Showing 181-200 of 824 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Jun 10, 2014
1 Vulnerability
Sep 7, 2014
1 Vulnerability
Sep 8, 2014
1 Vulnerability
Sep 8, 2014
1 Vulnerability
Sep 8, 2014
1 Vulnerability
Sep 17, 2014
1 Vulnerability
Sep 27, 2014
1 Vulnerability
Sep 27, 2014
1 Vulnerability
Nov 8, 2014
1 Vulnerability
Nov 8, 2014
1 Vulnerability
Nov 8, 2014
1 Vulnerability
Nov 8, 2014
1 Vulnerability
Nov 8, 2014
1 Vulnerability
Nov 8, 2014
1 Vulnerability
Nov 8, 2014
1 Vulnerability
Dec 6, 2014
1 Vulnerability
Dec 7, 2014
1 Vulnerability
Jan 18, 2015
1 Vulnerability
Jan 20, 2015
1 Vulnerability
Jan 26, 2015
Title Number of Vulnerabilities Last Vulnerability
SCv1 Theme 1 June 10, 2014
Authentic 1 September 7, 2014
Antioch 1 September 8, 2014
Epic Church by Organized Themes 1 September 8, 2014
Urban City 1 September 8, 2014
Cakifo 1 September 17, 2014
Refraction 1 September 27, 2014
rt_refraction_wp 1 September 27, 2014
Akita 1 November 8, 2014
Alyeska 1 November 8, 2014
Arcadian Responsive 1 November 8, 2014
Barely Corporate 1 November 8, 2014
Commodore 1 November 8, 2014
Swagger 1 November 8, 2014
WP Jump Start 1 November 8, 2014
satoshi 1 December 6, 2014
ChurcHope 1 December 7, 2014
Holding Pattern 1 January 18, 2015
Pagelines 1 January 20, 2015
RedSteel 1 January 26, 2015

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation