Showing 441-460 of 8572 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
2 Vulnerabilities
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 28, 2014
1 Vulnerability
Jun 29, 2014
1 Vulnerability
Jul 2, 2014
1 Vulnerability
Jul 3, 2014
2 Vulnerabilities
Jul 4, 2014
Title Number of Vulnerabilities Last Vulnerability
Appointments Scheduler 1 June 12, 2014
HTML5 Webcam/Screen/Mic Recorder for Video Comments and Forms 1 June 12, 2014
Ruven Toolkit 1 June 12, 2014
Walk Score Plugin 1 June 12, 2014
WikiPop 1 June 12, 2014
WordPress Responsive Preview 1 June 12, 2014
WP BlipBot 1 June 12, 2014
WP Consultant 1 June 12, 2014
WP Microblogs 1 June 12, 2014
WP-FaceThumb 2 June 12, 2014
wp-football 1 June 12, 2014
WP-Picasa-Image 1 June 12, 2014
wp-restful 1 June 12, 2014
wp-tmkm-amazon 1 June 12, 2014
Wu-Rating 1 June 12, 2014
Easy Banners 1 June 28, 2014
Blogstand Banner 1 June 29, 2014
anyfont 1 July 2, 2014
vn-calendar 1 July 3, 2014
TimThumb 2 July 4, 2014

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation