. "The vulnerability could be exploited by malicious attacker by getting an authenticated user to click on specially-crafted links embedded within an email, web page or other source." . . . .