### [CVE-2020-12399](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2068.9%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2068.9.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2077%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Timing%20attack%20on%20DSA%20signatures%20in%20NSS%20library&color=brighgreen) ### Description NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon