Vulnerabilities associated with implementing virtualization

What are vulnerabilities associated with implementing virtualization? What is the likelihood for each vulnerability that it could be exploited? What strategies/methods can be used to mitigate the risks for virtualization?    

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS