Release v3.6.1 · projectdiscovery/nuclei
https://github.com/projectdiscovery/nuclei/releases/tag/v3.6.1
https://github.com/projectdiscovery/nuclei/releases/tag/v3.6.1
GitHub
Release v3.6.1 · projectdiscovery/nuclei
What’s Changed
🐞 Bug Fixes
fix(config): template exclusion logic for paths with reserved names by @dwisiswant0 in #6663
fix(http): lost request body on retries & redirects by @dwisiswant0 in #...
🐞 Bug Fixes
fix(config): template exclusion logic for paths with reserved names by @dwisiswant0 in #6663
fix(http): lost request body on retries & redirects by @dwisiswant0 in #...
❤6
A Deep And Very Technical Analysis of CVE-2025-55182 (React2Shell)
https://i0.rs/blog/a-deep-and-very-technical-analysis-of-cve-2025-55182-react2-shell/
https://i0.rs/blog/a-deep-and-very-technical-analysis-of-cve-2025-55182-react2-shell/
i0.rs
A Deep And Very Technical Analysis of CVE-2025-55182 (React2Shell)
Explaining the React2Shell vulnerability top to bottom, with no AI slop and proper technical due diligence.
👍4❤1👎1
Use GWP-ASan to detect exploits in production environments
https://blog.trailofbits.com/2025/12/16/use-gwp-asan-to-detect-exploits-in-production-environments/
https://blog.trailofbits.com/2025/12/16/use-gwp-asan-to-detect-exploits-in-production-environments/
The Trail of Bits Blog
Use GWP-ASan to detect exploits in production environments
GWP-ASan is a sampling-based memory error detection tool that catches critical bugs like use-after-free and buffer overflows in production environments with near-zero performance overhead, unlike AddressSanitizer which is too resource-intensive for deployment.
❤1
Ollama Remote Code Execution: Securing the Code That Runs LLMs
https://www.sonarsource.com/blog/ollama-remote-code-execution-securing-the-code-that-runs-llms/
https://www.sonarsource.com/blog/ollama-remote-code-execution-securing-the-code-that-runs-llms/
Sonarsource
Ollama Remote Code Execution: Securing the Code That Runs LLMs
Our Vulnerability Researchers uncovered vulnerabilities in the code of Ollama, a popular tool to run LLMs locally. Dive into the details of how LLMs are implemented and what can go wrong.
❤5🔥3
Critical Arbitrary File Upload Vulnerability in Motors Theme Affecting 20k+ Sites - Patchstack
https://patchstack.com/articles/critical-arbitrary-file-upload-vulnerability-in-motors-theme-affecting-20k-sites/
https://patchstack.com/articles/critical-arbitrary-file-upload-vulnerability-in-motors-theme-affecting-20k-sites/
Patchstack
Critical Arbitrary File Upload Vulnerability in Motors Theme Affecting 20k+ Sites - Patchstack
Subscriber+ arbitrary file upload vulnerability found in the Motors WordPress theme 🚨 Affects versions ≤5.6.81. Update to 5.6.82 to prevent full site takeover. CVE-2025-64374 🔒
❤3
Intigriti Bug Bytes #231 - December 2025 🚀
https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-231-december-2025
https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-231-december-2025
Intigriti
Intigriti Bug Bytes #231 - December 2025 🚀
Hi hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: React2Shell scanner (with WAF bypasses) Identifying server origin IP to bypass popular WAFs CSRF exp...
❤2
Year in Review: The Vulnerabilities That Defined 2025 — ProjectDiscovery Blog
https://projectdiscovery.io/blog/year-in-review-the-vulnerabilities-that-defined-2025
https://projectdiscovery.io/blog/year-in-review-the-vulnerabilities-that-defined-2025
ProjectDiscovery
Year in Review: The Vulnerabilities That Defined 2025 — ProjectDiscovery Blog
A Year of Real-World Exploitation
If you work in security, you probably remember React2Shell. Shortly after public disclosure, scanning activity increased, and exploitation attempts began to surface.
That sequence showed up repeatedly across several of…
If you work in security, you probably remember React2Shell. Shortly after public disclosure, scanning activity increased, and exploitation attempts began to surface.
That sequence showed up repeatedly across several of…
❤3
Ollama Remote Code Execution: Securing the Code That Runs LLMs
https://www.sonarsource.com/blog/ollama-remote-code-execution-securing-the-code-that-runs-llms/
https://www.sonarsource.com/blog/ollama-remote-code-execution-securing-the-code-that-runs-llms/
Sonarsource
Ollama Remote Code Execution: Securing the Code That Runs LLMs
Our Vulnerability Researchers uncovered vulnerabilities in the code of Ollama, a popular tool to run LLMs locally. Dive into the details of how LLMs are implemented and what can go wrong.
❤2
Can chatbots craft correct code?
https://blog.trailofbits.com/2025/12/19/can-chatbots-craft-correct-code/
https://blog.trailofbits.com/2025/12/19/can-chatbots-craft-correct-code/
The Trail of Bits Blog
Can chatbots craft correct code?
LLMs fundamentally differ from compilers because they lack determinism and semantic guarantees, making them useful coding assistants but unreliable for autonomous code generation without human review and formal verification.
❤2
How a single backslash got me £1000 bounty from a bug bounty program
https://medium.com/@sairajthorat077/how-a-single-backslash-got-me-1000-bounty-from-a-bug-bounty-program-39239e8fc017
https://medium.com/@sairajthorat077/how-a-single-backslash-got-me-1000-bounty-from-a-bug-bounty-program-39239e8fc017
Medium
How a single backslash got me £1000 bounty from a bug bounty program
Hi I am Sairaj Dattu Thorat and I’m in 11th grade right now.. and few months ago I started my bug bounty journey and I wanted to make…
❤6👍2💯2😁1
Ollama Remote Code Execution: Securing the Code That Runs LLMs
https://www.sonarsource.com/blog/ollama-remote-code-execution-securing-the-code-that-runs-llms/
https://www.sonarsource.com/blog/ollama-remote-code-execution-securing-the-code-that-runs-llms/
Sonarsource
Ollama Remote Code Execution: Securing the Code That Runs LLMs
Our Vulnerability Researchers uncovered vulnerabilities in the code of Ollama, a popular tool to run LLMs locally. Dive into the details of how LLMs are implemented and what can go wrong.
❤3👎2🤔1
The inevitable rise of poor code quality in AI-accelerated codebases
https://www.sonarsource.com/blog/the-inevitable-rise-of-poor-code-quality-in-ai-accelerated-codebases/
https://www.sonarsource.com/blog/the-inevitable-rise-of-poor-code-quality-in-ai-accelerated-codebases/
Sonarsource
The inevitable rise of poor code quality in AI-accelerated codebases
The adoption of Large Language Models (LLMs) and AI coding assistants has radically accelerated the development lifecycle, offering the potential for developers to achieve up to a 55% increase in productivity and complete tasks twice as fast.
❤1
When OAuth Becomes a Weapon: Lessons from CVE-2025-6514 | Amla Labs
https://amlalabs.com/blog/oauth-cve-2025-6514/
https://amlalabs.com/blog/oauth-cve-2025-6514/
Amla Labs
When OAuth Becomes a Weapon: Lessons from CVE-2025-6514 | Amla Labs
A critical vulnerability in mcp-remote affected 558,846 downloads. The bug was client-side, but the attack exploited OAuth dynamic discovery—a trust assumption that breaks for autonomous agents.
❤3
Turning List-Unsubscribe into an SSRF/XSS Gadget
https://security.lauritz-holtmann.de/post/xss-ssrf-list-unsubscribe/
https://security.lauritz-holtmann.de/post/xss-ssrf-list-unsubscribe/
(Web-)Insecurity Blog
Turning List-Unsubscribe into an SSRF/XSS Gadget
The List-Unsubscribe SMTP header is standardized but often overlooked during security assessments. It allows email clients to provide an easy way for end-users to unsubscribe from mailing lists.
This post discusses how this header can be abused to perform…
This post discusses how this header can be abused to perform…
❤4
Seventeen years later, code quality is more relevant than ever
https://www.sonarsource.com/blog/sonars-17-year-anniversary/
https://www.sonarsource.com/blog/sonars-17-year-anniversary/
Sonarsource
Seventeen years later, code quality is more relevant than ever
What started as a free and open source tool to solve our own problem has grown to become SonarQube, a product now used by more than 7 million developers around the world to review and improve the quality and security of over 750 billion lines of code every…
❤4
December CTF Challenge: Chaining XS leaks and postMessage XSS
https://www.intigriti.com/researchers/blog/hacking-tools/december-ctf-challenge-xs-leaks-postmessage-xss
https://www.intigriti.com/researchers/blog/hacking-tools/december-ctf-challenge-xs-leaks-postmessage-xss
❤7
CSRF Protection without Tokens or Hidden Form Fields
https://blog.miguelgrinberg.com/post/csrf-protection-without-tokens-or-hidden-form-fields
https://blog.miguelgrinberg.com/post/csrf-protection-without-tokens-or-hidden-form-fields
Miguelgrinberg
CSRF Protection without Tokens or Hidden Form Fields
A couple of months ago, I received a request from a random Internet user to add CSRF protection to my little web framework Microdot, and I thought it was a fantastic idea.When I set off to do this…
❤8
Introducing Sonar Foundation Agent | Sonar
https://www.sonarsource.com/blog/introducing-sonar-foundation-agent/
https://www.sonarsource.com/blog/introducing-sonar-foundation-agent/
Sonarsource
Introducing Sonar Foundation Agent | Sonar
Sonar Foundation Agent is a coding agent for general software issues, developed at Sonar by the former AutoCodeRover team. As of November 3, 2025, Sonar Foundation Agent scores 75% on SWE-bench Verified, while maintaining a low average cost of $1.26 and a…
❤4
Server-Side Request Forgery (SSRF): Detection, Impact, and Defense Bypass Techniques
https://seclak07.medium.com/server-side-request-forgery-ssrf-detection-impact-and-defense-bypass-techniques-71787fe52db1
https://seclak07.medium.com/server-side-request-forgery-ssrf-detection-impact-and-defense-bypass-techniques-71787fe52db1
Medium
Server-Side Request Forgery (SSRF): Detection, Impact, and Defense Bypass Techniques
Server-Side Request Forgery (SSRF) is a critical web application vulnerability that is frequently misunderstood but highly impactful when…
👎4❤2