{
  "type": "bundle",
  "id": "bundle--ca04292c-6885-49ca-9aeb-2d869e2e69a4",
  "objects": [
    {
      "type": "report",
      "spec_version": "2.1",
      "id": "report--f68e5076-943c-4949-9650-aa59081c979b",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "Microsoft security advisory \u2013 April 2026 monthly rollup (AV26-352) - Update 1",
      "description": "Included were critical updates for the following products: .NET 10.0 installed on Linux .NET 10.0 installed on Mac OS .NET 10.0 installed on Windows .NET 8.0 installed on Linux .NET 8.0 installed on Mac OS .NET 8.0 installed on Windows .NET 9.0 installed on Linux .NET 9.0 installed on Mac OS .NET 9.0 installed on Windows Azure Logic Apps Azure Monitor Agent Microsoft .NET Framework Microsoft .NET Framework 3.5 AND 4.8.1 Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Microsoft 365 Apps for Enterprise...",
      "published": "2026-04-17T19:53:33.000Z",
      "report_types": [
        "threat-report"
      ],
      "object_refs": [
        "vulnerability--113763fc-1f37-4a00-92d3-c168b5b8fd22",
        "vulnerability--3679ae83-7892-42e5-849b-dc0f2dd0ec55",
        "attack-pattern--f4143686-5830-48da-b05b-34f59854367c"
      ],
      "external_references": [
        {
          "source_name": "Canadian Centre for Cyber Security",
          "url": "https://cyber.gc.ca/en/alerts-advisories/microsoft-security-advisory-april-2026-monthly-rollup-av26-352",
          "description": "Microsoft security advisory \u2013 April 2026 monthly rollup (AV26-352) - Update 1"
        }
      ],
      "labels": [
        "Technology"
      ]
    },
    {
      "type": "vulnerability",
      "spec_version": "2.1",
      "id": "vulnerability--113763fc-1f37-4a00-92d3-c168b5b8fd22",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "CVE-2026-32201",
      "external_references": [
        {
          "source_name": "cve",
          "external_id": "CVE-2026-32201",
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32201"
        }
      ]
    },
    {
      "type": "vulnerability",
      "spec_version": "2.1",
      "id": "vulnerability--3679ae83-7892-42e5-849b-dc0f2dd0ec55",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "CVE-2026-33825",
      "external_references": [
        {
          "source_name": "cve",
          "external_id": "CVE-2026-33825",
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33825"
        }
      ]
    },
    {
      "type": "attack-pattern",
      "spec_version": "2.1",
      "id": "attack-pattern--f4143686-5830-48da-b05b-34f59854367c",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "Command and Scripting Interpreter",
      "external_references": [
        {
          "source_name": "mitre-attack",
          "external_id": "T1059",
          "url": "https://attack.mitre.org/techniques/T1059/"
        }
      ],
      "kill_chain_phases": [
        {
          "kill_chain_name": "mitre-attack",
          "phase_name": "execution"
        }
      ]
    }
  ]
}