weaver Exploited Vulnerabilities