Used Windows XP Help and Support Center Vulnerability Patch for Windows?
Developer’s Description
An attacker could exploit the vulnerability by constructing a Web page that, when opened, would call the errant function and supply the name of an existing file or folder as the argument. The attempt to upload the file or folder would fail, but the file nevertheless would be deleted. The page could be hosted on a Web site in order to attack users visiting the site, or it could be sent as an HTML mail in order to attack the recipient when it was opened.
Note: Customers should install Windows XP Service Pack 1 as a first option, and install the patch only as an interim measure.
For more information regarding this patch, click here.
Used Windows XP Help and Support Center Vulnerability Patch for Windows?
Explore More

SecureCrypt Ultimate Edition
FreeAccent Access Password Recovery
Trial versionSecureLock
Trial version
Windows 2000 NetBIOS Name Server Protocol Spoofing Vulnerability Patch
FreeBest Disk Lock
Trial version
Free USB Guard
Free
Microsoft ASP.NET Unchecked Buffer Vulnerability patch
Free
Microsoft Excel 2000 HTML Script Vulnerability Patch
Free
Windows 2000 Service Control Manager Named Pipe Impersonation Vulnerability Patch
Free
Windows Media Encoder Vulnerability Patch
Free
Office 2000 HTML Object Tag Vulnerability Patch
Free
Windows 2000 Protected Store Key Length Vulnerability Patch
Free