### [CVE-2009-3008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3008) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description K-Meleon 1.5.3 allows context-dependent attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary file: URL after a victim has visited any file: URL, as demonstrated by a visit to a file: document written by the attacker. ### POC #### Reference - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html #### Github No PoCs found on GitHub currently.