The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.
1994-01-01T05:00:00.000
2025-04-03T01:03:51.193
Deferred
[email protected]
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4