Port 9080 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
9080 |
tcp,udp |
applications |
Dogtag Certificate System authority uses port 9080 (ca) and port 9443 (secure ca) by default.
Dograg Certificate PKI Subsystems may also use:
DRM - ports 10080 (drm) and 10443 (drm secure)
OCSP - ports 11080 (ocsp) and 11443 (ocsp secure)
RA - ports 12888 (ra) and 12889 (ra secure)
TKS - ports 13080 (tks) and 13443 (tks secure)
TPS - ports (tps) 7888 and 7889 (tps secure)
ToutVirtual VirtualIQ Pro 3.2 build 7882 does not restrict access to the /status URI on port 9080, which allows remote attackers to obtain sensitive Tomcat information via a direct request.
References: [CVE-2009-4844]
LG SuperSign CMS allows TVs to be rebooted remotely without authentication via a direct HTTP request to /qsr_server/device/reboot on port 9080.
References: [CVE-2018-16706]
WebSphere Application Server HTTP Transport (port 1) default
Groove Collaboration Software GLRPC (IANA official) |
SG
|
9080 |
tcp,udp |
|
glrpc, Groove Collaboration software GLRPC (official) |
Wikipedia
|
9080 |
tcp |
|
WebSphere Application Server HTTP Transport (port 1) default (unofficial) |
Wikipedia
|
9080 |
tcp,udp |
glrpc |
Groove GLRPC, registered 2002-09 |
IANA
|
|
4 records found
Related ports: 9443
|