander XP 6,4
AB Commander XP Edition v5.3
AB Commander XP Edition v6.2
AB Commander XP Edition v6.6
AB Commander XP v1.5
AB Commander XP v1.6
AB Commander XP v6.4
AB Commander XP v6.5
AB Commander XP v6.5a
AB Commander XP v6.6
AB Commander XP v6.6 NT 2000 XP
AB Commander XP v6.7
AB Complete Ping v3.00
AB DH485 ActiveX v1.2a
AB Ethernet TCP ActiveX v2.3b
AB File Encryptor v3.08
AB Hide Folder
AB HTML Compressor v2.34
AB Internet Nanny v2.02
AB MP3 Encoder v2.11
AB MP3 Encoder v2.12
AB MP3 Tag Editor v3.14
AB Password Generator v2.33.0041
AB Picture Converter v3.00
AB Planning v3.0.3.36
AB Safe Deletion v2.08
AB Screen Locker v3.62
AB Screen Locker v3.62.0220
AB Sequest v2.5.0.67
AB Serial ActiveX v2.3b
AB System Spy v4.6
AB System Spy v4.60.0872
AB System Spy v5.0
AB System Spy v5.00
AB System Spy v5.01
AB System Spy v5.1.1b2
AB Text Encryptor v2.00
AB Tutor Control 1.1
AB Tutor Control 1.5
AB Tutor Control v3.0.2 crack
AB Tutor Control v3.0.3 crack
AB Tutor Control v3.5 crack
Aba Daba Deluxe v1.3
Abac Karaoke v2.15
Abac v1.1 for PalmOS 5
Abac v1.1 High Resolution
Abac v1.1 HiRes16Bit
Abac v1.1 Low Resolution
Abacre Web Site Uploader v1.0 license
Abacre Web Site Uploader v1.1
Abacus 4.0 Build 020810
Abacus Airport and Scenery Designer v2.1
Abacus Custom Panel Designer v3.0
Abacus Custom Paneldesigner v2.0
Abacus Custom Paneldesigner v2.1
Abacus Ez VFR Utility
Abacus HDD Acoustic Manager v1.2.1
Abacus Help Desk v3.0
Abacus Help Desk v3.12
Abacus Helpdesk v3.6
Abacus HelpDesk v3.71
Abacus HelpDesk v3.75
Abacus HelpDesk v3.76a
Abacus Helpdesk v3.7k
Abacus HelpDesk v3.8 R2
Abacus Law Office Calendar System
Abacus Premier Aircraft Collection
Abacus Premier Collection Aircraft FS2002
Abacus Premier Collection Aircraft FS2002 crack
ABACUS Professional v5.3302
ABACUS Professional v5.3600 DOS
Abacus SE v4.0.030914
Abacus SE v4.0.040415
Abacus SE v4.0.040623
Abacus Train Sim Modeler v1.0
Abacus v2.1
Abacus v4.0 Build 020810
Abakus VCL Delphi 2,3,4,5 Component
Abakus VCL v2.5.0.4
Abakus VCL v2.7.0.6 for Delphi 7
Abale Zip ActiveX v5.0
Abale Zip Activex V5.0 By Orion
ABALONE 1.0
Abalone V1.0
Abalone v1.2
Abander Tag Control v2.0 Beta 4
Abander Tag Control v2.0 Beta 5
Abander Tag Control v2.0 Build 020
Abander Tag Control v2.0.011
Abander Tag Control v2.010
Abander TagControl 2 Build 020
Abander TagControl v1.01k
Abander TagControl v1.02
Abander TagControl v1.2
Abander TagControl v1.3
Abander TagControl v1.31 build 1853
Abander TagControl v1.35 build 130
Abander TagControl v1.37 build 270
Abander TagControl v1.37.334
Abander TagControl v1.38 build 100
Abander TagControl v1.38 build 171
Abander TagControl v1.38.150
Abander TagControl v1.38.171
Abander TagControl v1.39 Build 020
Abander Tagcontrol V1.39 Build 020 By Lash
Abander TagControl v1.39 Build 020 RCP
Abander TagControl v1.4.015
Abander TagControl v2.0 Build 010
Abander TagControl v2.0 build 020
Abander TagControl v2.05 build 120 (14 June 2004)
Abander TagControl v2.3 build 180
Abandoned Well v1.0
Abandoned Well v1.0 loader
Abandoned Well v1.0 trainer
Abandoned Well v1.1
Abandoned Well v1.1 all access cheat
Abandoned Well v1.1 trainer
Abandoned Well v1.15 loader
Abandoned Well v1.15 trainer
Abaqus Helpdesk Master v2.5
ABAQUS v6.3.3
ABAQUS v6.5-1
ABAQUS v6.5-1 Linux
Abashera v1.0
Abashera v1.02
Abashera v1.03
Abashera v1.3
Abassis Finance Manager v1.0.20
Abassis Finance Manager v1.1.84
Abassis Finance Manager v1.1.86
Abatus Mirror Server (AMS) v1.1.0
Abatus Mirror Server v1.0.1
Abatus Mirror Server v1.1.0
Abatus Mirror Server v1.1.1
Abbalone 3D v1.0
Abbility Office 2002
Abby Fine Reader Corprate Edition 6
Abby fine reader v6.0 professional trial
Abby Fine Reader v7.0 Professional Edition
ABBY Lingvo v9.0 WinMobile 2003 ARM
ABBYY Fine Reader Corporate Cyrillic v6.0
ABBYY Fine Reader Pro Cyrillic Plus v6.0
Abbyy Fine Reader Professional v6.0
Abbyy Fine Reader Professional v6.0 Retail
ABBYY Fine Reader v1.0.0.335
ABBYY Fine Reader v1.02.40
ABBYY Fine Reader v4.02.40
Abbyy Fine Reader v5.0 pro Try & Buy
Abbyy Fine Reader v5.0.293 Office Try & Buy
ABBYY Fine Reader v6.0
Abbyy fine reader v7.0 pro
Abbyy finereader
Abbyy FineReader 5 Pro (Try and Buy) - Windows XP
Abbyy FineReader 5 Pro Try and Buy - Windows XP
ABBYY FineReader 6 Time Reset
ABBYY FINEREADER 6.0
ABBYY FineReader 6.0.657.2564
ABBYY FineReader 7
ABBYY FineReader 7.0 Professional Edition
ABBYY FineReader Corporate Edition v6.0 Retail
ABBYY FineReader OFFICE v1.0.0.335 RUS
ABBYY FineReader Office v5.0
ABBYY FineReader Office v5.0.0.335
ABBYY FineReader Pro 6
ABBYY FineReader Pro v5.0
ABBYY FineReader Pro v5.0 Try and Buy Windows XP
ABBYY FineReader Pro v5.0.258
ABBYY FineReader Pro v5.0.258 regcode
ABBYY FineReader Pro v5.0.258 WinNT- Win2K
ABBYY FineReader Pro v5.0.258 WinNT- Win2K patch fix
ABBYY FineReader Professional and Office v5.0.276
ABBYY FineReader Professional Edition v7.0.0.543
ABBYY FineReader Professional v4.0
ABBYY FineReader Professional v4.0 build 64
ABBYY FineReader Professional v5.0 Howto
ABBYY FineReader Professional v6.0
ABBYY FineReader Professional v6.0 TimeLimit
ABBYY FineReader Professional v6.0.0.426
ABBYY FineReader Professional v6.xx Unipatch
ABBYY FineReader Professional v7.0.0.543
ABBYY FineReader Professional v7.00.543.3649
ABBYY FineReader Standard v4.0b
ABBYY FineReader v5.0.258
ABBYY FINEREADER v6.0
ABBYY FineReader v6.0 Corporate Edition
ABBYY FineReader v6.0 Corporate Edition Crack
ABBYY FineReader v6.0.657.2564
ABBYY FineReader v6.0.657.2564 Fixed
Abbyy FineReader v7.0
ABBYY FineReader v7.0 Professional
ABBYY FineReader v7.0 Professional Edition build 7.0.0.543 Multilanguage
ABBYY FineReader v7.0 Professional Edition Multilanguage
ABBYY FineReader v7.00.543.3649
ABBYY FineReader6.0 Corp Edit
ABBYY Lingvo 8.0 -
ABBYY Lingvo 8.0 English-Russian Edition &
ABBYY Lingvo v8.0
ABBYY Lingvo v8.0 -
ABBYY Lingvo v8.0 ER
ABBYY Lingvo v9.0
ABBYY Lingvo v9.0 Multilanguage Eng-Rus
ABBYY Lingvo v9.0 WinMobile 2003 Arm
ABBYY ScanTo Office v1.0
ABBYY ScanTo Office v1.0 Multilingual
Abbyy v7.0.0.620
ABC 4 KIDS Workshop
ABC 4' KIDS Workshop
ABC 4 Kids Workshop v1.0
ABC 4' KIDS Workshop v1.0
ABC 95
ABC 95 Font Manager 2.0
ABC 95 Font Manager v2.0
ABC 95 v. 2.0
ABC 95 v. v2.0
ABC 95 v2.0
ABC aiueo v1.0J
ABC Amber CHM Converter v1.06
ABC Amber Outlook Converter v1.03
ABC Amber Outlook Converter v1.03 keyfile
ABC Amber Outlook Express Converter v1.07
ABC Amber PDF Converter v1.03
ABC Amber PDF Converter v1.04
ABC Amber Text Converter v1.18
ABC Amber Text Merger v1.11
ABC Amber The Bat! Converter v1.05
ABC Billpro 5.19
ABC Billpro v5.19
ABC Catalog v2.0
ABC ChemII
ABC Coloring Book I v2.00.0240
ABC Coloring Book I v2.00.0240 Bilingual
ABC Coloring Book II v2.00.0240
ABC Coloring Book v1.0
ABC Coloring Book v1.0.1.0188
ABC Coloring Book v1.00.0175
ABC Coloring Book v1.01
ABC Coloring Book v1.02.0190
ABC Coloring Book v1.03.0200
ABC Coloring Book v1.04.0210
ABC Coloring Book v1.1
ABC Deluxe Solitaire Arena 3.0
ABC Deluxe Solitaire Arena v3.0
ABC DLL ToolKit For CW5A
ABC Drawing School Animals v1.02.0355
ABC Drawing School Birds v1.02.0355
ABC Drawing School Dinosaurs v1.02.0355
ABC Drawing School I - Animals v1.04.0388
ABC Drawing School I - Animals v1.04.0388 ML
ABC Drawing School I - Animals v1.10.0401
ABC Drawing School I - Animals v1.10.0401 ML
ABC Drawing School II - Birds v1.04.0388
ABC Drawing School II - Birds v1.04.0388 ML
ABC Drawing School II - Birds v1.10.0401
ABC Drawing School II - Birds v1.10.0401 ML
ABC Drawing School III - Dinosaurs v1.04.0388
ABC Drawing School III - Dinosaurs v1.04.0388 ML
ABC Drawing School III - Dinosaurs v1.10.0401
ABC Drawing School III - Dinosaurs v1.10.0401 ML
ABC Drawing School IV - Vehicles v1.04.0388
ABC Drawing School IV - Vehicles v1.04.0388 ML
ABC Drawing School IV - Vehicles v1.10.0401
ABC Drawing School IV - Vehicles v1.10.0401 ML
ABC Drawing School V - Christmas v1.04.0388
ABC Drawing School V - Christmas v1.04.0388 ML
ABC Drawing School V - Christmas v1.10.0401
ABC Drawing School V - Christmas v1.10.0401 ML
ABC FlowCharter 3.0
ABC FlowCharter v3.0
ABC Flowcharter v3.0 for Windows
ABC FlowCharter v3.0 Win
ABC FlowCharter v30 for Windows
ABC FontManager 95
ABC Image Browser
ABC Image Browser 3.0
ABC Image Browser v1.6 Build 1.6.3.0
ABC Image Browser v1.6 Build v1.6.3.0
ABC Image Browser v1.6.1
ABC Image Browser v1.6.8
ABC Image Browser v2.0
ABC Image Browser v2.0.10.21
ABC Image Browser v2.0.11
ABC Image Browser v2.0.8.18
Abc Image Browser V2.0.9.20
ABC Image Browser v2.07.15
Abc Image Browser V2.07.15 By Core
Abc Image Browser V2.08.18
ABC Image Browser v3.0
ABC Image Browser v3.0.5.17
ABC Image Browser v3.0.6.19
ABC Image Browser v4.0
ABC Image Browser v4.4
ABC Image Browser v4.5
ABC Image Browser v4.6.1
ABC Image Browser v4.7.0
ABC Image Browser v4.8.0
ABC Image Browser v4.8.1
ABC Image Browser v4.8.3
ABC Image Browser v4.8.4
ABC Image Browser v4.83
ABC Image Browser v4.84
ABC Kids Workshop v1.0
ABC Kids Workshop v4.0
ABC Mailer v1.02
ABC Mailer v1.04
ABC Malbuch v1.00.0175
ABC Pager Plus v5.0.6
ABC Pager Plus v5.0.8
ABC Pager Plus v5.07 DATECODE 1014
ABC Pager v1.6.8
ABC Pager v1.6.9
ABC Password Keeper v1.2
ABC Photo Album v1.4
ABC Pix v.2.1.6
ABC Pix v2.13.1
ABC Puzzles
ABC Puzzles 3.1
ABC Puzzles v3.1
ABC Puzzles v4.0
ABC ShopBuilder v4.0
ABC Snowman v6.01.0601
ABC Snowman v6.01.0601 Final
ABC ToolKit v1.0
ABC Toolkit v1.0 for Windows
ABC Toolkit v1.0 Win
ABC ToolKit v1.1
ABC Toolkit v1.1 for Windows
ABC ToolKit v1.1 Win
ABC ToolKit v10 for Windows
ABC ToolKit v11 for Windows
ABC VideoRoll v2.5 Build 72
ABC View Manager v1.42
ABC Wallpaper Machine 1.10.0303
ABC Wallpaper Machine v1.02.0290
ABC Wallpaper Machine v1.02.0290 keymaker
ABC Wallpaper Machine v1.03.0293
ABC Wallpaper Machine v1.10.0303
ABC Wallpaper Machine v2.00.0434
ABC Wallpaper Machine v2.01.0444
ABC Wallpaper Machine v2.03.0459
ABC Wallpaper Machine v2.04.0470
ABC Wallpaper Machine v2.11.0511
ABC Wallpaper Machine v2.20.0550
ABC Wallpaper Machine v2.20.0550 Final
ABC Wallpaper Machine v2.20.0550 Multilingual
ABC Ware Areal v2.00.0220 regfile
ABC Ware Blobshop v1.23
Abc.image.browser V2.0.8.18
Abc.image.browser V2.0.9.20
ABC2Win v2.1h
ABC'95 1.0
ABC95 Font Manager v2.0
ABC'95 v1.0 for Win95
ABC'95 v1.0 Win95
ABCalculator 1.0
ABCalculator 1.1
Abcalculator 1.1.0
ABCalculator v1.0
ABCalculator v1.1
ABCalculator v1.1.0
ABCDee S-Edition
ABCDee v1.1
ABCDee v2.5
ABCEncrypt 1.2
ABCEncrypt v1.2
AbcLotto v1.0
abcMailer v0.1.1
AbcMonitor 1.7.0
abcMonitor v1.6.5
AbcMonitor v1.7
ABCPager Plus v5.0.5
ABCPager Plus v5.08
ABCPager v1.6.4
abcPager v1.6.9
ABCpdf ASP v4.0.31
ABCpdf NET v4.0.31 Full Version
ABCPdf v2.2
ABCPdf v2.2 for .NET
ABCPdf v2.2 for .NET regfile
ABCPdf v2.2 regfile
ABCPdf v3.1
ABCPdf v3.1 for .NET
ABCPdf v3.1 for .NET regfile
ABCPdf v3.1 regfile
ABCpdf.NET v4.0.31
ABCPix 2.1.8
ABCPix 2.1.9
ABCPix v 2.1.9
ABCPix v v2.1.9
ABCPix v1.13.0
ABCPix v2.1
ABCPix v2.1.1
ABCPix v2.1.6
ABCPix v2.1.6 [2.01.0006]
ABCPix v2.1.7
ABCPix v2.1.8
ABCPix v2.1.9
ABCPix v2.1.99
ABCPix v2.13.0
ABCPix v2.13.1
AbcPuzzles V3.1
AbcPuzzles v6.0
ABCUpload ASP v4.6 regfile
ABC-Ware Areal v1.00.0188
AB-DepotVente v4.2
Abecedarical Systems Almanac v1.0
Abecedarical Systems Timezone v3.0
Abecedarical Systems Zeno Interpreter v1.2
Abee CHM Maker v1.4
Abelssoft AbNote v1.7a
Abetone Datenbank Serienbrief v7.0.2
Abetone Firmendatenbank Serienbrief Pro v7.0.1
Abetone Firmendatenbank Serienbrief Pro v7.0.1 German
Abetone Firmendatenbank Serienbrief Pro v7.0.3
ABF 2004 Auftragsbearbeitung v4.80
ABF Magnifying Tools v1.03
ABF Magnifying Tools v1.03 regfile
ABF Outlook Backup v2.1.0.51
ABF Outlook Backup v2.1.0.51 regfile
ABF Outlook Backup v2.2.0.61
ABF Outlook Backup v2.3.0.69
ABF Outlook Express Backup v1.7.9.195
ABF Outlook Express Backup v1.8.3.219
ABF Outlook Express Backup v1.8.7.227
ABF Value Converter v1.4
ABF Value Converter v1.5
Abfallkosten 2002.1.10
Abfallkosten 2003.3.29
Abfallkosten 2004 v1.37
Abfallkosten 2004.1.37
Abfallkosten 2004.4.38 German
Abfallkosten v2002.1.1
Abfallkosten v2002.1.10
Abfallkosten v2002.12.24

Источник: [https://torrent-igruha.org/3551-portal.html]
1st Directory Email Spider 2002 1.18 crack serial keygen

Consider: 1st Directory Email Spider 2002 1.18 crack serial keygen

Runtime nas recovery v2.40 keygen,serial,crack,generator
OCTANE RENDER CRACK C4D ARCHIVES
ZD SOFT SCREEN RECORDER 11.3.0 SERIAL KEY 2021 FULL CRACK [LATEST]

youtube video

V 1st Email Address Spider 2006 v5 75

Notice: Undefined variable: z_bot in /sites/arenaqq.us/proxy/1st-directory-email-spider-2002-118-crack-serial-keygen.php on line 107

Notice: Undefined variable: z_empty in /sites/arenaqq.us/proxy/1st-directory-email-spider-2002-118-crack-serial-keygen.php on line 107

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *