![]() This may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege. COM classes are not handled appropriately. ![]() See VMSA-2019-0002 for further information. The Common Vulnerabilities and Exposures project () has assigned the identifier CVE-2019-5511 to this issue. This may allow the path to the VMX executable, on a Windows host, to be hijacked by a non-administrator leading to elevation of privilege.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |