The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-01T16:27:57.764Z
Reserved: 1999-06-07T00:00:00
Link: CVE-1999-0181

No data.

Status : Deferred
Published: 1994-01-01T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-1999-0181

No data.