4c strategies Exonaut Vulnerabilities