--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-03eb748e1d
2022-08-31 10:14:39.516331
--------------------------------------------------------------------------------
Name : medusa
Product : Fedora 35
Version : 2.2
Release : 18.20181216git292193b.fc35
URL :
http://www.foofus.net/jmk/medusa/medusa.html
Summary : Parallel brute forcing password cracker
Description :
Medusa is a speedy, massively parallel, modular,
login brute-forcer for network services.
Some of the key features of Medusa are:
* Thread-based parallel testing. Brute-force
testing can be performed against multiple hosts,
users or passwords concurrently.
* Flexible user input. Target information
(host/user/password) can be specified in a variety of ways.
For example, each item can be either a single
entry or a file containing multiple entries.
Additionally, a combination file format allows
the user to refine their target listing.
* Modular design. Each service module exists
as an independent .mod file.
This means that no modifications are necessary
to the core application in order to extend
the supported list of services for brute-forcing.
--------------------------------------------------------------------------------
Update Information:
Update FreeRDP 2.8.0
--------------------------------------------------------------------------------
ChangeLog:
* Mon Aug 15 2022 Simone Caronni <negativo17(a)gmail.com> - 2.2-18.20181216git292193b
- Rebuild for updated FreeRDP.
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-03eb748e1d' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------