Back to Results
First PageMeta Content
Computer network security / FTP clients / Microsoft Windows / Hacking / Vulnerability / Internet Explorer 6 / Buffer overflow / Internet Explorer / Windows Vista / Computer security / Computing / Cyberwarfare


Software Vulnerability Exploitation Trends Exploring the impact of software mitigations on patterns of vulnerability exploitation Software Vulnerability Exploitation Trends This document is for informational purposes on
Add to Reading List

Document Date: 2013-07-24 13:36:39


Open Document

File Size: 542,03 KB

Share Result on Facebook

Company

Microsoft Corporation / /

Facility

Microsoft Security Response Center / /

IndustryTerm

software mitigations / incorrect management / software vulnerabilities / software industry / static analysis tools / web browsers / Internet Explorer versions Vulnerability Exploitation Trends / Internet Web site references / network-connected systems / Internet Explorer / secure products / /

OperatingSystem

Windows Vista / Windows 2000 / Microsoft Windows / Windows 7 / Windows XP / /

Person

Cristian Craioveanu / Elia Florio / Matt Thomlinson / Matt Miller / /

Position

General Manager Microsoft Trustworthy Computing Security / /

Product

Windows 8 / Microsoft Corporation Portable Audio Device / /

Technology

Cryptography / operating system / operating systems / /

URL

www.microsoft.com/enus/download/details.aspx?id=26788 / http /

SocialTag