All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
Please create an account to participate in the Slashdot moderation system
All theoretical chemistry is really physics; and all theoretical chemists know it. -- Richard P. Feynman