Information securityfromSecurityWeek1 day agoMetInfo, Weaver E-cology Vulnerabilities in Attackers' CrosshairsThreat actors exploit critical vulnerabilities in MetInfo and Weaver E-cology for remote code execution without authentication.