{"uuid": "2ef9c79d-e802-47c4-91e0-877764d9abd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3512", "type": "seen", "source": "https://t.me/cvedetector/22724", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3512 - Qt QTextMarkdownImporter Heap-based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-3512 \nPublished : April 11, 2025, 8:15 a.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : There is a Heap-based Buffer Overflow vulnerability in QTextMarkdownImporter. This requires an incorrectly formatted markdown file to be passed to QTextMarkdownImporter to trigger the overflow.This issue affects Qt from 6.8.0 to 6.8.4. Versions up to 6.6.0 are known to be unaffected, and the fix is in 6.8.4 and later. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T12:16:16.000000Z"}