{"id":"CVE-2021-44541","details":"A vulnerability was found in Privoxy which was fixed in process_encrypted_request_headers() by freeing header memory when failing to get the request destination.","modified":"2026-03-13T05:17:30.056907Z","published":"2021-12-23T20:15:11.990Z","related":["MGASA-2021-0570","openSUSE-SU-2021:1646-1","openSUSE-SU-2022:10186-1","openSUSE-SU-2024:11677-1"],"references":[{"type":"WEB","url":"https://www.privoxy.org/3.0.33/user-manual/whatsnew.html%2C"},{"type":"WEB","url":"https://www.privoxy.org/gitweb/?p=privoxy.git%3Ba=commit%3Bh=652b4b7cb0"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-44541.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.33"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}