Total vulnerabilities in the database
The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.
CVSS v2:
No CWE or OWASP classifications available.