<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T00:28:16.132412+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/9287e45d-bf1d-4367-8adf-393f4ab3ecce/export</id>
    <title>9287e45d-bf1d-4367-8adf-393f4ab3ecce</title>
    <updated>2026-05-04T00:28:16.529922+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9287e45d-bf1d-4367-8adf-393f4ab3ecce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/1808", "content": "Espressif ESP32: Bypassing Encrypted Secure Boot (CVE-2020-13629) https://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629/ #exploitation #hardware #dukeBarman", "creation_timestamp": "2020-09-29T20:32:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9287e45d-bf1d-4367-8adf-393f4ab3ecce/export"/>
    <published>2020-09-29T20:32:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/30e198ea-cd66-4272-8673-0e6a7d920702/export</id>
    <title>30e198ea-cd66-4272-8673-0e6a7d920702</title>
    <updated>2026-05-04T00:28:16.529836+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "30e198ea-cd66-4272-8673-0e6a7d920702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/haccking/93569", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\n\u0412\u0437\u043b\u043e\u043c ESP32 \u043f\u0443\u0442\u0451\u043c \u043e\u0431\u0445\u043e\u0434\u0430 Secure Boot \u0438 Flash Encryption (CVE-2020-13629)\nhttps://telegra.ph/Vzlom-ESP32-putyom-obhoda-Secure-Boot-i-Flash-Encryption-CVE-2020-13629-11-19", "creation_timestamp": "2020-11-20T16:00:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/30e198ea-cd66-4272-8673-0e6a7d920702/export"/>
    <published>2020-11-20T16:00:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2bed7db0-1702-41f0-9225-dad7146c079f/export</id>
    <title>2bed7db0-1702-41f0-9225-dad7146c079f</title>
    <updated>2026-05-04T00:28:16.529744+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2bed7db0-1702-41f0-9225-dad7146c079f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1795", "content": "#Research\n\"Espressif ESP32 - Bypassing Encrypted Secure Boot (CVE-2020-13629)\".\nhttps://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629\nru:\nhttps://habr.com/ru/company/ruvds/blog/522080", "creation_timestamp": "2020-12-21T03:36:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2bed7db0-1702-41f0-9225-dad7146c079f/export"/>
    <published>2020-12-21T03:36:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0d7898b7-cf0d-4ea2-aa9b-35cb676304b2/export</id>
    <title>0d7898b7-cf0d-4ea2-aa9b-35cb676304b2</title>
    <updated>2026-05-04T00:28:16.529640+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0d7898b7-cf0d-4ea2-aa9b-35cb676304b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/haccking/5647", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\n\u0412\u0437\u043b\u043e\u043c ESP32 \u043f\u0443\u0442\u0451\u043c \u043e\u0431\u0445\u043e\u0434\u0430 Secure Boot \u0438 Flash Encryption (CVE-2020-13629)\nhttps://telegra.ph/Vzlom-ESP32-putyom-obhoda-Secure-Boot-i-Flash-Encryption-CVE-2020-13629-11-19", "creation_timestamp": "2022-02-02T18:52:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0d7898b7-cf0d-4ea2-aa9b-35cb676304b2/export"/>
    <published>2022-02-02T18:52:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a19ffc5e-a723-40c3-a751-5cd869fda1e5/export</id>
    <title>a19ffc5e-a723-40c3-a751-5cd869fda1e5</title>
    <updated>2026-05-04T00:28:16.528291+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a19ffc5e-a723-40c3-a751-5cd869fda1e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2020-13629", "type": "seen", "source": "https://gist.github.com/sankethj/249a775d52cb74d54393c86738922910", "content": "", "creation_timestamp": "2025-10-07T03:56:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a19ffc5e-a723-40c3-a751-5cd869fda1e5/export"/>
    <published>2025-10-07T03:56:54+00:00</published>
  </entry>
</feed>
