×
TIA Portal: V18.0.1.0 ; Station name: S7-1200 station_1 ; Module name: BonusMaster ; Module type: CPU 1215C DC/DC/DC ; Status:.
Google Dork Description: inurl:/Portal/Portal.mwsl. Google Search: inurl:/Portal/Portal.mwsl. This is a dork for the Siemens S7 series of PLC ...
Slot, Status, Name, Order number, I address, Q address, Comment. X1, Good.gif 4, Interfaccia PROFINET, Details, 6ES7 155-6AU01-0BN0 ...
Start page · User-defined pages · Introduction ...
Jun 8, 2023 · ... Portal.mwsl?PriNav=Bgz&Send=Filter&filtername=Name&filtervalue=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 ...
May 22, 2018 · Exploit Title: Siemens SIMATIC S7-1200 CPU - Cross-Site Scripting # Google Dork: inurl:/Portal/Portal.mwsl # Date: 2018-05-22 # Exploit ...
May 15, 2023 · # Google Dork: inurl:/Portal/Portal.mwsl # Date: 2022-03-24 # Exploit Author: RoseSecurity # Vendor Homepage: https://www.siemens.com/global ...
Status · Log in ; Introduction ...
Jun 20, 2023 · The vulnerability is caused by a lack of sanitization of the "filtervalue" parameter that is passed to "Portal.mwsl". A remote attacker may ...