Security Advisories (2)
CVE-2022-23935 (2022-01-25)

lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\|$/ check, leading to command injection.

CVE-2021-22204 (2021-04-23)

Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image

NAME

Image::ExifTool::QuickTime - Extract embedded information from movie data

SYNOPSIS

These routines are autoloaded by Image::ExifTool::QuickTime.

DESCRIPTION

This file contains routines used by Image::ExifTool to extract embedded information like GPS tracks from MOV and MP4 movie data.

AUTHOR

Copyright 2003-2018, Phil Harvey (phil at owl.phy.queensu.ca)

This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.

REFERENCES

Lhttps://developer.apple.com/library/content/documentation/QuickTime/QTFF/QTFFChap3/qtff3.html#//apple_ref/doc/uid/TP40000939-CH205-SW130>
http://sergei.nz/files/nvtk_mp42gpx.py
https://forum.flitsservice.nl/dashcam-info/dod-ls460w-gps-data-uit-mov-bestand-lezen-t87926.html

SEE ALSO

Image::ExifTool::QuickTime(3pm), "QuickTime Stream Tags" in Image::ExifTool::TagNames, "GoPro GPMF Tags" in Image::ExifTool::TagNames, "Sony rtmd Tags" in Image::ExifTool::TagNames, Image::ExifTool(3pm)