Showing 1-20 of 9648 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Oct 3, 2005
1 Vulnerability
Aug 14, 2006
1 Vulnerability
Apr 29, 2007
1 Vulnerability
Apr 30, 2007
1 Vulnerability
May 1, 2007
2 Vulnerabilities
May 1, 2007
1 Vulnerability
May 22, 2007
1 Vulnerability
Jul 13, 2007
2 Vulnerabilities
Jul 27, 2007
1 Vulnerability
Oct 4, 2007
1 Vulnerability
Nov 12, 2007
1 Vulnerability
Nov 26, 2007
1 Vulnerability
Nov 28, 2007
1 Vulnerability
Dec 5, 2007
2 Vulnerabilities
Jan 3, 2008
1 Vulnerability
Jan 6, 2008
2 Vulnerabilities
Jan 13, 2008
1 Vulnerability
Jan 15, 2008
1 Vulnerability
Jan 15, 2008
1 Vulnerability
Jan 21, 2008
Title Number of Vulnerabilities Last Vulnerability
secure-files 1 October 3, 2005
Skippy WP-DB Backup (Legacy Core Plugin) 1 August 14, 2006
MySliderGallery 1 April 29, 2007
The Hacker's Diet 1 April 30, 2007
Myflash 1 May 1, 2007
wordTube 2 May 1, 2007
AdSense-Deluxe 1 May 22, 2007
FeedStats 1 July 13, 2007
stats 2 July 27, 2007
feedburner-feedsmith 1 October 4, 2007
Peter's Random Anti-Spam Image 1 November 12, 2007
Captcha! 1 November 26, 2007
Cryptographp 1 November 28, 2007
PictPress 1 December 5, 2007
Math Comment Spam Protection 2 January 3, 2008
wp-FileManager 1 January 6, 2008
WP-ContactForm 2 January 13, 2008
Peter's Math Anti-Spam 1 January 15, 2008
SpamBam 1 January 15, 2008
Dean's Permalinks Migration 1 January 21, 2008

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation