All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
Catch up on stories from the past week (and beyond) at the Slashdot story archive
The sooner all the animals are extinct, the sooner we'll find their money. - Ed Bluestone