Showing 541-560 of 8572 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
2 Vulnerabilities
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
2 Vulnerabilities
Aug 1, 2014
2 Vulnerabilities
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Aug 1, 2014
3 Vulnerabilities
Aug 6, 2014
Title Number of Vulnerabilities Last Vulnerability
Verification Code for Comments 1 August 1, 2014
webrotate-360-product-viewer 1 August 1, 2014
WHOIS 2 August 1, 2014
WordPress Font Uploader 1 August 1, 2014
WP AmASIN – The Amazon Affiliate Shop 1 August 1, 2014
WP App Maker 1 August 1, 2014
WP PHP widget 1 August 1, 2014
WP Portfolio Gallery 1 August 1, 2014
WP Post to PDF 1 August 1, 2014
WP-Banners-Lite 1 August 1, 2014
wp-business-directory 1 August 1, 2014
wp-html-sitemap 1 August 1, 2014
wp-instagram-bank 1 August 1, 2014
wp-media-player 1 August 1, 2014
WP-reCAPTCHA 2 August 1, 2014
WP-Table 2 August 1, 2014
WPCB 1 August 1, 2014
XEN Carousel 1 August 1, 2014
Xhanch – My Twitter 1 August 1, 2014
WordPress Spreadsheet 3 August 6, 2014

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation