+vendor : http://www.qto.com +poral : qto file manager +version : All version ! Exploit: +http://www.xxx.xom/qto/index.php?msg=[xss]