curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
https://www.oracle.com//security-alerts/cpujul2021.html
https://security.netapp.com/advisory/ntap-20210521-0007/
https://security.gentoo.org/glsa/202105-36
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://hackerone.com/reports/1101882
https://curl.se/docs/CVE-2021-22876.html
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf