Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2664-1 | curl security update |
Debian DSA |
DSA-4881-1 | curl security update |
EUVD |
EUVD-2021-10011 | curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request. |
Ubuntu USN |
USN-4898-1 | curl vulnerabilities |
Ubuntu USN |
USN-4903-1 | curl vulnerability |
Mon, 09 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-06-09T14:54:59.891Z
Reserved: 2021-01-06T00:00:00.000Z
Link: CVE-2021-22876
Updated: 2024-08-03T18:51:07.627Z
Status : Modified
Published: 2021-04-01T18:15:12.823
Modified: 2025-06-09T15:15:23.067
Link: CVE-2021-22876
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN