1999-09-29 04:00:00
mitre
PUBLISHED
The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.