Showing 421-440 of 9355 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 29, 2014
1 Vulnerability
May 30, 2014
1 Vulnerability
Jun 1, 2014
1 Vulnerability
Jun 10, 2014
1 Vulnerability
Jun 11, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
Title Number of Vulnerabilities Last Vulnerability
quartz 1 May 28, 2014
SS Downloads 1 May 28, 2014
stripshow 1 May 28, 2014
swipehq-payment-gateway-woocommerce 1 May 28, 2014
Validated 1 May 28, 2014
WebEngage Feedback, Survey and Notification 1 May 28, 2014
WordPress Social Invitations – Lite 1 May 28, 2014
WP Rss Poster 1 May 28, 2014
wppm 1 May 28, 2014
your-text-manager 1 May 28, 2014
ZdStatistics 1 May 28, 2014
zeList 1 May 28, 2014
Cross-RSS 1 May 29, 2014
simple-popup-images 1 May 30, 2014
Popup Images 1 June 1, 2014
Member Approval 1 June 10, 2014
AdminOnline 1 June 11, 2014
Appointments Scheduler 1 June 12, 2014
HTML5 Webcam/Screen/Mic Recorder for Video Comments and Forms 1 June 12, 2014
Ruven Toolkit 1 June 12, 2014

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation