+vendor : http://www.qto.com
+poral : qto file manager
+version : All version !
Exploit: 
+http://www.xxx.xom/qto/index.php?msg=[xss]