### [CVE-2020-12406](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2068.9%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2068.9.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2077%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=JavaScript%20type%20confusion%20with%20NativeTypes&color=brighgreen) ### Description Mozilla Developer Iain Ireland discovered a missing type check during unboxed objects removal, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Live-Hack-CVE/CVE-2020-12406