Multiple vulnerabilities were identified in VMware products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege and remote code execution on the targeted system.
Copyright @2025 The University of Hong Kong. All Rights Reserved.