BOOK THIS SPACE FOR AD
ARTICLE ADports represent common entry points and services used across the internet.
The vulnerabilities associated with these ports can stem from outdated software, poor configurations, weak passwords, and unencrypted communications, data lick, Weak passwords, brute force attacks, making them susceptible to various cyber-attacks.
Port 5432 (PostgreSQL) — PostgreSQL Database
Vulnerabilities: SQL injection, weak authentication, outdated versions.Port 5900 (VNC) — Virtual Network Computing
Vulnerabilities: Weak passwords, brute force attacks, plaintext transmission.Port 5984 (CouchDB) — CouchDB Database
Vulnerabilities: Weak authentication, and unauthorized access.Port 6379 (Redis) — Redis Database
Vulnerabilities: No authentication by default, data leakage.Port 6660–6669 (IRC) — Internet Relay Chat
Vulnerabilities: DDoS attacks, unencrypted communication.Port 8000 (HTTP Alt) — Alternative HTTP
Vulnerabilities: Various web vulnerabilities, misconfigurations.Port 8080 (HTTP Alt) — Alternative HTTP
Vulnerabilities: Various web vulnerabilities, and misconfigurations.Top 50 PortsPort 8443 (HTTPS Alt) — Alternative HTTPS
Vulnerabilities: SSL/TLS vulnerabilities, misconfigurations.Port 8888 (HTTP Alt) — Alternative HTTP
Vulnerabilities: Various web vulnerabilities, and misconfigurations.Port 9000 (Hadoop) — Hadoop
Vulnerabilities: Unauthorized access, weak authentication.Port 9092 (Kafka) — Apache Kafka
Vulnerabilities: Weak authentication, and data leakage.Port 9200 (Elasticsearch) — Elasticsearch
Vulnerabilities: Unauthorized access, and data leakage.Port 9300 (Elasticsearch) — Elasticsearch Transport
Vulnerabilities: Unauthorized access, and data leakage.Port 11211 (Memcached) — Memcached
Vulnerabilities: Amplification attacks, and unauthorized access.Port 27017 (MongoDB) — MongoDB
Vulnerabilities: Unauthorized access, and data leakage.Port 50000 (DB2) — IBM DB2
Vulnerabilities: SQL injection, weak authentication.Port 50070 (Hadoop NameNode) — Hadoop NameNode
Vulnerabilities: Unauthorized access, and data leakage.Port 50075 (Hadoop DataNode) — Hadoop DataNode
Vulnerabilities: Unauthorized access, and data leakage.Port 61616 (ActiveMQ) — Apache ActiveMQ
Vulnerabilities: Unauthorized access, and data leakage.Port 27018 (MongoDB) — MongoDB
Vulnerabilities: Unauthorized access, and data leakage.Port 27019 (MongoDB) — MongoDB
Vulnerabilities: Unauthorized access, and data leakage.Port 20/21 (FTP) — File Transfer Protocol
Vulnerabilities: Plaintext transmission, weak authentication, potential for brute force attacks.Port 22 (SSH) — Secure Shell
Vulnerabilities: Brute force attacks, outdated versions, weak passwords.Port 23 (Telnet) — Telnet
Vulnerabilities: Plaintext transmission, easily sniffable, deprecated in favor of SSH.Port 25 (SMTP) — Simple Mail Transfer Protocol
Vulnerabilities: Email spoofing, spam relay, open relay exploits.Port 53 (DNS) — Domain Name System
Vulnerabilities: DNS poisoning, amplification attacks, cache poisoning.Port 67/68 (DHCP) — Dynamic Host Configuration Protocol
Vulnerabilities: DHCP spoofing, denial of service.Port 80 (HTTP) — HyperText Transfer Protocol
Vulnerabilities: Plaintext transmission, and various web application vulnerabilities (e.g., XSS, SQL injection).Port 110 (POP3) — Post Office Protocol v3
Vulnerabilities: Plaintext authentication, man-in-the-middle attacks.Port 119 (NNTP) — Network News Transfer Protocol
Vulnerabilities: Outdated protocol, not commonly used, potential for abuse.Port 123 (NTP) — Network Time Protocol
Vulnerabilities: NTP amplification attacks, outdated versions.Port 137–139 (NetBIOS) — Network Basic Input/Output System
Vulnerabilities: Information leakage, SMB vulnerabilities, DoS attacks.Port 143 (IMAP) — Internet Message Access Protocol
Vulnerabilities: Plaintext transmission, outdated versions, potential for unauthorized access.Port 161/162 (SNMP) — Simple Network Management Protocol
Vulnerabilities: Plaintext community strings, default passwords, version 1 vulnerabilities.Port 389 (LDAP) — Lightweight Directory Access Protocol
Vulnerabilities: Injection attacks, and weak access controls.Port 443 (HTTPS) — HyperText Transfer Protocol Secure
Vulnerabilities: SSL/TLS vulnerabilities (e.g., Heartbleed, POODLE), misconfigurations.Port 445 (SMB) — Server Message Block
Vulnerabilities: WannaCry ransomware, SMB relay attacks, EternalBlue exploit.Port 465 (SMTPS) — Secure SMTP
Vulnerabilities: This was initially assigned to SMTPS but is now deprecated in favor of ports 587 and 25 with STARTTLS.Port 514 (Syslog) — System Logging Protocol
Vulnerabilities: Plaintext transmission, potential information leakage.Port 587 (SMTP) — Mail Submission
Vulnerabilities: Authentication attacks, misconfigurations.Port 631 (IPP) — Internet Printing Protocol
Vulnerabilities: potential remote code execution vulnerabilities in older implementations.Port 636 (LDAPS) — Secure LDAP
Vulnerabilities: SSL/TLS vulnerabilities, misconfigurations.Port 993 (IMAPS) — Secure IMAP
Vulnerabilities: SSL/TLS vulnerabilities, outdated implementations.Port 995 (POP3S) — Secure POP3
Vulnerabilities: SSL/TLS vulnerabilities, outdated implementations.Port 1433/1434 (MSSQL) — Microsoft SQL ServerVulnerabilities: SQL injection, weak authentication, outdated versions.Port 1521 (Oracle) — Oracle Database
Vulnerabilities: SQL injection, default passwords, outdated versions.Port 2049 (NFS) — Network File System
Vulnerabilities: Information leakage, and unauthorized access.Port 3306 (MySQL) — MySQL Database
Vulnerabilities: SQL injection, weak passwords, outdated versions.Port 3389 (RDP) — Remote Desktop Protocol
Vulnerabilities: Brute force attacks, RDP hijacking, BlueKeep vulnerability.Port 3690 (SVN) — Subversion
Vulnerabilities: Authentication bypass, outdated versions.