Used Windows XP Unchecked Buffer in File Decompression Functions Vulnerability Patch for Windows?
Developer’s Description
By Microsoft
The second vulnerability is that the decompression function may put a file in a folder that is different from, or that is a child of, the target folder that is specified by the user as the location where the decompressed ZIP files are put. This behavior may allow an attacker to put a file in a known location on the user's computer; for example, an attacker may put a program in a Startup folder.
Used Windows XP Unchecked Buffer in File Decompression Functions Vulnerability Patch for Windows?
Explore More

Androsa FileProtector
FreeSecured eUSB
Trial versionimlSoft Secure Burn Driver
Trial versionCryptzone Endpoint Encryption
Trial version
IE Password Revealer
Trial version
U King
Trial versionIcon Lock-iT XP
Trial version
Folder Secure
Trial version
Parallel Password Recovery (Office)
Trial version
Pro3X
Free
X-Lizard Password Generator
Free
Windows Media Encoder Vulnerability Patch
Free