![]() ![]()
“Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image” ( src CVE-2021-22204) It is remarkable, that even the most simple tool, like exiftool seems to have (had?) a serious security problem: PERL IMAGE EXIFTOOL DATE MODIFIED HOW TOGNU Linux (Debian 10) – how to show and remove all (privacy intrusive) meta Exif meta info from jpg png tiff bmp pictures and now even mp4! :) Volunteer computing / World Community Grid / WCG.Virtualization / KVM / VirtualBox / xenserver.USV / UPS / Power / PowerSupply / Energie.Space / Cosmos / Kosmos / Galaxy / Galaxie / Weltall.raspberry / carambola / atmel / embedded linux.Propaganda / FakeNews / InfoWars / InformationWarfare.project management / project planing / git.Privacy Protection / Datenschutz / DSGVO / GDPR.Privacy / convenience vs surveillance / Orwell.Photographie / Photography / Pictures / Pics.Innovation / Civilisation / Zivilisation / Culture.gute nachrichten / good news / positive news. PERL IMAGE EXIFTOOL DATE MODIFIED FREE
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |