four-faith Exploited Vulnerabilities