Validating registry security key quicktime
IMAP (Internet Mail Access Protocol) mail server uses this port. Numerous IMAP servers have buffer overflows that allow compromise during the login.
It is used by Microsoft Windows file and print services, such as Windows Sharing in Mac OS X.
Net Bios services: NETBIOS Name Service (TCP/UDP: 137) NETBIOS Datagram Service (TCP/UDP: 138) NETBIOS Session Service (TCP/UDP: 139) By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured properly. A [Symantec-2005-032515-4042-99] (20) - worm that spreads using the MS DCOM RPC vulnerability (MS Security Bulletin [MS03-026]) on port 139.
Any machine with Net BIOS enabled and not configured properly should be considered at risk. The worm attempts to download and execute a remote file via FTP. Windows Internet Naming Service (WINS) also uses this port (UDP).
This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats.
We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please .
Any machine with Net BIOS enabled and not configured properly should be considered at risk.