All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
Become a fan of Slashdot on Facebook
"Thank heaven for startups; without them we'd never have any advances." -- Seymour Cray