Showing 41-60 of 8008 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Apr 13, 2009
1 Vulnerability
May 26, 2009
1 Vulnerability
Jun 15, 2009
2 Vulnerabilities
Jun 22, 2009
1 Vulnerability
Jun 30, 2009
1 Vulnerability
Oct 21, 2009
1 Vulnerability
Feb 15, 2010
1 Vulnerability
Jul 22, 2010
1 Vulnerability
Nov 5, 2010
1 Vulnerability
Nov 5, 2010
2 Vulnerabilities
Nov 24, 2010
1 Vulnerability
Dec 8, 2010
1 Vulnerability
Dec 8, 2010
1 Vulnerability
Dec 17, 2010
1 Vulnerability
Jan 21, 2011
1 Vulnerability
Jan 23, 2011
1 Vulnerability
Feb 8, 2011
1 Vulnerability
Feb 21, 2011
1 Vulnerability
Feb 22, 2011
Title Number of Vulnerabilities Last Vulnerability
WP-Syntax 1 April 13, 2009
wp-lytebox 1 May 26, 2009
Photoracer Plugin 1 June 15, 2009
firestats 2 June 22, 2009
Related Sites 1 June 30, 2009
Piwik PRO 1 October 21, 2009
Copperleaf Photolog 1 February 15, 2010
myLinksDump 1 July 22, 2010
FeedList 1 November 5, 2010
vodpod-video-gallery 1 November 5, 2010
Register Plus 2 November 24, 2010
Peadig's Twitter Feed: Embedded Timeline WordPress Plugin 1 December 7, 2010
WordPress Processing Embed 1 December 8, 2010
WP Safe Search 1 December 8, 2010
Embedded Video 1 December 17, 2010
StatPressCN 1 January 21, 2011
RSS Feed Reader 1 January 23, 2011
CDN Vote 1 February 8, 2011
Uploadify 1 February 21, 2011
photosmash-galleries 1 February 22, 2011

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation