Showing 21-40 of 9636 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Jan 27, 2008
1 Vulnerability
Jan 30, 2008
1 Vulnerability
Jan 30, 2008
4 Vulnerabilities
Feb 2, 2008
1 Vulnerability
Feb 2, 2008
1 Vulnerability
Feb 2, 2008
1 Vulnerability
Feb 14, 2008
1 Vulnerability
Feb 16, 2008
1 Vulnerability
Feb 18, 2008
3 Vulnerabilities
Feb 26, 2008
1 Vulnerability
Mar 31, 2008
1 Vulnerability
Jul 9, 2008
1 Vulnerability
Jul 24, 2008
3 Vulnerabilities
Oct 14, 2008
1 Vulnerability
Oct 17, 2008
2 Vulnerabilities
Oct 17, 2008
1 Vulnerability
Oct 29, 2008
1 Vulnerability
Dec 22, 2008
1 Vulnerability
Mar 17, 2009
1 Vulnerability
Apr 13, 2009
Title Number of Vulnerabilities Last Vulnerability
wp-cal 1 January 27, 2008
AdServe 1 January 30, 2008
fgallery 1 January 30, 2008
DMSGuestbook 4 February 2, 2008
WordSpew 1 February 2, 2008
WP-Footnotes 1 February 2, 2008
Search Unleashed 1 February 14, 2008
Yellow Swordfish Simple Forum 1 February 16, 2008
WP People 1 February 18, 2008
Sniplets 3 February 26, 2008
WP-Download 1 March 31, 2008
TubePress 1 July 9, 2008
Downloads Manager 1 July 24, 2008
WP Comment Remix 3 October 14, 2008
php-shell 1 October 17, 2008
ShiftThis 2 October 17, 2008
WP e-Commerce 1 October 29, 2008
page-flip-image-gallery 1 December 22, 2008
fmoblog 1 March 17, 2009
WP-Syntax 1 April 13, 2009

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation