- Exploit writing tutorial part 3: SEH Based Exploits by Corelan
- Exploit writing tutorial part 3b: SEH Based Exploits - just another example by Corelan
- Windows Exploit Development - Part 6: SEH Exploits by Securitysift
- Part 3: Structured Exception Handler (SEH) by Fuzzysecurity
- Windows Exploit Development - Part 4 [Overwriting SEH with Buffer Overflows] by Shogun Lab
- Developing remote SEH overwrite exploit for Integard Pro 2.2.0.9026 by learnexploitdevelopment
- Millenium MP3 Studio 2.0
- Free MP3 CD Ripper 2.6
- Easy AVI DivX Converter 1.2.24
- My Video Converter 1.5.24
- VeryPDF Image2PDF Converter
- ASX to MP3 Converter 3.1.2.1
- Vulnserver (GMON)
- EFS Easy Chat Server 3.1
- Disk Sorter Enterprise 9.5.12
- Easy File Sharing Web Server 7.2
- freeFTPd 1.0.10
- FathFTP 1.8
- File Sharing Wizard 1.5.0
- Easy Address Book Web server 1.6