All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
Slashdot is powered by your submissions, so send in your scoop
Wishing without work is like fishing without bait. -- Frank Tyger