Port 333 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
333 |
tcp,udp |
texar |
Backdoor.Win32.Optix.03.b / Unauthenticated Remote Command Execution - the malware listens on TCP port 333. Third-party attackers who can reach the system can execute commands made available by the malware.
References: [MVID-2021-0387]
BuilderRevengeRAT - (Revenge-RAT v0.3) / XML External Entity Injection - the malware listens on TCP port 333. There is a Config.xml file used by the RAT builder to specify port, notification, webcam etc. The XML parser used by the RAT is vulnerable to XML Injection, this can allow local file exfiltration to a remote attacker server and or Geo location disclosure of the RAT builder.
References: [MVID-2022-0521]
Texar Security Port (IANA official) |
SG
|
333 |
tcp,udp |
texar |
Texar Security Port |
IANA
|
|
2 records found
|