Showing 9361-9380 of 9381 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

3 Vulnerabilities
Aug 26, 2024
1 Vulnerability
Apr 4, 2023
1 Vulnerability
May 25, 2014
3 Vulnerabilities
Jul 18, 2023
1 Vulnerability
Oct 31, 2024
2 Vulnerabilities
Jul 29, 2022
2 Vulnerabilities
Jul 9, 2024
2 Vulnerabilities
Aug 9, 2024
2 Vulnerabilities
Aug 19, 2021
1 Vulnerability
Sep 20, 2021
1 Vulnerability
Feb 8, 2023
1 Vulnerability
Sep 19, 2018
1 Vulnerability
Jul 30, 2021
1 Vulnerability
Nov 8, 2024
1 Vulnerability
Jul 16, 2024
Title Number of Vulnerabilities Last Vulnerability
Zynith SEO 3 August 26, 2024
ZYREX POPUP 1 April 4, 2023
µAudio Player 1 May 25, 2014
Кнопка ЮMoney 3 July 18, 2023
Курс валют UAH 1 October 31, 2024
ЮKassa для WooCommerce 2 July 29, 2022
افزونه پیامک ووکامرس Persian WooCommerce SMS 3 October 16, 2024
پلاگین پرداخت دلخواه 2 July 9, 2024
ووکامرس فارسی 2 August 9, 2024
తెలుగు బైబిల్ వచనములు 1 July 19, 2021
博客社交分享组件 2 August 19, 2021
多合一搜索自动推送管理插件-支持Baidu/Google/Bing/IndexNow/Yandex/头条 1 February 24, 2023
微信打赏(Wechat Reward) 1 September 20, 2021
微信机器人高级版 1 February 8, 2023
微信群发助手-Wechat Broadcast 1 September 19, 2018
有赏 You Shang 1 July 30, 2021
活动链接推广插件 1 November 8, 2024
简数采集器 1 July 16, 2024
胖鼠采集(Fat Rat Collect) 微信知乎简书腾讯新闻列表分页采集, 还有自动采集、自动发布、自动标签、等多项功能。开源插件 2 November 12, 2024
蜜蜂采集-BeePress 微信公众号今日头条知乎专栏简书等平台文章采集插件 1 February 26, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation