Showing 361-380 of 9355 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
2 Vulnerabilities
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
Title Number of Vulnerabilities Last Vulnerability
dsSearchAgent: WordPress Edition 1 May 25, 2014
EMC2 Custom Help Videos 1 May 25, 2014
Foliopress WYSIWYG 2 May 25, 2014
GarageSale 1 May 25, 2014
GdeSlon Affiliate Shop 1 May 25, 2014
GEO Redirector 1 May 25, 2014
HTML5 jQuery Audio Player 1 May 25, 2014
HTML5 Lyrics Karaoke Player 1 May 25, 2014
HTML5 Video Player with Playlist 1 May 25, 2014
Import Legacy Media 1 May 25, 2014
Kindeditor For WordPress 1 May 25, 2014
Link2Player 1 May 25, 2014
Local Weather 1 May 25, 2014
Movies 1 May 25, 2014
ooorl 1 May 25, 2014
Pay Per Media Player 1 May 25, 2014
pb-embedflash 1 May 25, 2014
Podcasting Plugin by TSG 1 May 25, 2014
proquoter 1 May 25, 2014
Qiniu Uploader 1 May 25, 2014

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation