It has become a familiar pattern: A hacker posts exploit code to a security website, and Microsoft follows soon after with a warning to customers.The pattern was repeated again Thursday, only this time Microsoft\u2019s warning that it is investigating "new public reports" of a critical bug in Windows comes more than two months after sample code showing how to take advantage of the flaw was posted to the Web. Microsoft\u2019s advisory can be found here.The flaw that Microsoft warned about is in an ActiveX control (called WebViewFolderIcon) used by the Windows\u2019 graphical user interface software. It was first disclosed on July 18 as part of a monthlong project by hacker HD Moore to expose problems in browser software. Moore\u2019s blog post on the flaw can be found here.Moore called his project the "Month of Browser Bugs" and ended up disclosing a total of 22 Microsoft vulnerabilities during the period.A few days ago, Moore quietly added exploit code for this latest flaw to his Metasploit hacking tool. The exploit caught Microsoft\u2019s attention after it was posted to the milw0rm.com website, Moore said. But the security researcher believes that any competent hacker could have developed an exploit based on his July blog posting.So far, Microsoft has patched only two of Moore\u2019s flaws. In fact, Microsoft engineers haven\u2019t even been able to investigate close to a third of the vulnerabilities, Moore said.Microsoft executives could not immediately be reached for comment, but the company\u2019s security advisory said this latest WebViewFolderIcon bug will be patched on Oct. 10."We have been in contact with HD Moore and at this time our investigations have revealed that most issues relating to Internet Explorer in particular will result in the browser closing unexpectedly," Microsoft\u2019s public relations agency said Thursday in a statement. "Because of their nature, most of these issues will more likely be resolved through a service pack release rather than a security update." Microsoft has been busy this month, rushing out an emergency, "out-of-cycle" fix for a flaw in Internet Explorer\u2019s vector markup language (VML) rendering engine that was being widely exploited by attackers. Microsoft has even more work ahead of it, according to Moore. In early August, he handed Microsoft another 70 bugs that he had not publicly disclosed. Still, he believes that more of his flaws should have been fixed by now."I was kind of amused that they would do an out-of-cycle patch for the VML bug, but would let all of these lapse," he said.Microsoft has told him that at least four of his bugs are "exploitable issues," meaning that an attacker could take advantage of them to run unauthorized software on a victim\u2019s computer, Moore said.Earlier this week, Symantec said that Microsoft was the slowest of the major browser makers at patching its bugs during the first half of this year. But according to Symantec\u2019s numbers, Microsoft patched IE bugs, on average, nine days after the public disclosure of a flaw. Most of the 22 Month of Browser Bugs flaws have been in public for two months now.-Robert McMillan, IDG News Service (San Francisco Bureau)Related Links:\n\nCritical IE Bug Gets Early Fix from Microsoft\n\nZERT Patches IE Zeroday Flaw Before Microsoft\n\nMicrosoft Expects to Release Only 3 Patches in Sept.\n\nSymantec: Browser Bugs Rampant in \u201906This article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in.Check out our CIO News Alerts and Tech Informer pages for more updated news coverage.