Port 6003 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
6003 |
tcp,udp |
applications |
Format string vulnerability in the logging function in the Oracle OPMN daemon, as used on Oracle Enterprise Grid Console server 10.2.0.1, allows remote attackers to execute arbitrary code via format string specifiers in the URI in an HTTP request to port 6003, a.k.a. Oracle reference number 6296175.
References: [CVE-2007-5561]
Port is also IANA registered for X Windows System |
SG
|
6003 |
tcp,udp |
x11 |
X Window System |
SANS
|
6003, 7002, 27010, 27015, 27025 |
udp |
applications |
Half Life |
Portforward
|
6003 |
tcp |
X11:3 |
X Window server |
Nmap
|
6000-6063 |
tcp,udp |
x11 |
X Window System. Known Unauthorized Use on port 6003 |
IANA
|
|
5 records found
|