They are like open doors through which you have given the users of the P2P network access to your machine. Sure, there are some limitations to the access other users of the network can have, but, these open ports can become an easy point of entry for attackers trying to gain access to your machine or your network
-------------------------------------------------------------------------------------------------------------
hope this helps!