All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!
When you don't know what you are doing, do it neatly.