All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
Follow Slashdot stories on Twitter
When bad men combine, the good must associate; else they will fall one by one, an unpitied sacrifice in a contemptible struggle. - Edmund Burke