Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| neutrinolabs | xrdp | < 0.10.6 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32107 | 8.8 HIGH | xrdp: Fail-open privilege drop in sesexec — child processes may execute as root if setuid |
| CVE-2026-33145 | 6.3 MEDIUM | xrdp: Authenticated RCE via unsanitized AlternateShell execution in xrdp-sesman |
| CVE-2026-35512 | xrdp: Heap buffer overflow in EGFX channel | |
| CVE-2026-32105 | xrdp: RDP MAC signature (dataSignature) never verified on receive — integrity bypass in no | |
| CVE-2026-32624 | xrdp: Heap buffer overflow in xrdp_sec_process_logon_info() via incorrect g_strncat length | |
| CVE-2026-33689 | xrdp: Pre-authentication out-of-bounds reads in channel parsers | |
| CVE-2026-33516 | xrdp: Pre-authentication out-of-bounds reads in RDP capability and channel parsers |
No comments yet