+vendor : http://www.qto.com

+poral : qto file manager

+version : All version !

Exploit: 

+http://www.xxx.xom/qto/index.php?msg=[xss]


Reply via email to