{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiffbfxdccwf2nxkwwxv74bi75xi46e2wxkd7c2hiwjkoe5sith3iu",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mkm7wga6wa42"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiabv25im2mknzalhruyz435coxv3aaiy2bqc5zw647t6sa27mwoq4"
},
"mimeType": "image/webp",
"size": 19476
},
"path": "/microsoft-patches-windows-shell-flaw-after-reports-of-active-exploitation/",
"publishedAt": "2026-04-28T17:24:31.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Microsoft patches Windows Shell flaw after reports of active exploitation",
"VPN Central"
],
"textContent": "Microsoft has confirmed that a Windows Shell vulnerability tracked as CVE-2026-32202 has been exploited in the wild. The flaw affects the way Windows handles certain malicious shortcut files and can expose sensitive authentication data over a network. The issue is tied to an earlier Windows Shell security bypass, CVE-2026-21510, which Microsoft patched in February 2026. […]\n\nThe post Microsoft patches Windows Shell flaw after reports of active exploitation appeared first on VPN Central.",
"title": "Microsoft patches Windows Shell flaw after reports of active exploitation"
}