Showing 4841-4860 of 8677 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Dec 26, 2013
1 Vulnerability
Apr 15, 2024
1 Vulnerability
Mar 26, 2021
1 Vulnerability
Jun 3, 2024
1 Vulnerability
Mar 31, 2008
1 Vulnerability
Apr 8, 2013
1 Vulnerability
Nov 9, 2012
1 Vulnerability
Apr 25, 2014
1 Vulnerability
Nov 9, 2012
1 Vulnerability
Nov 9, 2012
1 Vulnerability
Jan 6, 2008
1 Vulnerability
Nov 9, 2012
1 Vulnerability
Jul 20, 2023
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Feb 2, 2008
1 Vulnerability
Jul 4, 2014
1 Vulnerability
Oct 17, 2022
1 Vulnerability
May 22, 2023
1 Vulnerability
Aug 1, 2014
Title Number of Vulnerabilities Last Vulnerability
WP-Cron Dashboard 1 December 26, 2013
WP-Cufon 1 April 15, 2024
WP-Curriculo Vitae Free 1 March 26, 2021
WP-DB-Table-Editor 1 June 3, 2024
WP-Download 1 March 31, 2008
wp-download-manager 1 April 8, 2013
wp-dreamworkgallery 1 November 9, 2012
wp-easybooking 1 April 25, 2014
wp-ecommerce-cvs-importer 1 November 9, 2012
wp-extended 1 November 9, 2012
wp-FileManager 1 January 6, 2008
wp-flipslideshow 1 November 9, 2012
WP-FlyBox 1 July 20, 2023
wp-football 1 June 12, 2014
WP-Footnotes 1 February 2, 2008
wp-guestmap 1 July 4, 2014
Wp-Hide 1 October 17, 2022
WP-Hijri 1 May 22, 2023
WP-HR GDPR: GDPR Tools for Human Resources on WordPress 1 July 18, 2023
wp-html-sitemap 1 August 1, 2014

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation