{"vulnerability": "CVE-2025-46674", "sightings": [{"uuid": "c60cb47d-803d-4786-9421-91efff7680d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46674", "type": "seen", "source": "https://t.me/cvedetector/23815", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46674 - NASA CryptoLib Cryptographic Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46674 \nPublished : April 27, 2025, 1:15 a.m. | 56\u00a0minutes ago \nDescription : NASA CryptoLib before 1.3.2 uses Extended Procedures that are a Work in Progress (not intended for use during flight), potentially leading to a keystream oracle. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-27T04:37:17.000000Z"}, {"uuid": "416b31a5-8a44-4058-a5a3-3a5404f997e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46674", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114407408963291150", "content": "", "creation_timestamp": "2025-04-27T01:48:41.302166Z"}, {"uuid": "f6b5a0ec-2b1f-4ec4-afe0-096ffd2a6981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46674", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnrd32im6b2b", "content": "", "creation_timestamp": "2025-04-27T03:35:31.074289Z"}, {"uuid": "2d978a32-d057-4e8e-8592-93e1c8f69fcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46674", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13590", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46674\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L)\n\ud83d\udd39 Description: NASA CryptoLib before 1.3.2 uses Extended Procedures that are a Work in Progress (not intended for use during flight), potentially leading to a keystream oracle.\n\ud83d\udccf Published: 2025-04-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-27T00:49:46.138Z\n\ud83d\udd17 References:\n1. https://securitybynature.fr/post/hacking-cryptolib/\n2. https://github.com/nasa/CryptoLib/compare/v1.3.1...v1.3.2\n3. https://github.com/nasa/CryptoLib/pull/365", "creation_timestamp": "2025-04-27T01:08:29.000000Z"}]}