

By sending a specially-crafted UPnP request to TCP port 5900, an attacker could exploit this vulnerability to bypass security restrictions to scan internal hosts or proxy Internet traffic and gain unauthorized access to the vulnerable application.ĮchoVNC Viewer is vulnerable to a denial of service, caused by an error when allocating heap buffer size. Vino could allow a remote attacker to bypass security restrictions, caused by an error in vino-preferences dialog box when providing information on network accessibility. Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900. It also spreads by exploiting the Microsoft Internet Explorer Vector Markup Language Buffer Overflow Vulnerability and RealVNC Remote Authentication Bypass Vulnerability. It spreads by searching for vulnerable SQL servers and by sending an HTML link to available contacts on instant messenger programs. W32.Gangbot (2007.01.22) - a worm that opens a back door and connects to an IRC server. RealVNC 4.0 and earlier allows remote attackers to cause a denial of service (crash) via a large number of connections to port 5900. Some Apple applications use this port as well: Apple Remote Desktop 2.0 or later (Observe/Control feature), Screen Sharing (Mac OS X 10.5 or later) VNC typically also uses ports 5800+ and 5900+ for additional machines.Ĭitrix NetScaler appliance Lights out Management uses ports 4001, 5900, 623 TCP to run a daemon that offers unified configuration management of routing protocols.īackdoor.Evivinc also uses this port. Please try again with a smaller file.VNC (Virtual Network Computing) - remote control programs. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Release notes and upgrades Click to open the dropdown menu. Explore products Click to go to the page. The available release versions for this topic are listed There is no specific version for this documentation. You were redirected to a related topic instead. The topic you requested does not exist in the release. Please try again or submit your comments. You have been unsubscribed from this content Thank you for your feedback. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from all topics. Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. If the list of IP ranges being scanned is large, you can configure the Shazzam payload for JSON encoding to reduce its size. When you run Discovery, the Shazzam probe finds your active network devices by scanning specified ports on specified IP address ranges. The following table lists the known ports and protocols used by Discovery. The Shazzam probe performs port scanning, regardless of whether you use patterns for horizontal discovery. Port scanning is the first step in the Discovery process.

Runs this port probe if any one of the non-conditional probes returns an open Launches supplementary classifications after a higher-priority identification The default priorities for the Discovery protocols are: Two running protocols, such as SSH and SNMP. This allows for the proper classification of a device that has If the first port probeįails, then the next probe runs on the device, and so forth, until the correctĭata is returned. Names the appropriate classification table, based on the protocol beingĮstablishes the priority in which this port probe runs. Non-standard port usage and pair the port number with the protocol. Indicates which services define the port usage. Indicates whether this port probe is enabled or disabled for discovering IP Indicates whether this port probe is enabled or disabled for discovering

Indicates whether this port probe is enabled or disabled. Generic TCP, and the SNMP port probe uses a value of SNMP. For example, a WMI port probe uses a Scanner value of Some of these are protocol-specific,Īnd others are generic. Simple name for the port probe that reflects its function (for example,ĭefinition of the acronym for the protocol. The Port Probe form provides the following fields: Table 1.
