{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiffbfxdccwf2nxkwwxv74bi75xi46e2wxkd7c2hiwjkoe5sith3iu",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mkm7wga6wa42"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiabv25im2mknzalhruyz435coxv3aaiy2bqc5zw647t6sa27mwoq4"
    },
    "mimeType": "image/webp",
    "size": 19476
  },
  "path": "/microsoft-patches-windows-shell-flaw-after-reports-of-active-exploitation/",
  "publishedAt": "2026-04-28T17:24:31.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Microsoft patches Windows Shell flaw after reports of active exploitation",
    "VPN Central"
  ],
  "textContent": "Microsoft has confirmed that a Windows Shell vulnerability tracked as CVE-2026-32202 has been exploited in the wild. The flaw affects the way Windows handles certain malicious shortcut files and can expose sensitive authentication data over a network. The issue is tied to an earlier Windows Shell security bypass, CVE-2026-21510, which Microsoft patched in February 2026. […]\n\nThe post Microsoft patches Windows Shell flaw after reports of active exploitation appeared first on VPN Central.",
  "title": "Microsoft patches Windows Shell flaw after reports of active exploitation"
}