Showing 361-380 of 9983 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 25, 2014
Title Number of Vulnerabilities Last Vulnerability
GarageSale 1 May 25, 2014
GdeSlon Affiliate Shop 1 May 25, 2014
GEO Redirector 1 May 25, 2014
HTML5 jQuery Audio Player 1 May 25, 2014
HTML5 Video Player with Playlist 1 May 25, 2014
Import Legacy Media 1 May 25, 2014
Kindeditor For WordPress 1 May 25, 2014
Link2Player 1 May 25, 2014
Local Weather 1 May 25, 2014
Movies 1 May 25, 2014
ooorl 1 May 25, 2014
Pay Per Media Player 1 May 25, 2014
pb-embedflash 1 May 25, 2014
Podcasting Plugin by TSG 1 May 25, 2014
proquoter 1 May 25, 2014
Qiniu Uploader 1 May 25, 2014
S3bubble Amazon S3 Media Streaming 1 May 25, 2014
Secure HTML5 Video Player 1 May 25, 2014
shortcode-ninja 1 May 25, 2014
So Audible Cloud Music Player 1 May 25, 2014

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation