Microsoft threat watch

Security Update Guide, advisories, and patch watch.

Vendor watch hub

What this page covers

The Microsoftwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Microsoft activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

973

Active

926

Featured

947

Unique CVEs

20

Most recent entry

May 1, 2026, 3:01 AM

Feed refreshes daily · 5:15 a.m. Central

Sources·Microsoft Security Update Guide (MSRC), CISA KEV, and NVD

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Microsoft watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption (CVE-2026-31533)

critical
activeVendor advisoryCVE-2026-31533

Information published. Information published.

May 1, 2026, 3:01 AMOfficial source

Chromium: CVE-2026-7355 Use after free in Media (CVE-2026-7355)

activeVendor advisoryCVE-2026-7355

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7340 Integer overflow in ANGLE (CVE-2026-7340)

activeVendor advisoryCVE-2026-7340

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7339 Heap buffer overflow in WebRTC (CVE-2026-7339)

activeVendor advisoryCVE-2026-7339

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7341 Use after free in WebRTC (CVE-2026-7341)

activeVendor advisoryCVE-2026-7341

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7338 Use after free in Cast (CVE-2026-7338)

activeVendor advisoryCVE-2026-7338

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7345 Insufficient validation of untrusted input in Feedback (CVE-2026-7345)

activeVendor advisoryCVE-2026-7345

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7346 Inappropriate implementation in Tint (CVE-2026-7346)

activeVendor advisoryCVE-2026-7346

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7347 Use after free in Chromoting (CVE-2026-7347)

activeVendor advisoryCVE-2026-7347

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7337 Type Confusion in V8 (CVE-2026-7337)

activeVendor advisoryCVE-2026-7337

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7336 Use after free in WebRTC (CVE-2026-7336)

activeVendor advisoryCVE-2026-7336

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7335 Use after free in media (CVE-2026-7335)

activeVendor advisoryCVE-2026-7335

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7348 Use after free in Codecs (CVE-2026-7348)

activeVendor advisoryCVE-2026-7348

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7349 Use after free in Cast (CVE-2026-7349)

activeVendor advisoryCVE-2026-7349

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7350 Use after free in WebMIDI (CVE-2026-7350)

activeVendor advisoryCVE-2026-7350

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7351 Race in MHTML (CVE-2026-7351)

activeVendor advisoryCVE-2026-7351

Information published.

May 1, 2026, 2:16 AMOfficial source

Chromium: CVE-2026-7353 Heap buffer overflow in Skia (CVE-2026-7353)

activeVendor advisoryCVE-2026-7353

Information published.

May 1, 2026, 2:15 AMOfficial source

Chromium: CVE-2026-7354 Out of bounds read and write in Angle (CVE-2026-7354)

activeVendor advisoryCVE-2026-7354

Information published.

May 1, 2026, 2:15 AMOfficial source

Chromium: CVE-2026-7356 Use after free in Navigation (CVE-2026-7356)

activeVendor advisoryCVE-2026-7356

Information published.

May 1, 2026, 2:15 AMOfficial source

Chromium: CVE-2026-7357 Use after free in GPU (CVE-2026-7357)

activeVendor advisoryCVE-2026-7357

Information published.

May 1, 2026, 2:15 AMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Microsoft threat watch page?

It is the Microsoft-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Microsoft watch page?

Use it to confirm whether current Microsoft issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Microsoft security issues?

Yes. ITECS can help map Microsoft advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.