Threat Level: green Handler on Duty: Russell Eubanks

SANS ISC: TCP/UDP Port 21 Activity - SANS Internet Storm Center TCP/UDP Port 21 Activity


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Loading...
Port Information
Protocol Service Name
udp ftp File Transfer [Control]
tcp ftp File Transfer [Control]
tcp NetAdministrator [trojan] Net Administrator
tcp Ramen [trojan] Ramen
tcp RTB666 [trojan] RTB 666
tcp SennaSpyFTPserver [trojan] Senna Spy FTP server
tcp Traitor21 [trojan] Traitor 21
tcp [trojan]TheFlu [trojan] The Flu
tcp WebEx [trojan] WebEx
tcp WinCrash [trojan] WinCrash
tcp AudioGalaxy AudioGalaxy file sharing app
tcp MotIvFTP [trojan] MotIv FTP
tcp Larva [trojan] Larva
tcp BladeRunner [trojan] BladeRunner
tcp CattivikFTPServer [trojan] Cattivik FTP Server
tcp CCInvader [trojan] CC Invader
tcp DarkFTP [trojan] Dark FTP
tcp DolyTrojan [trojan] Doly Trojan
tcp Fore [trojan] Fore
tcp FreddyK [trojan] FreddyK
tcp InvisibleFTP [trojan] Invisible FTP
tcp Juggernaut42 [trojan] Juggernaut 42
tcp BackConstruction [trojan] Back Construction
[get complete service list]
User Comments
Submitted By Date
Comment
Johannes Ullrich 2007-02-12 12:31:02
A new very trivial exploit for telnet on Solaris 10/11 was made public Feb. 11th 2007.
Add a comment
CVE Links
CVE # Description
CVE-1999-0080
CVE-1999-0082
CVE-1999-0202
CVE-1999-0219
CVE-1999-0349
CVE-1999-0368
CVE-1999-0789
CVE-1999-0800
CVE-1999-0838
CVE-1999-0880
CVE-1999-0911
CVE-1999-0997
CVE-1999-1510
CVE-1999-1519
CVE-1999-1544
CVE-2000-0040
CVE-2000-0133
CVE-2000-0573
CVE-2000-0699
CVE-2001-0053
CVE-2001-0054
CVE-2001-0065
CVE-2001-0325
CVE-2001-0421
CVE-2001-0550
CVE-2001-0680
CVE-2001-0826
CVE-2001-1021
CVE-2002-0073
CVE-2002-0606
CVE-2002-0826
CVE-2003-0392
CVE-2003-0466
CVE-2003-0853
CVE-2004-0277
CVE-2014-7169 GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.