Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in FreeRDP ausnutzen, um potenziell beliebigen Code auszuführen, einen Denial-of-Service-Zustand herbeizuführen, Speicherbeschädigungen zu verursachen, Daten zu manipulieren oder vertrauliche Informationen offenzulegen.
[UPDATE] [hoch] FreeRDP: Mehrere Schwachstellen
Inhalt
Verknuepfte CVEs
| CVE-ID | Severity (CVE.org) | CVSS (CVE.org) | EPSS | EPSS-% | Veroeffentlicht (CVE.org) |
|---|---|---|---|---|---|
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - |
Externe Referenzen
| Bezeichnung | Typ | CVE | Quelle |
|---|---|---|---|
Oracle Linux Security Advisory ELSA-2026-6340 vom 2026-04-01 |
EXTERNAL | - | wid_csaf |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
Amazon Linux Security Advisory ALAS2-2026-3221 vom 2026-04-01 |
EXTERNAL | - | wid_csaf |
Amazon Linux Security Advisory ALAS2-2026-3239 vom 2026-04-14 |
EXTERNAL | - | wid_csaf |
Fedora Security Advisory FEDORA-2026-07418A381F vom 2026-03-26 |
EXTERNAL | - | wid_csaf |
Fedora Security Advisory FEDORA-2026-2C1AB5B23B vom 2026-03-16 |
EXTERNAL | - | wid_csaf |
Fedora Security Advisory FEDORA-2026-34886ABFAD vom 2026-03-16 |
EXTERNAL | - | wid_csaf |
Fedora Security Advisory FEDORA-2026-AAE50DC427 vom 2026-03-16 |
EXTERNAL | - | wid_csaf |
Fedora Security Advisory FEDORA-2026-BF4C5BB9C5 vom 2026-03-16 |
EXTERNAL | - | wid_csaf |
Rocky Linux Security Advisory RLSA-2026:16019 vom 2026-05-13 |
EXTERNAL | - | wid_csaf |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
Oracle Linux Security Advisory ELSA-2026-16014 vom 2026-05-11 |
EXTERNAL | - | wid_csaf |
Oracle Linux Security Advisory ELSA-2026-16019 vom 2026-05-12 |
EXTERNAL | - | wid_csaf |
Oracle Linux Security Advisory ELSA-2026-16482 vom 2026-05-13 |
EXTERNAL | - | wid_csaf |
Oracle Linux Security Advisory ELSA-2026-6799 vom 2026-04-08 |
EXTERNAL | - | wid_csaf |
Oracle Linux Security Advisory ELSA-2026-6918 vom 2026-04-08 |
EXTERNAL | - | wid_csaf |
openSUSE Security Update OPENSUSE-SU-2026:10459-1 vom 2026-04-01 |
EXTERNAL | - | wid_csaf |
openSUSE Security Update OPENSUSE-SU-2026:20657-1 vom 2026-05-04 |
EXTERNAL | - | wid_csaf |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf |
Quellen-Details
| Bezeichnung | Name | Kategorie | Tags | Zielgruppe | Sprache | Feed-URL |
|---|---|---|---|---|---|---|
| CERT-Bund (BSI) | government_cert | - | de | https://wid.cert-bund.de/content/public/securityAdvisory/rss |