Did you hear about Optical Line Terminals? ISPs rely on them to build their service networks, but what if they are vulnerable?
Here @coiffeur0x90 shows how attackers could compromise entire ISPs by exploiting them and cloud-based fleet management software
https://blog.quarkslab.com/how-olts-may-have-exposed-entire-isp-networks.html
There's another LInux LPE (of course):
pintheft
Sadly, the RDS kernel module this requires is only default on Arch Linux among the common distributions we tested.
CVE unknown.
New blog post on "Proofs and Intuitions": On the Unreasonable Effectiveness of Property-Based Testing for Validating Formal Specifications.
https://proofsandintuitions.net/2026/05/18/property-based-testing-specifications/
The gist: randomised testing can validate formal specs. It's very cheap and powerful: we found bugs in specs of VERINA and CLEVER benchmarks.
Today is L0pht Day. In 1998 7 hackers in suits told the US Senate the internet was a house of cards. We said we could take it down in 30 minutes. They looked at us like we'd landed from another planet.
28 yrs later, the gap between what the security community knows and what decision-makers act on remains a fundamental problem.
Miss you, Peter Neumann. He testified that day too, with decades of hard-earned wisdom. We owe him.
The work isn't done. It never was.
You probably not gonna like this, yet somewhat might have anticipated...
We are seeing a stark influx in requests to audit vibe-coded cryptography.
So, vibe-crypto is a thing and will be one for a while.
Do what now?
As promised - full blog post is live for CVE-2026-40369
Covers everything: initial research, methodology, the exploitation path, caveats, cleanups, etc. The whole journey from finding it to production-grade exploit:
https://pwn2nimron.com/blog
https://bird.makeup/users/orinimron123/statuses/2054672170068918348
Count Dracula was 412 when he moved to England in search of new blood.
Sauron was 54,000 years old when he forged The One Ring.
Cthulhu had seen galaxies flare
into life and fade to darkness before he put madness in the minds of men.
It's never too late to follow your dreams!
New blog post: Vulnerability Spotlight - CVE-2023-32692.
Learn about the remote code execution vulnerability in CodeIgniter4 and try out our Dev-Container based test environment to follow along!
https://mogwailabs.de/en/blog/2026/05/vulnerability-spotlight-cve-2023-32692/
DOMPurify XSS via `selectedcontent` re-clone
https://github.com/cure53/DOMPurify/security/advisories/GHSA-87xg-pxx2-7hvx
This is one of the most interesting bypasses we have seen in a long time, and it feels that this new HTML element will cause lots of trouble in the future.
The Nightmare-Eclipse repo clearly credits James Forshaw with the CVE-2020-17103 vulnerability that MiniPlasma is based off of.
Did Nightmare-Eclipse modify MiniPlasma to use a variant of CVE-2020-17103 that still works on modern Windows, which surely contains the fix?
NO. MiniPlasma IS the poc from the GPZ write-up, but with a minor tweak to do something (LPE).
Why does it work on current Windows?
Well, instead of fixing CVE-2020-17103, they decided to break the PoC instead. And yeah, with Win10 Dec 2020 and Win11 RTM, the GPZ PoC doesn't work.
But somewhere between Win11 RTM and 22H2 (I have neither the VM snapshots nor the patience to determine when exactly), whatever thing Microsoft did to break the CVE-2020-17103 PoC regressed. An because it wasn't a fix, then surely Microsoft had no regression test to detect that the fix was no longer present.
So here we are. MiniPlasma is the GPZ PoC, but modified slightly to achieve LPE by way of Volatile Environment and wermgr.exe instead of creating DEMODEMO in the registry.
Since Microsoft didn't bother fixing CVE-2020-17103, will CVE-2020-17103 simply be updated with the MiniPlasma recognition that it wasn't actually fixed in December 2020? Get real. This will surely get a new CVE, as CVEs are for Microsoft updates, not vulnerabilities. 😂