Threat Level: green Handler on Duty: Pedro Bueno

SANS ISC Port Details:


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Graph

[show ascii data]
Graph Criteria
  • Start Date:
  • End Date:
  • Port:
  • Left Y Axis:
  • Right Y Axis:

Port Information

Protocol Service Name
tcp telnet
udp telnet
tcp ADMworm [trojan] ADM worm
tcp FireHacKer [trojan] Fire HacKer
tcp MyVeryOwntrojan [trojan] My Very Own trojan
tcp RTB666 [trojan] RTB 666
tcp TelnetPro [trojan] Telnet Pro
tcp TinyTelnetServer [trojan] Tiny Telnet Server - TTS
tcp TruvaAtl [trojan] Truva Atl
[get complete service list]

User Comment

Submitted By Date
Comment
Add a comment

CVE Links

CVE # Description
CVE-1999-73 "Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH
CVE-1999-218 "Livingston portmaster machines could be rebooted via a series of commands."
CVE-1999-501 "A Unix account has a guessable password."
CVE-2000-733 "Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings
CVE-2001-170 "glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF
CVE-2001-554 "Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There)
CVE-2004-311 "American Power Conversion (APC) Web/SNMP Management SmartSlot Card 3.0 through 3.0.3 and 3.21 are shipped with a default password of TENmanUFactOryPOWER
CVE-2005-2040 "Multiple buffer overflows in the getterminaltype function in telnetd for Heimdal before 0.6.5 may allow remote attackers to execute arbitrary code