This document discusses evaluating software vulnerabilities using fuzzing methods. It describes how fuzzing works by automatically generating test cases to identify security issues. Both blackbox and whitebox fuzzing are examined, with hybrid fuzzing proposed to leverage the strengths of both. The architecture of the HybridFuzz system is then outlined, including using symbolic execution to collect path predicates, input generation using constraints, and blackbox mutation-based testing. An evaluation of HybridFuzz on sample code and utilities shows it achieving good instruction and branch coverage.