Used Windows XP Help and Support Center Vulnerability Patch for Windows?
Developer’s Description
An attacker could exploit the vulnerability by constructing a Web page that, when opened, would call the errant function and supply the name of an existing file or folder as the argument. The attempt to upload the file or folder would fail, but the file nevertheless would be deleted. The page could be hosted on a Web site in order to attack users visiting the site, or it could be sent as an HTML mail in order to attack the recipient when it was opened.
Note: Customers should install Windows XP Service Pack 1 as a first option, and install the patch only as an interim measure.
For more information regarding this patch, click here.
Used Windows XP Help and Support Center Vulnerability Patch for Windows?
Explore More
ViPNet Safe Disk
Trial versionEncrypByte
FreePrivacy Drive
Trial version
Microsoft Plus 98 Exposed Passwords in Compressed Files Vulnerability Patch
FreeWinXFiles
Trial version
Windows Me Exposed Passwords in Compressed Files Vulnerability Patch
FreeEncrypted Disk
Trial version
Encoding Decoding Free
FreeLockPad
Trial versionWindows 2000/NT Password Recovery Key
Trial version
Windows 2000 Malformed Event Record Vulnerability Patch
Free
Windows Digital Certificate Spoofing Hazard Vulnerability Patch
Free