All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
I've got all the money I'll ever need if I die by 4 o'clock. -- Henny Youngman