This seminar provides an overview of how memory-corruption vulnerabilities work and are managed. This seminar aims to (1) provide an overview of how native software works, (2) how simple bugs can be used to execute an attacker's code, and (3) how such bugs are managed.