4c strategies %5bobject Object%5d Vulnerabilities