Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image
packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html
packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html
packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html
packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html
www.openwall.com/lists/oss-security/2021/05/09/1
www.openwall.com/lists/oss-security/2021/05/10/5
github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031
gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22204.json
hackerone.com/reports/1154542
lists.debian.org/debian-lts-announce/2021/05/msg00018.html
lists.fedoraproject.org/archives/list/[email protected]/message/DDKDLJLBTBBR66OOPXSXCG2PQRM5KCZL/
lists.fedoraproject.org/archives/list/[email protected]/message/F6UOBPU3LSHAPRRJNISNVXZ5DSUIALLV/
lists.fedoraproject.org/archives/list/[email protected]/message/U4RF6PJCJ6NQOVJJJF6HN6BORUQVIXY6/
www.debian.org/security/2021/dsa-4910