A.
Improper management of VM instances, causing customer VMs to be commingled with other customer systems.
B.
Looping within virtualized routing systems.
C.
Lack of vulnerability management standards.
D.
Using a compromised VM to exploit a hypervisor, used to take control of other VMs.
E.
Instability in VM patch management causing VM routing errors.