Published: 1994-01-01
The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.
Overall Severity: N/A
Affected Versions: