How could an attacker exploit the vulnerability? An attacker would have to convince a user to visit a malicious website, typically via an enticement in email or instant message, or by getting them to open an email attachment. What is the attack vector for this vulnerability? The attack vector is address bar spoofing. A malicious website could spoof the contents of a URL bar via a specially crafted HTML page's long URL and then use it for a phishing attack.
<a href="https://www.linkedin.com/in/kirtikumar-anandrao-ramchandani-ba949b153">Kirtikumar Anandrao Ramchandani</a>