Every major CVE — automatically mapped to Casky's 754 Claude AI skills. We track which attack patterns our skills already detect, so you can see exactly how far ahead AI-native security training puts you.
Buffer Overflow in LBT-T300 VPN Management Interface
Buffer Overflow in LBT-T300 WiFi Device Configuration
Gravity Forms Stored XSS via Unsanitized Product Options
Gravity Forms Nested Field Stored XSS Vulnerability
Insecure Direct Object Reference in School App
WordPress Geo Mashup Plugin SQL Injection via Unquoted Parameters
Gravity Forms Hidden Product Field Stored XSS Vulnerability
Gravity Forms Unauthenticated Stored XSS in Calculation Fields
WordPress Gravity Forms Stored XSS via Consent Field Validation
WordPress Widget Plugin Remote Code Execution via Unsafe eval()
WordPress Elementor Plugin Server-Side Request Forgery via URL Validation Bypass
InnoShop Installation Endpoint Authentication Bypass
WordPress PixelYourSite Plugin Blind SSRF Vulnerability
ARMember Plugin Vulnerable to Unauthenticated SQL Injection
WordPress Stripe Webhook Configuration Unauthorized Modification
PHP Object Injection in WordPress Profile Builder Plugin
SQL Injection in Sunnet CTMS Allows Authenticated Database Manipulation
WordPress Geo Mashup Plugin Time-Based SQL Injection
Buffer Overflow in TRENDnet Firmware Update Function
Improper Authorization in ChatGPTNextWeb MCP Server Configuration
Brizy Page Builder Unauthenticated Stored XSS Vulnerability
Arbitrary File Upload Enables Remote Code Execution in Sunnet CTMS/CPAS
WordPress Geo Mashup SQL Injection via Unvalidated POST Parameters
WordPress Salon Booking Plugin Arbitrary File Read via Email
WooCommerce Plugin Allows Vendor-Level Users to Delete Any Account
SQL Injection in Hospital Management System Parameter
MikroTik RouterOS SCEP Out-of-Bounds Read Vulnerability
SQL Injection in Jinher OA User Selection Parameter
SQL Injection in Electronic Judging System Login
Apache Neethi Policy Normalization Denial of Service
Join Casky to run the skills that detect these attack patterns — before the next CVE is disclosed.
Join the Playground Waitlist →© 2026 Casky.AI, Inc. · AI-Powered Cyber Skills