Showing 21-40 of 824 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Sep 27, 2011
1 Vulnerability
Sep 27, 2011
1 Vulnerability
Sep 27, 2011
1 Vulnerability
Sep 27, 2011
1 Vulnerability
Sep 28, 2011
1 Vulnerability
Sep 29, 2011
1 Vulnerability
Sep 29, 2011
1 Vulnerability
Sep 30, 2011
1 Vulnerability
Oct 4, 2011
1 Vulnerability
Oct 7, 2011
1 Vulnerability
Oct 24, 2011
1 Vulnerability
Oct 28, 2011
1 Vulnerability
Mar 26, 2012
1 Vulnerability
Apr 28, 2012
1 Vulnerability
Apr 28, 2012
1 Vulnerability
Apr 28, 2012
1 Vulnerability
Apr 28, 2012
1 Vulnerability
Jun 17, 2012
1 Vulnerability
Jul 15, 2012
1 Vulnerability
Jul 15, 2012
Title Number of Vulnerabilities Last Vulnerability
RedLine 1 September 27, 2011
Trending 1 September 27, 2011
Web Minimalist 200901 1 September 27, 2011
ZenLite 1 September 27, 2011
The Erudite 1 September 28, 2011
Elegant Grunge 1 September 29, 2011
Pixiv Custom 1 September 29, 2011
Black-Letterhead 1 September 30, 2011
Morning Coffee 1 October 4, 2011
Classipress 1 October 7, 2011
Cover WP 1 October 24, 2011
Simple Balance 1 October 28, 2011
MoneyMasters 1 March 26, 2012
Canvas 1 April 28, 2012
Sentient 1 April 28, 2012
WooStore 1 April 28, 2012
Wootique 1 April 28, 2012
Famous 1 June 17, 2012
alltuts 1 July 15, 2012
boldy 1 July 15, 2012

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation