CVE Threat Dashboard | Latest CVEs | Top Critical CVE | CVE Updated | CVE Archive List
Common Weakness Enumeration | Common Attack Pattern Enumeration and Classification | Vendors Overview
The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.