{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifapckwz4tt7ab7ce2quf63wmwduiymqxw7sb5jyi6swr3nswqcfq",
    "uri": "at://did:plc:isx5m6wiqw7ljr7tlrnkukux/app.bsky.feed.post/3mgi3divdfi72"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiczlyt6blpsnl5be2dzgrs7q5mzzxup6csz6xcd553mmyp4udts2e"
    },
    "mimeType": "image/webp",
    "size": 11322
  },
  "path": "/critical-exiftool-macos-vulnerability-cve-2026-3102/",
  "publishedAt": "2026-03-07T00:25:00.000Z",
  "site": "https://www.tech2geek.net",
  "tags": [
    "Cybersecurity",
    "MacOS",
    "CVE-2026-3102",
    "digital forensics security",
    "EXIF security risk",
    "ExifTool mac exploit",
    "ExifTool vulnerability",
    "Homebrew update exiftool",
    "image metadata attack",
    "Kaspersky GReAT",
    "macOS cybersecurity",
    "macOS security flaw",
    "metadata command injection",
    "Phil Harvey ExifTool"
  ],
  "textContent": "Critical ExifTool macOS vulnerability (CVE-2026-3102) allows command execution via image metadata. Learn how to update and secure your system now.",
  "title": "Critical ExifTool macOS Vulnerability (CVE-2026-3102)"
}