<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 00:28:15 +0000</lastBuildDate>
    <item>
      <title>9287e45d-bf1d-4367-8adf-393f4ab3ecce</title>
      <link>https://db.gcve.eu/sighting/9287e45d-bf1d-4367-8adf-393f4ab3ecce/export</link>
      <description>{"uuid": "9287e45d-bf1d-4367-8adf-393f4ab3ecce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/1808", "content": "Espressif ESP32: Bypassing Encrypted Secure Boot (CVE-2020-13629) https://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629/ #exploitation #hardware #dukeBarman", "creation_timestamp": "2020-09-29T20:32:27.000000Z"}</description>
      <content:encoded>{"uuid": "9287e45d-bf1d-4367-8adf-393f4ab3ecce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/1808", "content": "Espressif ESP32: Bypassing Encrypted Secure Boot (CVE-2020-13629) https://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629/ #exploitation #hardware #dukeBarman", "creation_timestamp": "2020-09-29T20:32:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9287e45d-bf1d-4367-8adf-393f4ab3ecce/export</guid>
      <pubDate>Tue, 29 Sep 2020 20:32:27 +0000</pubDate>
    </item>
    <item>
      <title>30e198ea-cd66-4272-8673-0e6a7d920702</title>
      <link>https://db.gcve.eu/sighting/30e198ea-cd66-4272-8673-0e6a7d920702/export</link>
      <description>{"uuid": "30e198ea-cd66-4272-8673-0e6a7d920702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/haccking/93569", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\n\u0412\u0437\u043b\u043e\u043c ESP32 \u043f\u0443\u0442\u0451\u043c \u043e\u0431\u0445\u043e\u0434\u0430 Secure Boot \u0438 Flash Encryption (CVE-2020-13629)\nhttps://telegra.ph/Vzlom-ESP32-putyom-obhoda-Secure-Boot-i-Flash-Encryption-CVE-2020-13629-11-19", "creation_timestamp": "2020-11-20T16:00:38.000000Z"}</description>
      <content:encoded>{"uuid": "30e198ea-cd66-4272-8673-0e6a7d920702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/haccking/93569", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\n\u0412\u0437\u043b\u043e\u043c ESP32 \u043f\u0443\u0442\u0451\u043c \u043e\u0431\u0445\u043e\u0434\u0430 Secure Boot \u0438 Flash Encryption (CVE-2020-13629)\nhttps://telegra.ph/Vzlom-ESP32-putyom-obhoda-Secure-Boot-i-Flash-Encryption-CVE-2020-13629-11-19", "creation_timestamp": "2020-11-20T16:00:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/30e198ea-cd66-4272-8673-0e6a7d920702/export</guid>
      <pubDate>Fri, 20 Nov 2020 16:00:38 +0000</pubDate>
    </item>
    <item>
      <title>2bed7db0-1702-41f0-9225-dad7146c079f</title>
      <link>https://db.gcve.eu/sighting/2bed7db0-1702-41f0-9225-dad7146c079f/export</link>
      <description>{"uuid": "2bed7db0-1702-41f0-9225-dad7146c079f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1795", "content": "#Research\n\"Espressif ESP32 - Bypassing Encrypted Secure Boot (CVE-2020-13629)\".\nhttps://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629\nru:\nhttps://habr.com/ru/company/ruvds/blog/522080", "creation_timestamp": "2020-12-21T03:36:45.000000Z"}</description>
      <content:encoded>{"uuid": "2bed7db0-1702-41f0-9225-dad7146c079f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1795", "content": "#Research\n\"Espressif ESP32 - Bypassing Encrypted Secure Boot (CVE-2020-13629)\".\nhttps://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629\nru:\nhttps://habr.com/ru/company/ruvds/blog/522080", "creation_timestamp": "2020-12-21T03:36:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2bed7db0-1702-41f0-9225-dad7146c079f/export</guid>
      <pubDate>Mon, 21 Dec 2020 03:36:45 +0000</pubDate>
    </item>
    <item>
      <title>0d7898b7-cf0d-4ea2-aa9b-35cb676304b2</title>
      <link>https://db.gcve.eu/sighting/0d7898b7-cf0d-4ea2-aa9b-35cb676304b2/export</link>
      <description>{"uuid": "0d7898b7-cf0d-4ea2-aa9b-35cb676304b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/haccking/5647", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\n\u0412\u0437\u043b\u043e\u043c ESP32 \u043f\u0443\u0442\u0451\u043c \u043e\u0431\u0445\u043e\u0434\u0430 Secure Boot \u0438 Flash Encryption (CVE-2020-13629)\nhttps://telegra.ph/Vzlom-ESP32-putyom-obhoda-Secure-Boot-i-Flash-Encryption-CVE-2020-13629-11-19", "creation_timestamp": "2022-02-02T18:52:22.000000Z"}</description>
      <content:encoded>{"uuid": "0d7898b7-cf0d-4ea2-aa9b-35cb676304b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13629", "type": "published-proof-of-concept", "source": "https://t.me/haccking/5647", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\n\u0412\u0437\u043b\u043e\u043c ESP32 \u043f\u0443\u0442\u0451\u043c \u043e\u0431\u0445\u043e\u0434\u0430 Secure Boot \u0438 Flash Encryption (CVE-2020-13629)\nhttps://telegra.ph/Vzlom-ESP32-putyom-obhoda-Secure-Boot-i-Flash-Encryption-CVE-2020-13629-11-19", "creation_timestamp": "2022-02-02T18:52:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0d7898b7-cf0d-4ea2-aa9b-35cb676304b2/export</guid>
      <pubDate>Wed, 02 Feb 2022 18:52:22 +0000</pubDate>
    </item>
    <item>
      <title>a19ffc5e-a723-40c3-a751-5cd869fda1e5</title>
      <link>https://db.gcve.eu/sighting/a19ffc5e-a723-40c3-a751-5cd869fda1e5/export</link>
      <description>{"uuid": "a19ffc5e-a723-40c3-a751-5cd869fda1e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2020-13629", "type": "seen", "source": "https://gist.github.com/sankethj/249a775d52cb74d54393c86738922910", "content": "", "creation_timestamp": "2025-10-07T03:56:54.000000Z"}</description>
      <content:encoded>{"uuid": "a19ffc5e-a723-40c3-a751-5cd869fda1e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2020-13629", "type": "seen", "source": "https://gist.github.com/sankethj/249a775d52cb74d54393c86738922910", "content": "", "creation_timestamp": "2025-10-07T03:56:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a19ffc5e-a723-40c3-a751-5cd869fda1e5/export</guid>
      <pubDate>Tue, 07 Oct 2025 03:56:54 +0000</pubDate>
    </item>
  </channel>
</rss>
