Services registered for this port (from Neohapsis)

tcpftpFile Transfer [Control]
udpftpFile Transfer [Control]
tcpBackConstruction[trojan] Back Construction
tcpBladeRunner[trojan] BladeRunner
tcpCattivikFTPServer[trojan] Cattivik FTP Server
tcpCCInvader[trojan] CC Invader
tcpDarkFTP[trojan] Dark FTP
tcpDolyTrojan[trojan] Doly Trojan
tcpFore[trojan] Fore
tcpFreddyK[trojan] FreddyK
tcpInvisibleFTP[trojan] Invisible FTP
tcpJuggernaut42[trojan] Juggernaut 42
tcpLarva[trojan] Larva
tcpMotIvFTP[trojan] MotIv FTP
tcpNetAdministrator[trojan] Net Administrator
tcpRamen[trojan] Ramen
tcpRTB666[trojan] RTB 666
tcpSennaSpyFTPserver[trojan] Senna Spy FTP server
tcpTraitor21[trojan] Traitor 21
tcp[trojan]TheFlu[trojan] The Flu
tcpWebEx[trojan] WebEx
tcpWinCrash[trojan] WinCrash
tcpAudioGalaxyAudioGalaxy file sharing app

Vulnerabilities for this port (from CVE)

CVE ID Protocol Source Port Targetport
Description: Directory traversal vulnerability in FTP Serv-U before 2.5i allows remote attackers to escape the FTP root and read arbitrary files by appending a string such as "/..%20." to a CD command, a variant of a .. (dot dot) attack.
Description: One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote attackers to gain root privileges.
Description: The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command.
Description: Buffer overflow in AIX ftpd in the libc library.
Description: Buffer overflow in ToxSoft NextFTP client through CWD command.
Description: Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
Description: The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands.
Description: CWD ~root command in ftpd allows root access.
Description: CWD ~root command in ftpd allows root access.

Search Ports:

Submit a port and see detailed relevant information :