A vulnerability has been discovered in AMI MegaRAC Software, which could allow for remote code execution. MegaRAC is a product line of BMC firmware packages and formerly service processors providing out-of-band, or lights-out remote management of computer systems. Successful exploitation of this vulnerability allows an attacker to remotely control the compromised server, remotely deploy malware, ransomware, firmware tampering, bricking motherboard components (BMC or potentially BIOS/UEFI), potential server physical damage (over-voltage / bricking), and indefinite reboot loops that a victim cannot stop.
More Stories
corosync-3.1.9-2.fc40
FEDORA-2025-0bafd025de Packages in this update: corosync-3.1.9-2.fc40 Update description: Security fix for CVE-2025-30472 Read More
varnish-7.5.0-3.fc41
FEDORA-2025-4453f596a8 Packages in this update: varnish-7.5.0-3.fc41 Update description: Security: This update includes fix for VSV00015 aka CVE-2025-30346. Upstream considers this...
corosync-3.1.9-2.fc41
FEDORA-2025-c55f39aeb3 Packages in this update: corosync-3.1.9-2.fc41 Update description: Security fix for CVE-2025-30472 Read More
corosync-3.1.9-3.fc42
FEDORA-2025-a350309ddb Packages in this update: corosync-3.1.9-3.fc42 Update description: Security fix for CVE-2025-30472 Read More
USN-7372-1: Varnish vulnerability
Martin van Kervel Smedshammer discovered that Varnish did not properly sanitize certain HTTP headers. A remote attacker could possibly use...
GitHub Actions Supply Chain Attack
What is the Attack?Recently, a popular third-party GitHub Action tj-actions/changed-files GitHub Action (CVE-2025-30066)- used by over 23,000 repositories- was compromised,...