You can read this document from this location http://www.accuvant.com/capability/accuvant-labs/security-research/browser-security-comparison-quantitative-approach
There is no doubt that this document is good but there is some mistake in the editing.
2) Figure numbers referenced in most of the paragraph is wrong.
3) Constant Bliding table for Chrome browser is wrong.
4) Figure 16) in page 32 may be testing small subset. When a user selecting a file in browser for upload, that file also added in the list of allowed files to give access to. Yes by default it is SAFE.
5) Browser would have already called WSAStartup() right ? So do i need to call WSAStartup() when i am exploiting it ?