Showing 8161-8180 of 8572 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Apr 25, 2014
1 Vulnerability
Nov 9, 2012
2 Vulnerabilities
Mar 28, 2024
5 Vulnerabilities
Jul 24, 2023
1 Vulnerability
Nov 9, 2012
2 Vulnerabilities
Jun 12, 2014
3 Vulnerabilities
Mar 1, 2017
1 Vulnerability
Jan 6, 2008
1 Vulnerability
Nov 9, 2012
1 Vulnerability
Jul 20, 2023
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Feb 2, 2008
2 Vulnerabilities
Mar 28, 2024
4 Vulnerabilities
Apr 16, 2024
3 Vulnerabilities
May 15, 2015
1 Vulnerability
Jul 4, 2014
1 Vulnerability
Oct 17, 2022
1 Vulnerability
May 22, 2023
Title Number of Vulnerabilities Last Vulnerability
wp-easybooking 1 April 25, 2014
wp-ecommerce-cvs-importer 1 November 9, 2012
WP-Eggdrop 2 March 28, 2024
WP-EMail 5 July 24, 2023
wp-extended 1 November 9, 2012
WP-FaceThumb 2 June 12, 2014
WP-Filebase 3 March 1, 2017
wp-FileManager 1 January 6, 2008
wp-flipslideshow 1 November 9, 2012
WP-FlyBox 1 July 20, 2023
wp-football 1 June 12, 2014
WP-Footnotes 1 February 2, 2008
wp-forecast 2 March 28, 2024
WP-FormAssembly 4 April 16, 2024
wp-forum 3 May 15, 2015
wp-guestmap 1 July 4, 2014
Wp-Hide 1 October 17, 2022
WP-Hijri 1 May 22, 2023
WP-HR GDPR: GDPR Tools for Human Resources on WordPress 1 July 18, 2023
WP-HR Manager: The Human Resources Plugin for WordPress 2 July 18, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation