A recently identified Internet Explorer security hole is now being exploited, and Microsoft hopes to include a fix for it in its April 11 patch or maybe even earlier, according to a posting on a Microsoft blog. So far, attacks are limited in scope, Stephen Toulouse, head of Microsoft\u2019s Security Response Center, wrote on the center\u2019s blog on Saturday.The vulnerability, first identified last week before actually being exploited, allows hackers to entice Web surfers to visit websites where malicious code can then be automatically run on the visitor\u2019s computer. It exploits a vulnerability in the way that IE renders HTML and affects Windows 2000, Windows XP and Windows Server 2003, Toulouse said. Users of IE7 Beta 2, the most recent version of IE, won\u2019t be affected by the bug, Microsoft said. "We\u2019re working day and night on development of a cumulative security update for Internet Explorer that addresses the vulnerability," Toulouse wrote. The update is currently being tested and is expected to be released as part of Microsoft\u2019s already scheduled April 11 security update, he said. However, Microsoft could release the fix earlier if the threat grows, he said.Microsoft is working with industry partners and law enforcement to remove websites that are already exploiting the vulnerability, he said. Web surfers can avoid the attack by turning off Active Scripting, Microsoft said. Check out Toulouse\u2019s blog posting as well as additional tips for how to prevent being targeted by such attacks.The vulnerability is the third such IE bug to surface within the past two weeks and is considered the most serious because it is relatively easy to exploit.-Nancy Gohring, IDG News ServiceFor related coverage, read Eolas Changes to Go Widespread With Next IE Update and Microsoft Warns of Nasty IE Bug.This article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in.Check out our CIO News Alerts and Tech Informer pages for more updated news coverage.