xrdp is vulnrerable to arbitrary code execution. The xrdp-sesman service can be crashed via a buffer overflow by connecting over port 3350 and supplying a malicious payload, potentially resulting in arbitrary code execution.
lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html
github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c
github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1
github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4
lists.debian.org/debian-lts-announce/2020/08/msg00015.html
security-tracker.debian.org/tracker/CVE-2020-4044
www.debian.org/security/2020/dsa-4737