All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
Please create an account to participate in the Slashdot moderation system
The biggest difference between time and space is that you can't reuse time. -- Merrick Furst