This document summarizes a presentation about DLL loading vulnerabilities. It begins with an introduction to the presenter and their background. The topics to be covered are then outlined, including the history of DLL loading issues, types of vulnerabilities like hijacking and preloading, how the DLL search order works and can be affected, recommendations for secure development practices, and references. A demonstration will also be included.