In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.
https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html