{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-34194","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2025-11-04T18:14:41.403Z","dateReserved":"2023-05-30T00:00:00.000Z","datePublished":"2023-12-13T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-01-12T02:06:22.795Z"},"descriptions":[{"lang":"en","value":"StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\\0' located after whitespace."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://sourceforge.net/p/tinyxml/git/ci/master/tree/tinyxmlparser.cpp"},{"url":"https://www.forescout.com/resources/sierra21-vulnerabilities"},{"name":"[debian-lts-announce] 20231230 [SECURITY] [DLA 3701-1] tinyxml security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00024.html"},{"name":"FEDORA-2024-80e6578a01","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QCR5PIOBGDIDS6SYRESTMDJSEDFSCOE/"},{"name":"FEDORA-2024-c9dc0ac419","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HOMBSHRIW5Q34SQSXYURYAOYDZD2NQF6/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://sourceforge.net/p/tinyxml/git/ci/master/tree/tinyxmlparser.cpp","tags":["x_transferred"]},{"url":"https://www.forescout.com/resources/sierra21-vulnerabilities","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20231230 [SECURITY] [DLA 3701-1] tinyxml security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00024.html"},{"name":"FEDORA-2024-80e6578a01","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QCR5PIOBGDIDS6SYRESTMDJSEDFSCOE/"},{"name":"FEDORA-2024-c9dc0ac419","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HOMBSHRIW5Q34SQSXYURYAOYDZD2NQF6/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOMBSHRIW5Q34SQSXYURYAOYDZD2NQF6/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QCR5PIOBGDIDS6SYRESTMDJSEDFSCOE/"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T18:14:41.403Z"}}]}}