Microsoft silently patched this vulnerability (CVE-2019-0887) just last month as part of its July Patch Tuesday updates. Microsoft’s Hyper-V Manager, behind the scenes, uses the same implementation as of Windows Remote Desktop Services to let the host machine connect to a guest virtual machine and share synchronized resources like clipboard data. The Enhanced Session Mode in Microsoft’s Windows built-in RDP Manager also inherits all of the security vulnerabilities reside in Windows RDP, including clipboard hijacking and path-traversal vulnerabilities.
Source: https://thehackernews.com/2019/08/reverse-rdp-windows-hyper-v.html