Showing 7561-7580 of 8010 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

2 Vulnerabilities
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 12, 2014
1 Vulnerability
Jun 11, 2014
1 Vulnerability
Jun 10, 2014
1 Vulnerability
Jun 1, 2014
1 Vulnerability
May 30, 2014
1 Vulnerability
May 29, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
2 Vulnerabilities
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
1 Vulnerability
May 28, 2014
2 Vulnerabilities
May 28, 2014
Title Number of Vulnerabilities Last Vulnerability
WP-FaceThumb 2 June 12, 2014
wp-football 1 June 12, 2014
WP-Picasa-Image 1 June 12, 2014
wp-restful 1 June 12, 2014
wp-tmkm-amazon 1 June 12, 2014
Wu-Rating 1 June 12, 2014
AdminOnline 1 June 11, 2014
Member Approval 1 June 10, 2014
Popup Images 1 June 1, 2014
simple-popup-images 1 May 30, 2014
Cross-RSS 1 May 29, 2014
ActiveHelper LiveHelp Live Chat 1 May 28, 2014
All in One Social Lite 1 May 28, 2014
All Video Gallery Plugin for WordPress 2 May 28, 2014
BIC Media Widget 1 May 28, 2014
BookX 1 May 28, 2014
Bugs Go Viral : Facebook Promotion Generator 1 May 28, 2014
Conversador 1 May 28, 2014
DMCA WaterMarker 1 May 28, 2014
Easy Career Openings 2 May 28, 2014

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation