The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Google Android Jelly Bean

computer vulnerability alert CVE-2014-9909 CVE-2014-9910 CVE-2015-8966

Android OS: multiple vulnerabilities of 2016-12-05

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Android OS.
Impacted products: Android OS.
Severity: 4/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, denial of service on server, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 50.
Creation date: 06/12/2016.
Revision date: 21/12/2016.
Identifiers: 958, CERTFR-2016-AVI-396, CVE-2014-9909, CVE-2014-9910, CVE-2015-8966, CVE-2015-8967, CVE-2016-5341, CVE-2016-6492, CVE-2016-6755, CVE-2016-6756, CVE-2016-6757, CVE-2016-6758, CVE-2016-6759, CVE-2016-6760, CVE-2016-6761, CVE-2016-6775, CVE-2016-6776, CVE-2016-6777, CVE-2016-6778, CVE-2016-6779, CVE-2016-6780, CVE-2016-6781, CVE-2016-6782, CVE-2016-6783, CVE-2016-6784, CVE-2016-6785, CVE-2016-6788, CVE-2016-6789, CVE-2016-6790, CVE-2016-6791, CVE-2016-6915, CVE-2016-6916, CVE-2016-6917, CVE-2016-8391, CVE-2016-8392, CVE-2016-8393, CVE-2016-8394, CVE-2016-8395, CVE-2016-8396, CVE-2016-8397, CVE-2016-8400, CVE-2016-8401, CVE-2016-8402, CVE-2016-8403, CVE-2016-8404, CVE-2016-8406, CVE-2016-8407, CVE-2016-8408, CVE-2016-8409, CVE-2016-8410, CVE-2016-8411, CVE-2016-9120, VIGILANCE-VUL-21276.

Description of the vulnerability

An attacker can use several vulnerabilities of Android OS.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-8399

Linux kernel: out-of-bounds memory reading via ICMP Header

Synthesis of the vulnerability

An attacker can force a read at an invalid address via ICMP Header on the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, Android OS, Linux, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: data reading, denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 12/12/2016.
Identifiers: CERTFR-2017-AVI-034, CERTFR-2017-AVI-039, CERTFR-2017-AVI-042, CERTFR-2017-AVI-044, CERTFR-2017-AVI-045, CERTFR-2017-AVI-050, CERTFR-2017-AVI-053, CERTFR-2017-AVI-054, CERTFR-2017-AVI-131, CERTFR-2017-AVI-375, CVE-2016-8399, DLA-772-1, FEDORA-2016-02db2f32fd, FEDORA-2016-e5b72816d0, K23030550, RHSA-2017:0817-01, RHSA-2017:0869-01, RHSA-2017:2930-01, RHSA-2017:2931-01, SUSE-SU-2017:0333-1, SUSE-SU-2017:0407-1, SUSE-SU-2017:0437-1, SUSE-SU-2017:0464-1, SUSE-SU-2017:0471-1, SUSE-SU-2017:0494-1, SUSE-SU-2017:1102-1, USN-3189-1, USN-3189-2, USN-3190-1, USN-3190-2, VIGILANCE-VUL-21354.

Description of the vulnerability

An attacker can force a read at an invalid address via ICMP Header on the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2016-6762 CVE-2016-6763 CVE-2016-6764

Android OS: multiple vulnerabilities of 2016-12-01

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Android OS.
Impacted products: Android OS.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, denial of service on server, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 13.
Creation date: 06/12/2016.
Identifiers: CERTFR-2016-AVI-396, CVE-2016-6762, CVE-2016-6763, CVE-2016-6764, CVE-2016-6765, CVE-2016-6766, CVE-2016-6767, CVE-2016-6768, CVE-2016-6769, CVE-2016-6770, CVE-2016-6771, CVE-2016-6772, CVE-2016-6773, CVE-2016-6774, VIGILANCE-VUL-21275.

Description of the vulnerability

An attacker can use several vulnerabilities of Android OS.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-8655

Linux kernel: use after free via packet_set_ring

Synthesis of the vulnerability

A local attacker with the CAP_NET_RAW capability can force the usage of a freed memory area via packet_set_ring() on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Brocade vTM, Debian, Fedora, Android OS, Junos Space, Linux, openSUSE, openSUSE Leap, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu.
Severity: 1/4.
Consequences: administrator access/rights, denial of service on server.
Provenance: privileged shell.
Creation date: 06/12/2016.
Identifiers: BSA-2016-204, BSA-2016-207, BSA-2016-216, BSA-2016-234, CERTFR-2016-AVI-395, CERTFR-2016-AVI-401, CERTFR-2016-AVI-404, CERTFR-2017-AVI-042, CVE-2016-8655, DLA-772-1, FEDORA-2016-107f03cc00, FEDORA-2016-5aff4a6bbc, FEDORA-2016-5cb5b4082d, JSA10838, openSUSE-SU-2016:3050-1, openSUSE-SU-2016:3058-1, openSUSE-SU-2016:3061-1, openSUSE-SU-2016:3077-1, RHSA-2017:0386-01, RHSA-2017:0387-01, SSA:2016-347-01, SUSE-SU-2016:3039-1, SUSE-SU-2016:3049-1, SUSE-SU-2016:3063-1, SUSE-SU-2017:0407-1, USN-3149-1, USN-3149-2, USN-3150-1, USN-3150-2, USN-3151-1, USN-3151-2, USN-3151-3, USN-3151-4, USN-3152-1, USN-3152-2, VIGILANCE-VUL-21271.

Description of the vulnerability

A local attacker with the CAP_NET_RAW capability can force the usage of a freed memory area via packet_set_ring() on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-9806

Linux kernel: use after free via netlink_dump

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via netlink_dump() on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Android OS, QRadar SIEM, Linux, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, denial of service on server.
Provenance: user shell.
Creation date: 05/12/2016.
Identifiers: 2011746, CERTFR-2017-AVI-042, CERTFR-2017-AVI-050, CERTFR-2017-AVI-053, CERTFR-2017-AVI-060, CERTFR-2017-AVI-287, CVE-2016-9806, openSUSE-SU-2017:0456-1, openSUSE-SU-2017:0458-1, RHSA-2017:1842-01, RHSA-2017:2077-01, RHSA-2017:2669-01, SUSE-SU-2017:0407-1, SUSE-SU-2017:0464-1, SUSE-SU-2017:0471-1, SUSE-SU-2017:0575-1, USN-3168-1, USN-3168-2, VIGILANCE-VUL-21261.

Description of the vulnerability

An attacker can force the usage of a freed memory area via netlink_dump() on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2016-9794

Linux kernel: use after free via kill_fasync

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via kill_fasync() on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Android OS, Linux, openSUSE, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, denial of service on server.
Provenance: user shell.
Creation date: 05/12/2016.
Identifiers: CERTFR-2016-AVI-420, CERTFR-2017-AVI-042, CERTFR-2017-AVI-131, CVE-2016-9794, DLA-772-1, openSUSE-SU-2016:3050-1, openSUSE-SU-2016:3058-1, openSUSE-SU-2016:3118-1, SUSE-SU-2016:3146-1, SUSE-SU-2016:3188-1, SUSE-SU-2016:3203-1, SUSE-SU-2016:3217-1, SUSE-SU-2016:3248-1, SUSE-SU-2016:3252-1, SUSE-SU-2017:0407-1, SUSE-SU-2017:1102-1, USN-3167-1, USN-3167-2, USN-3168-1, USN-3168-2, USN-3169-1, USN-3169-2, USN-3169-3, USN-3169-4, VIGILANCE-VUL-21260.

Description of the vulnerability

An attacker can force the usage of a freed memory area via kill_fasync() on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2016-8650

Linux kernel: memory corruption via mpi_powm

Synthesis of the vulnerability

An attacker can generate a memory corruption via mpi_powm() on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Fedora, Android OS, Linux, RHEL, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server.
Provenance: user shell.
Creation date: 25/11/2016.
Identifiers: CERTFR-2017-AVI-307, CVE-2016-8650, FEDORA-2016-6afdd2b61d, FEDORA-2016-a820774fc2, FEDORA-2016-b18410c59c, RHSA-2017:0931-01, RHSA-2017:0933-01, RHSA-2018:1854-01, USN-3422-1, USN-3422-2, VIGILANCE-VUL-21208.

Description of the vulnerability

An attacker can generate a memory corruption via mpi_powm() on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2015-8961 CVE-2015-8962 CVE-2015-8963

Android OS: multiple vulnerabilities of 2016-11-05

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Android OS.
Impacted products: Android OS.
Severity: 4/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, data deletion, denial of service on server.
Provenance: document.
Number of vulnerabilities in this bulletin: 46.
Creation date: 08/11/2016.
Identifiers: CERTFR-2016-AVI-370, CVE-2015-8961, CVE-2015-8962, CVE-2015-8963, CVE-2015-8964, CVE-2016-3904, CVE-2016-3906, CVE-2016-3907, CVE-2016-6698, CVE-2016-6725, CVE-2016-6726, CVE-2016-6727, CVE-2016-6728, CVE-2016-6729, CVE-2016-6730, CVE-2016-6731, CVE-2016-6732, CVE-2016-6733, CVE-2016-6734, CVE-2016-6735, CVE-2016-6736, CVE-2016-6737, CVE-2016-6738, CVE-2016-6739, CVE-2016-6740, CVE-2016-6741, CVE-2016-6742, CVE-2016-6743, CVE-2016-6744, CVE-2016-6745, CVE-2016-6746, CVE-2016-6747, CVE-2016-6748, CVE-2016-6749, CVE-2016-6750, CVE-2016-6751, CVE-2016-6752, CVE-2016-6753, CVE-2016-6754, CVE-2016-7910, CVE-2016-7911, CVE-2016-7912, CVE-2016-7913, CVE-2016-7914, CVE-2016-7915, CVE-2016-7916, CVE-2016-7917, VIGILANCE-VUL-21065.

Description of the vulnerability

Several vulnerabilities were announced in Android OS.

An attacker can use a vulnerability via Qualcomm Crypto Driver, in order to run code. [severity:4/4; CVE-2016-6725]

An attacker can bypass security features via Kernel File System, in order to escalate his privileges. [severity:4/4; CVE-2015-8961]

An attacker can bypass security features via Kernel File System, in order to escalate his privileges (VIGILANCE-VUL-21334). [severity:4/4; CVE-2016-7910]

An attacker can bypass security features via Kernel File System, in order to escalate his privileges (VIGILANCE-VUL-21335). [severity:4/4; CVE-2016-7911]

An attacker can bypass security features via Kernel SCSI Driver, in order to escalate his privileges (VIGILANCE-VUL-21330). [severity:4/4; CVE-2015-8962]

An attacker can bypass security features via Kernel Media Driver, in order to escalate his privileges (VIGILANCE-VUL-21332). [severity:4/4; CVE-2016-7913]

An attacker can bypass security features via Kernel USB Driver, in order to escalate his privileges. [severity:4/4; CVE-2016-7912]

An attacker can bypass security features via Kernel ION Subsystem, in order to escalate his privileges. [severity:4/4; CVE-2016-6728]

An attacker can bypass security features via Qualcomm Bootloader, in order to escalate his privileges. [severity:4/4; CVE-2016-6729]

An attacker can bypass security features via NVIDIA GPU Driver, in order to escalate his privileges. [severity:4/4; CVE-2016-6730]

An attacker can bypass security features via NVIDIA GPU Driver, in order to escalate his privileges. [severity:4/4; CVE-2016-6731]

An attacker can bypass security features via NVIDIA GPU Driver, in order to escalate his privileges. [severity:4/4; CVE-2016-6732]

An attacker can bypass security features via NVIDIA GPU Driver, in order to escalate his privileges. [severity:4/4; CVE-2016-6733]

An attacker can bypass security features via NVIDIA GPU Driver, in order to escalate his privileges. [severity:4/4; CVE-2016-6734]

An attacker can bypass security features via NVIDIA GPU Driver, in order to escalate his privileges. [severity:4/4; CVE-2016-6735]

An attacker can bypass security features via NVIDIA GPU Driver, in order to escalate his privileges. [severity:4/4; CVE-2016-6736]

An attacker can bypass security features via Kernel ION Subsystem, in order to escalate his privileges. [severity:4/4; CVE-2016-6737]

An unknown vulnerability was announced via Qualcomm. [severity:4/4; CVE-2016-6726]

An unknown vulnerability was announced via Qualcomm. [severity:4/4; CVE-2016-6727]

An attacker can use a vulnerability via Webview, in order to run code. [severity:3/4; CVE-2016-6754]

An attacker can bypass security features via Kernel Performance Subsystem, in order to escalate his privileges (VIGILANCE-VUL-21331). [severity:3/4; CVE-2015-8963]

An attacker can bypass security features via Qualcomm Crypto Engine Driver, in order to escalate his privileges. [severity:3/4; CVE-2016-6738]

An attacker can bypass security features via Qualcomm Camera Driver, in order to escalate his privileges. [severity:3/4; CVE-2016-6739]

An attacker can bypass security features via Qualcomm Camera Driver, in order to escalate his privileges. [severity:3/4; CVE-2016-6740]

An attacker can bypass security features via Qualcomm Camera Driver, in order to escalate his privileges. [severity:3/4; CVE-2016-6741]

An attacker can bypass security features via Qualcomm Bus Driver, in order to escalate his privileges. [severity:3/4; CVE-2016-3904]

An attacker can bypass security features via Synaptics Touchscreen Driver, in order to escalate his privileges. [severity:3/4; CVE-2016-6742]

An attacker can bypass security features via Synaptics Touchscreen Driver, in order to escalate his privileges. [severity:3/4; CVE-2016-6744]

An attacker can bypass security features via Synaptics Touchscreen Driver, in order to escalate his privileges. [severity:3/4; CVE-2016-6745]

An attacker can bypass security features via Synaptics Touchscreen Driver, in order to escalate his privileges. [severity:3/4; CVE-2016-6743]

An attacker can bypass security features via Kernel, in order to obtain sensitive information (VIGILANCE-VUL-21324). [severity:3/4; CVE-2015-8964]

An attacker can bypass security features via Kernel, in order to obtain sensitive information (VIGILANCE-VUL-21336). [severity:3/4; CVE-2016-7914]

An attacker can bypass security features via Kernel, in order to obtain sensitive information (VIGILANCE-VUL-21492). [severity:3/4; CVE-2016-7915]

An attacker can bypass security features via Kernel, in order to obtain sensitive information (VIGILANCE-VUL-21337). [severity:3/4; CVE-2016-7916]

An attacker can bypass security features via NVIDIA GPU driver, in order to obtain sensitive information. [severity:3/4; CVE-2016-6746]

An attacker can trigger a fatal error via Mediaserver, in order to trigger a denial of service. [severity:3/4; CVE-2016-6747]

An attacker can bypass security features via Kernel, in order to obtain sensitive information. [severity:2/4; CVE-2016-6753]

An attacker can bypass security features via Kernel, in order to obtain sensitive information (VIGILANCE-VUL-21827). [severity:2/4; CVE-2016-7917]

An attacker can bypass security features via Qualcomm Components, in order to obtain sensitive information. [severity:2/4; CVE-2016-6748]

An attacker can bypass security features via Qualcomm Components, in order to obtain sensitive information. [severity:2/4; CVE-2016-6749]

An attacker can bypass security features via Qualcomm Components, in order to obtain sensitive information. [severity:2/4; CVE-2016-6750]

An attacker can bypass security features via Qualcomm Components, in order to obtain sensitive information. [severity:2/4; CVE-2016-3906]

An attacker can bypass security features via Qualcomm Components, in order to obtain sensitive information. [severity:2/4; CVE-2016-3907]

An attacker can bypass security features via Qualcomm Components, in order to obtain sensitive information. [severity:2/4; CVE-2016-6698]

An attacker can bypass security features via Qualcomm Components, in order to obtain sensitive information. [severity:2/4; CVE-2016-6751]

An attacker can bypass security features via Qualcomm Components, in order to obtain sensitive information. [severity:2/4; CVE-2016-6752]
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2014-9908 CVE-2015-0410 CVE-2016-6699

Android OS: multiple vulnerabilities of 2016-11-01

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Android OS.
Impacted products: Android OS.
Severity: 4/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, data deletion, denial of service on server.
Provenance: document.
Number of vulnerabilities in this bulletin: 28.
Creation date: 08/11/2016.
Identifiers: 928, 929, 932, CERTFR-2016-AVI-370, CVE-2014-9908, CVE-2015-0410, CVE-2016-6699, CVE-2016-6700, CVE-2016-6701, CVE-2016-6702, CVE-2016-6703, CVE-2016-6704, CVE-2016-6705, CVE-2016-6706, CVE-2016-6707, CVE-2016-6708, CVE-2016-6709, CVE-2016-6710, CVE-2016-6711, CVE-2016-6712, CVE-2016-6713, CVE-2016-6714, CVE-2016-6715, CVE-2016-6716, CVE-2016-6717, CVE-2016-6718, CVE-2016-6719, CVE-2016-6720, CVE-2016-6721, CVE-2016-6722, CVE-2016-6723, CVE-2016-6724, VIGILANCE-VUL-21064.

Description of the vulnerability

Several vulnerabilities were announced in Android OS.

An attacker can use a vulnerability via Mediaserver, in order to run code. [severity:4/4; CVE-2016-6699]

An attacker can bypass security features via libzipfile, in order to escalate his privileges. [severity:4/4; CVE-2016-6700]

An attacker can use a vulnerability via Skia, in order to run code. [severity:3/4; CVE-2016-6701]

An attacker can use a vulnerability via libjpeg, in order to run code. [severity:3/4; CVE-2016-6702]

An attacker can use a vulnerability via runtime, in order to run code. [severity:3/4; CVE-2016-6703]

An attacker can bypass security features via Mediaserver, in order to escalate his privileges. [severity:3/4; CVE-2016-6704]

An attacker can bypass security features via Mediaserver, in order to escalate his privileges. [severity:3/4; CVE-2016-6705]

An attacker can bypass security features via Mediaserver, in order to escalate his privileges. [severity:3/4; CVE-2016-6706]

An attacker can bypass security features via System Server, in order to escalate his privileges. [severity:3/4; CVE-2016-6707]

An attacker can bypass security features via System UI, in order to escalate his privileges. [severity:3/4; CVE-2016-6708]

An attacker can bypass security features via Conscrypt and BoringSSL, in order to obtain sensitive information. [severity:3/4; CVE-2016-6709]

An attacker can bypass security features via Download Manager, in order to obtain sensitive information. [severity:3/4; CVE-2016-6710]

An attacker can trigger a fatal error via Bluetooth, in order to trigger a denial of service. [severity:3/4; CVE-2014-9908]

An attacker can use a vulnerability of Security, in order to trigger a denial of service. [severity:2/4; CVE-2015-0410]

An attacker can trigger a fatal error via Mediaserver, in order to trigger a denial of service. [severity:3/4; CVE-2016-6711]

An attacker can trigger a fatal error via Mediaserver, in order to trigger a denial of service. [severity:3/4; CVE-2016-6712]

An attacker can trigger a fatal error via Mediaserver, in order to trigger a denial of service. [severity:3/4; CVE-2016-6713]

An attacker can trigger a fatal error via Mediaserver, in order to trigger a denial of service. [severity:3/4; CVE-2016-6714]

An attacker can bypass security features via Framework APIs, in order to escalate his privileges. [severity:2/4; CVE-2016-6715]

An attacker can bypass security features via AOSP Launcher, in order to escalate his privileges. [severity:2/4; CVE-2016-6716]

An attacker can bypass security features via Mediaserver, in order to escalate his privileges. [severity:2/4; CVE-2016-6717]

An attacker can bypass security features via Account Manager Service, in order to escalate his privileges. [severity:2/4; CVE-2016-6718]

An attacker can bypass security features via Bluetooth, in order to escalate his privileges. [severity:2/4; CVE-2016-6719]

An attacker can bypass security features via Mediaserver, in order to obtain sensitive information. [severity:2/4; CVE-2016-6720]

An attacker can bypass security features via Mediaserver, in order to obtain sensitive information. [severity:2/4; CVE-2016-6721]

An attacker can bypass security features via Mediaserver, in order to obtain sensitive information. [severity:2/4; CVE-2016-6722]

An attacker can trigger a fatal error via Proxy Auto Config, in order to trigger a denial of service. [severity:2/4; CVE-2016-6723]

An attacker can trigger a fatal error via Input Manager Service, in order to trigger a denial of service. [severity:2/4; CVE-2016-6724]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2016-5131

libxml2: use after free via xmlXPtrRangeToFunction

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via xmlXPtrRangeToFunction of libxml2, in order to trigger a denial of service, and possibly to run code.
Impacted products: iOS by Apple, iPhone, Mac OS X, Debian, Fedora, Android OS, Chrome, libxml, openSUSE Leap, Opera, Slackware, Nessus, Ubuntu.
Severity: 2/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 02/11/2016.
Identifiers: CERTFR-2018-AVI-288, CVE-2016-5131, DLA-691-1, DSA-3744-1, FEDORA-2017-a3a47973eb, FEDORA-2017-be8574d593, FEDORA-2018-a6b59d8f78, FEDORA-2018-db610fff5b, HT207143, HT207170, openSUSE-SU-2018:0418-1, SSA:2017-266-01, TNS-2018-08, USN-3235-1, VIGILANCE-VUL-20993.

Description of the vulnerability

An attacker can force the usage of a freed memory area via xmlXPtrRangeToFunction of libxml2, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Google Android Jelly Bean: