An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match.
[
    {
        "source": "https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305",
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2023-32762-1d1a0a9d",
        "target": {
            "file": "src/network/access/qhsts.cpp"
        },
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "198455504285215276206513920714838399588",
                "280746894577215508959761652343184383218",
                "248521215612386692078688414216867720462",
                "66058527147137772403119859541830059642"
            ]
        }
    },
    {
        "source": "https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305",
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2023-32762-65be528c",
        "target": {
            "function": "tst_QHsts::testSTSHeaderParser",
            "file": "tests/auto/network/access/hsts/tst_qhsts.cpp"
        },
        "signature_type": "Function",
        "digest": {
            "length": 3714.0,
            "function_hash": "202253668995713526950139037894621624785"
        }
    }
]