{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T05:36:58.949","vulnerabilities":[{"cve":{"id":"CVE-2024-39917","sourceIdentifier":"security-advisories@github.com","published":"2024-07-12T16:15:04.620","lastModified":"2025-11-03T20:16:26.580","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"xrdp is an open source RDP server. xrdp versions prior to 0.10.0 have a vulnerability that allows attackers to make an infinite number of login attempts. The number of max login attempts is supposed to be  limited by a configuration parameter `MaxLoginRetry` in `/etc/xrdp/sesman.ini`. However, this mechanism was not effectively working. As a result, xrdp allows an infinite number of login attempts. "},{"lang":"es","value":"xrdp es un servidor RDP de código abierto. Las versiones de xrdp anteriores a la 0.10.0 tienen una vulnerabilidad que permite a los atacantes realizar una cantidad infinita de intentos de inicio de sesión. Se supone que el número máximo de intentos de inicio de sesión está limitado por un parámetro de configuración `MaxLoginRetry` en `/etc/xrdp/sesman.ini`. Sin embargo, este mecanismo no estaba funcionando eficazmente. Como resultado, xrdp permite una cantidad infinita de intentos de inicio de sesión."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-307"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-307"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:*","versionEndExcluding":"0.10.0","matchCriteriaId":"86B81D51-A16A-41F1-8DD4-AA5BCDBC72BB"}]}]}],"references":[{"url":"https://github.com/neutrinolabs/xrdp/commit/19c111c74c913ecc6e4ba9a738ed929a79d2ae8f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7w22-h4w7-8j5j","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/neutrinolabs/xrdp/commit/19c111c74c913ecc6e4ba9a738ed929a79d2ae8f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7w22-h4w7-8j5j","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00018.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}