Services registered for this port (from Neohapsis)

ProtocolKeyDescription
tcpsmtpSimple Mail Transfer
udpsmtpSimple Mail Transfer
tcpAjan[trojan] Ajan
tcpAntigen[trojan] Antigen
tcpBarok[trojan] Barok
tcpBSE[trojan] BSE
tcpEmailPasswordSender[trojan] Email Password Sender - EPS
tcpEPSII[trojan] EPS II
tcpGip[trojan] Gip
tcpGris[trojan] Gris
tcpHappy99[trojan] Happy99
tcpHpteammail[trojan] Hpteam mail
tcpHybris[trojan] Hybris
tcpIloveyou[trojan] I love you
tcpKuang2[trojan] Kuang2
tcpMagicHorse[trojan] Magic Horse
tcpMBTMailBombingTrojan[trojan] MBT (Mail Bombing Trojan)
tcpMBT[trojan] MBT (Mail Bombing Trojan)
tcpMoscowEmailtrojan[trojan] Moscow Email trojan
tcpNaebi[trojan] Naebi
tcpNewAptworm[trojan] NewApt worm
tcpProMailtrojan[trojan] ProMail trojan
tcpShtirlitz[trojan] Shtirlitz
tcpStealth[trojan] Stealth
tcpStukach[trojan] Stukach
tcpTapiras[trojan] Tapiras
tcpTerminator[trojan] Terminator
tcpWinPC[trojan] WinPC
tcpWinSpy[trojan] WinSpy

Vulnerabilities for this port (from CVE)

CVE ID Protocol Source Port Targetport
CVE-2000-0042tcpany25
Description: Buffer overflow in CSM mail server allows remote attackers to cause a denial of service or execute commands via a long HELO command.
CVE-1999-0404tcpany25
Description: Buffer overflow in the Mail-Max SMTP server for Windows systems allows remote command execution.
CVE-1999-0208tcpany25
Description: rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.
CVE-1999-0204tcp11325
Description: Sendmail 8.6.9 allows remote attackers to execute root commands, using ident.
CVE-1999-0204tcpany25
Description: Sendmail 8.6.9 allows remote attackers to execute root commands, using ident.
CVE-1999-0095tcpany25
Description: The debug command in Sendmail is enabled, allowing attackers to execute commands as root.
CVE-2000-0343tcpany25
Description: The debug command in Sendmail is enabled, allowing attackers to execute commands as root.
CVE-1999-1200tcpany25
Description: The debug command in Sendmail is enabled, allowing attackers to execute commands as root.

Search Ports:

Submit a port and see detailed relevant information :