{"id":14322,"date":"2026-03-06T20:58:30","date_gmt":"2026-03-06T17:58:30","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14322"},"modified":"2026-03-13T13:20:45","modified_gmt":"2026-03-13T10:20:45","slug":"exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/14322\/","title":{"rendered":"ExifTool g\u00fcvenlik a\u00e7\u0131\u011f\u0131: Bir g\u00f6r\u00fcnt\u00fc macOS sistemlerini nas\u0131l etkileyebilir?"},"content":{"rendered":"<p>Bir bilgisayar, sadece bir foto\u011fraf\u0131 i\u015fleyerek k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara bula\u015fabilir mi? \u00d6zellikle de bu bilgisayar, bir\u00e7ok ki\u015finin hala (yanl\u0131\u015f bir \u015fekilde) k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 do\u011fal olarak diren\u00e7li oldu\u011funa inand\u0131\u011f\u0131 bir Mac ise? G\u00f6r\u00fcn\u00fc\u015fe g\u00f6re, ExifTool\u2019un g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunan bir s\u00fcr\u00fcm\u00fcn\u00fc veya bu programa dayal\u0131 olarak geli\u015ftirilmi\u015f bir\u00e7ok uygulamadan birini kullan\u0131yorsan\u0131z, cevap evet. ExifTool, g\u00f6r\u00fcnt\u00fc meta verilerini okumak, yazmak ve d\u00fczenlemek i\u00e7in yayg\u0131n olarak kullan\u0131lan bir a\u00e7\u0131k kaynak \u00e7\u00f6z\u00fcm\u00fcd\u00fcr. Foto\u011fraf\u00e7\u0131lar ve dijital ar\u015fivciler i\u00e7in vazge\u00e7ilmez bir ara\u00e7 olan ExifTool; veri analizi, dijital adli t\u0131p ve ara\u015ft\u0131rmac\u0131 gazetecilik alanlar\u0131nda yayg\u0131n olarak kullan\u0131lmaktad\u0131r.<\/p>\n<p>GReAT uzmanlar\u0131m\u0131z, meta verilerinde yerle\u015fik kabuk komutlar\u0131 i\u00e7eren k\u00f6t\u00fc ama\u00e7l\u0131 g\u00f6r\u00fcnt\u00fc dosyalar\u0131n\u0131n i\u015flenmesi s\u0131ras\u0131nda tetiklenen, <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-3102\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2026-3102<\/a> olarak izlenen kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ke\u015ffettiler. macOS\u2019ta ExifTool\u2019un g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunan bir s\u00fcr\u00fcm\u00fc b\u00f6yle bir dosyay\u0131 i\u015fledi\u011finde, komut y\u00fcr\u00fct\u00fcl\u00fcr. Bu, bir tehdit akt\u00f6r\u00fcn\u00fcn sistemde uzaktaki bir sunucudan y\u00fck indirmek ve \u00e7al\u0131\u015ft\u0131rmak gibi yetkisiz eylemler ger\u00e7ekle\u015ftirmesine olanak tan\u0131r. Bu yaz\u0131da, bu istismar\u0131n nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 ayr\u0131nt\u0131l\u0131 olarak a\u00e7\u0131kl\u0131yor, uygulanabilir savunma \u00f6nerileri sunuyor ve sisteminizin savunmas\u0131z olup olmad\u0131\u011f\u0131n\u0131 nas\u0131l kontrol edebilece\u011finizi anlat\u0131yoruz.<\/p>\n<h2>ExifTool nedir?<\/h2>\n<p><a href=\"https:\/\/exiftool.org\/\" target=\"_blank\" rel=\"noopener nofollow\">ExifTool<\/a>, ni\u015f ama kritik bir ihtiyac\u0131 kar\u015f\u0131layan \u00fccretsiz, a\u00e7\u0131k kaynakl\u0131 bir uygulamad\u0131r; dosyalardan meta verileri \u00e7\u0131kar\u0131r ve hem bu verilerin hem de dosyalar\u0131n kendilerinin i\u015flenmesini sa\u011flar. Meta veriler, bir dosyan\u0131n ana i\u00e7eri\u011fini a\u00e7\u0131klayan veya tamamlayan, <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-remove-metadata\/52913\/\" target=\"_blank\" rel=\"noopener nofollow\">\u00e7o\u011fu modern dosya bi\u00e7imine yerle\u015fik bilgilerdir<\/a>. \u00d6rne\u011fin, bir m\u00fczik par\u00e7as\u0131nda meta veriler sanat\u00e7\u0131n\u0131n ad\u0131, \u015fark\u0131 ad\u0131, t\u00fcr, yay\u0131n y\u0131l\u0131, alb\u00fcm kapa\u011f\u0131 vb. bilgileri i\u00e7erir. Foto\u011fraflar i\u00e7in meta veriler genellikle \u00e7ekim tarihi ve saati, GPS koordinatlar\u0131, ISO ve enstantane h\u0131z\u0131 ayarlar\u0131 ile kamera markas\u0131 ve modelinden olu\u015fur. Ofis belgeleri bile yazar\u0131n ad\u0131, toplam d\u00fczenleme s\u00fcresi ve orijinal olu\u015fturma tarihi gibi meta verileri depolar.<\/p>\n<p>ExifTool, destekledi\u011fi dosya bi\u00e7imlerinin say\u0131s\u0131, i\u015fleme yeteneklerinin derinli\u011fi, do\u011frulu\u011fu ve \u00e7ok y\u00f6nl\u00fcl\u00fc\u011f\u00fc a\u00e7\u0131s\u0131ndan sekt\u00f6r lideridir. Yayg\u0131n kullan\u0131m \u00f6rnekleri \u015funlard\u0131r:<\/p>\n<ul>\n<li>Kaynak dosyalarda yanl\u0131\u015f kaydedilmi\u015f tarihleri d\u00fczeltme<\/li>\n<li>Farkl\u0131 dosya bi\u00e7imleri aras\u0131nda meta verileri ta\u015f\u0131ma (JPG\u2019den PNG\u2019ye vb.)<\/li>\n<li>Profesyonel RAW formatlar\u0131ndan (3FR, ARW veya CR3 gibi) \u00f6nizleme k\u00fc\u00e7\u00fck resimleri \u00e7ekme<\/li>\n<li>FLIR termal g\u00f6r\u00fcnt\u00fcleme, LYTRO \u0131\u015f\u0131k alan\u0131 foto\u011fraflar\u0131 ve DICOM t\u0131bbi g\u00f6r\u00fcnt\u00fcleme dahil olmak \u00fczere ni\u015f formatlardan veri alma<\/li>\n<li>Foto\u011fraf\/video gibi dosyalar\u0131n\u0131 ger\u00e7ek \u00e7ekim zaman\u0131na g\u00f6re yeniden adland\u0131rma ve dosya olu\u015fturma zaman\u0131 ve tarihini buna g\u00f6re senkronize etme<\/li>\n<li>GPS koordinatlar\u0131n\u0131 ayr\u0131 olarak depolanan GPS izleme g\u00fcnl\u00fc\u011f\u00fcyle senkronize ederek bir dosyaya yerle\u015fik hale getirme veya en yak\u0131n yerle\u015fim yerinin ad\u0131n\u0131 ekleme<\/li>\n<\/ul>\n<p>Bu liste uzar gider. ExifTool, hem ba\u011f\u0131ms\u0131z bir komut sat\u0131r\u0131 uygulamas\u0131 hem de a\u00e7\u0131k kaynakl\u0131 bir k\u00fct\u00fcphane olarak mevcuttur, yani kodu genellikle g\u00fc\u00e7l\u00fc, \u00e7ok ama\u00e7l\u0131 ara\u00e7lar\u0131n alt\u0131nda \u00e7al\u0131\u015f\u0131r; \u00f6rnekler aras\u0131nda Exif Photoworker ve MetaScope gibi foto\u011fraf d\u00fczenleme sistemleri veya ImageIngester gibi g\u00f6r\u00fcnt\u00fc i\u015fleme otomasyon ara\u00e7lar\u0131 say\u0131labilir. B\u00fcy\u00fck dijital k\u00fct\u00fcphanelerde, yay\u0131nevlerinde ve g\u00f6r\u00fcnt\u00fc analizi \u015firketlerinde ExifTool, genellikle otomatik modda, \u015firket i\u00e7i uygulamalar ve \u00f6zel komut dosyalar\u0131 taraf\u0131ndan tetiklenerek kullan\u0131l\u0131r.<\/p>\n<h2>CVE-2026-3102 nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/h2>\n<p>Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 istismar etmek i\u00e7in sald\u0131rgan\u0131n belirli bir \u015fekilde bir g\u00f6r\u00fcnt\u00fc dosyas\u0131 olu\u015fturmas\u0131 gerekir. G\u00f6r\u00fcnt\u00fcn\u00fcn kendisi herhangi bir \u015fey olabilirken, istismar meta verilerde yatmaktad\u0131r; \u00f6zellikle DateTimeOriginal alan\u0131 (olu\u015fturulma tarihi ve saati), ge\u00e7ersiz bir bi\u00e7imde kaydedilmelidir. Tarih ve saate ek olarak, bu alan k\u00f6t\u00fc ama\u00e7l\u0131 kabuk komutlar\u0131 i\u00e7ermelidir. ExifTool\u2019un macOS\u2019ta verileri i\u015fleme bi\u00e7imi nedeniyle, bu komutlar yaln\u0131zca iki ko\u015ful yerine getirildi\u011finde \u00e7al\u0131\u015f\u0131r:<\/p>\n<ul>\n<li>Uygulama veya kitapl\u0131k macOS \u00fczerinde \u00e7al\u0131\u015f\u0131rken<\/li>\n<li>-n (veya \u2013printConv) bayra\u011f\u0131 etkinle\u015ftirildi\u011finde. Bu mod, ek i\u015flem yapmadan makine taraf\u0131ndan okunabilir verileri oldu\u011fu gibi \u00e7\u0131kar\u0131r. \u00d6rne\u011fin, -n modunda kamera y\u00f6nelim verileri basit\u00e7e ve a\u00e7\u0131klanamayan bir \u015fekilde \u201calt\u0131\u201d olarak \u00e7\u0131kar\u0131l\u0131rken, ek i\u015flemlerle daha okunabilir hale gelir ve \u201c90 CW d\u00f6nd\u00fcr\u00fclm\u00fc\u015f\u201d olarak g\u00f6sterilir. Bu \u201cinsan taraf\u0131ndan okunabilirlik\u201d, g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n istismar edilmesini \u00f6nler.<\/li>\n<\/ul>\n<p>Hedefli bir sald\u0131r\u0131 i\u00e7in nadir g\u00f6r\u00fclen ancak hi\u00e7bir \u015fekilde fantastik olmayan bir senaryo \u015f\u00f6yle olabilir: bir adli t\u0131p laboratuvar\u0131, bir medya edit\u00f6rl\u00fck ofisi veya yasal veya t\u0131bbi belgeleri i\u015fleyen b\u00fcy\u00fck bir kurulu\u015f, ilgilenilen bir dijital belge al\u0131r. Bu, sansasyonel bir foto\u011fraf veya yasal bir talep olabilir; yem, kurban\u0131n i\u015f alan\u0131na ba\u011fl\u0131d\u0131r. \u015eirkete giren t\u00fcm dosyalar, dijital varl\u0131k y\u00f6netimi (DAM) sistemi arac\u0131l\u0131\u011f\u0131yla s\u0131ralan\u0131r ve kataloglan\u0131r. B\u00fcy\u00fck \u015firketlerde bu i\u015flem otomatikle\u015ftirilebilir; bireyler ve k\u00fc\u00e7\u00fck firmalar ise gerekli yaz\u0131l\u0131m\u0131 manuel olarak \u00e7al\u0131\u015ft\u0131r\u0131r. Her iki durumda da, ExifTool k\u00fct\u00fcphanesi bu yaz\u0131l\u0131m\u0131n alt\u0131nda kullan\u0131lmal\u0131d\u0131r. K\u00f6t\u00fc ama\u00e7l\u0131 foto\u011fraf\u0131n tarihi i\u015flenirken, i\u015flemenin yap\u0131ld\u0131\u011f\u0131 bilgisayara bir Truva at\u0131 veya bilgi h\u0131rs\u0131z\u0131 bula\u015f\u0131r ve bu yaz\u0131l\u0131m, sald\u0131r\u0131ya u\u011frayan cihazda depolanan t\u00fcm de\u011ferli verileri \u00e7alabilir. Bu esnada, sald\u0131r\u0131 g\u00f6rselin meta verilerini kulland\u0131\u011f\u0131ndan ve g\u00f6rselin kendisi zarars\u0131z, tamamen uygun ve kullan\u0131labilir olabilece\u011finden, kurban hi\u00e7bir \u015fey fark etmeyebilir.<\/p>\n<h2>ExifTool g\u00fcvenlik a\u00e7\u0131\u011f\u0131na kar\u015f\u0131 nas\u0131l korunulur?<\/h2>\n<p>GReAT ara\u015ft\u0131rmac\u0131lar\u0131, bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 ExifTool\u2019un yazar\u0131na bildirdi. Yazar, CVE-2026-3102\u2019ye kar\u015f\u0131 dayan\u0131kl\u0131 olan <a href=\"https:\/\/exiftool.org\/\" target=\"_blank\" rel=\"noopener nofollow\">13.50 s\u00fcr\u00fcm\u00fcn\u00fc<\/a> hemen yay\u0131nlad\u0131. 13.49 ve \u00f6nceki s\u00fcr\u00fcmler, bu kusuru gidermek i\u00e7in g\u00fcncellenmelidir.<\/p>\n<p>T\u00fcm foto\u011fraf i\u015fleme i\u015f ak\u0131\u015flar\u0131n\u0131n g\u00fcncellenmi\u015f s\u00fcr\u00fcm\u00fc kulland\u0131\u011f\u0131ndan emin olmak \u00e7ok \u00f6nemlidir. Mac\u2019lerde \u00e7al\u0131\u015fan t\u00fcm varl\u0131k y\u00f6netimi platformlar\u0131n\u0131n, foto\u011fraf d\u00fczenleme uygulamalar\u0131n\u0131n ve toplu g\u00f6r\u00fcnt\u00fc i\u015fleme komut dosyalar\u0131n\u0131n ExifTool s\u00fcr\u00fcm 13.50 veya \u00fcst\u00fcn\u00fc \u00e7a\u011f\u0131rd\u0131\u011f\u0131n\u0131 ve ExifTool kitapl\u0131\u011f\u0131n\u0131n yerle\u015fik bir kopyas\u0131n\u0131 i\u00e7ermedi\u011fini do\u011frulamal\u0131s\u0131n\u0131z.<\/p>\n<p>Do\u011fal olarak, ExifTool da di\u011fer yaz\u0131l\u0131mlar gibi bu t\u00fcr ek g\u00fcvenlik a\u00e7\u0131klar\u0131 i\u00e7erebilir. Savunman\u0131z\u0131 g\u00fc\u00e7lendirmek i\u00e7in a\u015fa\u011f\u0131dakileri de \u00f6neririz:<\/p>\n<ul>\n<li><strong>G\u00fcvenilmeyen dosyalar\u0131n i\u015flenmesini izole edin.<\/strong> \u015e\u00fcpheli kaynaklardan gelen g\u00f6r\u00fcnt\u00fcleri; di\u011fer bilgisayarlara, veri depolama alanlar\u0131na ve a\u011f kaynaklar\u0131na eri\u015fimi s\u0131k\u0131 bir \u015fekilde s\u0131n\u0131rlayarak, \u00f6zel bir makinede veya sanal bir ortamda i\u015fleyin.<\/li>\n<li><strong>Yaz\u0131l\u0131m tedarik zinciri boyunca g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 s\u00fcrekli olarak izleyin. <\/strong>\u0130\u015f ak\u0131\u015flar\u0131nda a\u00e7\u0131k kaynak bile\u015fenlere g\u00fcvenen kurulu\u015flar, <a href=\"https:\/\/www.kaspersky.com\/open-source-feed?icid=de_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___kti____43855f8ca277779d\" target=\"_blank\" rel=\"noopener nofollow\">Open Source Software Threats Data Feed<\/a>\u00a0izleme i\u00e7in kullanabilir.<\/li>\n<\/ul>\n<p>Son olarak, serbest \u00e7al\u0131\u015fanlar veya ba\u011f\u0131ms\u0131z y\u00fcklenicilerle \u00e7al\u0131\u015f\u0131yorsan\u0131z (veya sadece BYOD\u2019ye izin veriyorsan\u0131z), yaln\u0131zca <a href=\"https:\/\/www.kaspersky.com.tr\/mac-antivirus?utm_source=affiliate&amp;icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kism____8b153bbd0ba8bb52\" target=\"_blank\" rel=\"noopener\">kapsaml\u0131 bir macOS g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a> y\u00fcklemi\u015f olanlar\u0131n a\u011f\u0131n\u0131za eri\u015fmesine izin verin.<\/p>\n<blockquote><p>Hala macOS\u2019un g\u00fcvenli oldu\u011funu mu d\u00fc\u015f\u00fcn\u00fcyorsunuz? A\u015fa\u011f\u0131daki yaz\u0131lar\u0131m\u0131zdan di\u011fer Mac tehditleri hakk\u0131nda bilgi edinebilirsiniz:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/banshee-stealer-targets-macos-users\/13135\/\" target=\"_blank\" rel=\"noopener\"><strong>Banshee: macOS kullan\u0131c\u0131lar\u0131n\u0131 hedef alan bir h\u0131rs\u0131zl\u0131k<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/macos-users-cyberthreats-2023\/11932\/\" target=\"_blank\" rel=\"noopener\"><strong>Mac\u2019ler g\u00fcvenli mi? MacOS kullan\u0131c\u0131lar\u0131na y\u00f6nelik tehditler<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/14128\/\" target=\"_blank\" rel=\"noopener\"><strong>Bilgi h\u0131rs\u0131z\u0131 sohbete girdi<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/13376\/\" target=\"_blank\" rel=\"noopener\"><strong>AirBorne: AirPlay\u2019deki g\u00fcvenlik a\u00e7\u0131klar\u0131 \u00fczerinden Apple cihazlar\u0131na sald\u0131r\u0131lar<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/bluetooth-vulnerability-android-ios-macos-linux\/11925\/\" target=\"_blank\" rel=\"noopener\"><strong>Bluetooth g\u00fcvenlik a\u00e7\u0131\u011f\u0131 \u00fczerinden Android, macOS, iOS ve Linux\u2019u hacklemek<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"14326\">\n","protected":false},"excerpt":{"rendered":"<p>Mac&#8217;te g\u00f6r\u00fcnt\u00fc i\u015fleyen herkes i\u00e7in potansiyel bir tehdit olu\u015fturan CVE-2026-3102 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n derinlemesine analizi.<\/p>\n","protected":false},"author":312,"featured_media":14324,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[744,790,519,1170,537,878],"class_list":{"0":"post-14322","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-guvenlik","11":"tag-guvenlik-aciklari","12":"tag-ipuclari-2","13":"tag-macos","14":"tag-tehditler","15":"tag-teknoloji"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/14322\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/30242\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/25319\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/13189\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/30115\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/29013\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/31890\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/30502\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/41398\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/55362\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/23671\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/24782\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/33247\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/30360\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/35999\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102\/35656\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/macos\/","name":"macOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/312"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14322"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14322\/revisions"}],"predecessor-version":[{"id":14349,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14322\/revisions\/14349"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14324"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}