Unless I'm misreading, you're suggesting potential exploits involving :
1. disconnecting physical network interfaces
2. gaining administrative access to the nova database
Our report taxonomy is not based on feelings and user impressions, but rather on the feasibility of exploiting a bug weighed against its implied risks.
Unless I'm misreading, you're suggesting potential exploits involving :
1. disconnecting physical network interfaces
2. gaining administrative access to the nova database
Our report taxonomy is not based on feelings and user impressions, but rather on the feasibility of exploiting a bug weighed against its implied risks.