This document summarizes research on vulnerabilities related to dynamic component loading in Windows. It discusses how DLL hijacking works by placing a malicious DLL with the same name as a legitimate one in a directory searched by an application during loading. It also describes other attacks like DLL preloading and load hijacking. The document reviews related work on detecting unsafe dynamic loading, analyzing Windows API calls to detect malware, and generating exploits for identified vulnerabilities. It concludes that the common component resolution strategy in Windows poses security risks if only file names are used during loading.