All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!
Weekends were made for programming. - Karl Lehenbauer