![]() ![]() In 2001, "Freeciv" was included in the "Linux Journal Reader's Choice Awards" as the best free software game. "Freeciv" was created in 1996 by Justin Corwin, and the first version was released in 1997. ![]() The player with the highest score at the end of the game is the winner. At the end of each epoch, players are scored based on the number of cities they control, the number of technologies they have researched, and other factors. The game progresses through a series of epochs, with each epoch consisting of a number of turns. On each turn, the player may choose one action for their nation: move a unit, build a structure, trade goods, or perform an action specific to the nation's culture (such as research a technology, declare war, or convert to another religion). "Freeciv" is a turn-based game, where each player controls a small, isolated nation. The game has been released under the GNU General Public License and is free software. "Freeciv" is a turn-based strategy game for workstations and personal computers inspired by the game "Civilization". Personal Agent.App Risk 4 Packet Captures Edit / Improve This Page!įreeciv versions up to 2.0, Hewlett-Packard Data Protector, McAfee EndPoint Encryption Database Server, SAP ![]() (IANA official)įreeciv versions up to 2.0, Hewlett Packard Data Protector, SAP (unofficial) By sending a specially crafted request to the tcp/5555 service, an attacker could exploit this vulnerability to copy local files of the device to other local directories of the device. Third-party attackers who can reach the system can run commands made available by the backdoor hijacking the infected host.įortinet FortiNAC could allow a remote attacker to gain unauthorized access to the system, caused by a command injection vulnerability. UPNP Service listening on port 5555 in Genexis Platinum 4410 Router V2.1 (P4410-V2–1.34H) has an action 'X_GetAccess' which leaks the credentials of 'admin', provided that the attacker is network adjacent.ī / Unauthenticated Remote Command Execution - the malware listens on TCP port 5555. By using an adb connect to 5555 port, an attacker could exploit this vulnerability to execute arbitrary code on the system with root privileges. Jector Smart TV FM-K75 could allow a remote attacker to execute arbitrary code on the system. By using port 5555/TCP, an attacker could exploit this vulnerability to conduct arbitrary operations on the device without user's intent. KDDI CORPORATION Smart TV Box could allow a remote attacker to bypass security restrictions, caused by the failure to restrict access by the Android Debug Bridge. By sending a specially-crafted request to TCP port 5555, an attacker could exploit this vulnerability to execute arbitrary commands on the system. HP Data Protector could allow a remote attacker to execute arbitrary commands on the system. The Backup Client Service (OmniInet.exe) in HP Storage Data Protector 6.2X allows remote attackers to execute arbitrary commands or cause a denial of service via a crafted EXEC_BAR packet to TCP port 5555, aka ZDI-CAN-1885. ![]() HP OpenView OmniBack 2.55 allows remote attackers to cause a denial of service via a large number of connections to port 5555. Some other trojans also use this port Backdoor.Sysbug, Noxcape,, Daodan, Backdoor.OptixPro, ServeMe. ShoreTel IP Telephony system uses the following portsĥ440 TCP - HTTP CSIS, 5440 UDP - Location Service Protocolĥ443, 5444, 5445 UDP - Bandwidth Reservation Protocolĥ555 TCP - Shoreline diagnostic port (ipbxctl –diag)ī (2007.09.25) - a Trojan horse that opens a back door on TCP port 5555 on the compromised computer. RainMachine automatic irrigation control uses this port. , InfoSeek Personal Agent, HP OpenView Storage Data Protector (formerly HP OmniBack), McAfee EndPoint Encryption Database Server, SAP Port also used by Freeciv gaming protocol. SoftEther VPN (Ethernet over HTTPS) uses TCP Ports 443, 9 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |