net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption (CVE-2026-31533)
criticalInformation published. Information published.
Vendor watch hub
The Microsoftwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.
At a glance
Tracked
Active
Featured
Unique CVEs
Most recent entry
May 1, 2026, 3:01 AM
Feed refreshes daily · 5:15 a.m. Central
Sources·Microsoft Security Update Guide (MSRC), CISA KEV, and NVD
"Most recent entry" is the newest item the upstream feed has published — not our sync time.
Watch items
Showing the 20 most recent items, newest first. Each row links to the official advisory.
20 rows · sorted newest first
Operations viewInformation published. Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
Information published.
| Alert | Exposure | Status | Published | Source |
|---|---|---|---|---|
net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption (CVE-2026-31533)Information published. Information published. Mariner | criticalCVE-2026-31533 Critical | active | May 1, 2026, 3:01 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7355 Use after free in Media (CVE-2026-7355)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7355 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7340 Integer overflow in ANGLE (CVE-2026-7340)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7340 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7339 Heap buffer overflow in WebRTC (CVE-2026-7339)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7339 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7341 Use after free in WebRTC (CVE-2026-7341)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7341 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7338 Use after free in Cast (CVE-2026-7338)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7338 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7345 Insufficient validation of untrusted input in Feedback (CVE-2026-7345)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7345 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7346 Inappropriate implementation in Tint (CVE-2026-7346)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7346 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7347 Use after free in Chromoting (CVE-2026-7347)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7347 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7337 Type Confusion in V8 (CVE-2026-7337)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7337 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7336 Use after free in WebRTC (CVE-2026-7336)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7336 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7335 Use after free in media (CVE-2026-7335)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7335 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7348 Use after free in Codecs (CVE-2026-7348)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7348 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7349 Use after free in Cast (CVE-2026-7349)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7349 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7350 Use after free in WebMIDI (CVE-2026-7350)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7350 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7351 Race in MHTML (CVE-2026-7351)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7351 Elevated | active | May 1, 2026, 2:16 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7353 Heap buffer overflow in Skia (CVE-2026-7353)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7353 Elevated | active | May 1, 2026, 2:15 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7354 Out of bounds read and write in Angle (CVE-2026-7354)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7354 Elevated | active | May 1, 2026, 2:15 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7356 Use after free in Navigation (CVE-2026-7356)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7356 Elevated | active | May 1, 2026, 2:15 AM | Vendor advisoryOpen source |
Chromium: CVE-2026-7357 Use after free in GPU (CVE-2026-7357)Information published. Microsoft Edge (Chromium-based) | CVE-2026-7357 Elevated | active | May 1, 2026, 2:15 AM | Vendor advisoryOpen source |
ITECS response pathways
These pathways connect the vendor watch feed into service-owner resources that already carry commercial authority.
Use the microsoft 365 consulting pathway when this vendor alert needs an ITECS-managed response plan.
Connect the vendor watch page to broader managed detection, response, and governance planning.
Translate current watch items into a faster risk snapshot and prioritized remediation plan.
Return to the hub for cross-vendor prioritization, live filtering, and broader MSP threat context.
Vendor watch FAQ
It is the Microsoft-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.
Use it to confirm whether current Microsoft issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.
Yes. ITECS can help map Microsoft advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.