{"id":"CVE-2021-44540","details":"A vulnerability was found in Privoxy which was fixed in get_url_spec_param() by freeing memory of compiled pattern spec before bailing.","modified":"2026-03-14T08:24:06.638687Z","published":"2021-12-23T20:15:11.940Z","related":["MGASA-2021-0570","openSUSE-SU-2021:1646-1","openSUSE-SU-2022:10186-1","openSUSE-SU-2024:11677-1"],"references":[{"type":"WEB","url":"https://www.privoxy.org/3.0.33/user-manual/whatsnew.html%2C"},{"type":"WEB","url":"https://www.privoxy.org/gitweb/?p=privoxy.git%3Ba=commit%3Bh=652b4b7cb0"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.33"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-44540.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}