Showing 9941-9960 of 9967 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Apr 4, 2023
1 Vulnerability
May 25, 2014
3 Vulnerabilities
Jul 18, 2023
1 Vulnerability
Oct 31, 2024
2 Vulnerabilities
Jul 29, 2022
2 Vulnerabilities
Jul 9, 2024
2 Vulnerabilities
Aug 9, 2024
2 Vulnerabilities
Aug 19, 2021
1 Vulnerability
Sep 20, 2021
1 Vulnerability
Feb 8, 2023
1 Vulnerability
Sep 19, 2018
1 Vulnerability
Jul 30, 2021
1 Vulnerability
Nov 8, 2024
1 Vulnerability
Dec 14, 2024
1 Vulnerability
Jul 16, 2024
Title Number of Vulnerabilities Last Vulnerability
ZYREX POPUP 1 April 4, 2023
µAudio Player 1 May 25, 2014
Кнопка ЮMoney 3 July 18, 2023
Курс валют UAH 1 October 31, 2024
Экспресс Платежи платежный модуль 1 November 19, 2024
ЮKassa для WooCommerce 2 July 29, 2022
استخراج محصولات ووکامرس برای آیسی 1 December 19, 2024
افزونه پیامک ووکامرس Persian WooCommerce SMS 5 December 11, 2024
پلاگین پرداخت دلخواه 2 July 9, 2024
ووکامرس فارسی 2 August 9, 2024
తెలుగు బైబిల్ వచనములు 1 July 19, 2021
博客社交分享组件 2 August 19, 2021
多合一搜索自动推送管理插件-支持Baidu/Google/Bing/IndexNow/Yandex/头条 1 February 24, 2023
微信打赏(Wechat Reward) 1 September 20, 2021
微信机器人高级版 1 February 8, 2023
微信群发助手-Wechat Broadcast 1 September 19, 2018
有赏 You Shang 1 July 30, 2021
活动链接推广插件 1 November 8, 2024
畅言评论系统 1 December 14, 2024
简数采集器 1 July 16, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation