Credit: Tookapic / Insspirito It has become a familiar pattern: A hacker posts exploit code to a security website, and Microsoft follows soon after with a warning to customers.The pattern was repeated again Thursday, only this time Microsoft’s warning that it is investigating “new public reports” of a critical bug in Windows comes more than two months after sample code showing how to take advantage of the flaw was posted to the Web. Microsoft’s advisory can be found here.The flaw that Microsoft warned about is in an ActiveX control (called WebViewFolderIcon) used by the Windows’ graphical user interface software. It was first disclosed on July 18 as part of a monthlong project by hacker HD Moore to expose problems in browser software. Moore’s blog post on the flaw can be found here.Moore called his project the “Month of Browser Bugs” and ended up disclosing a total of 22 Microsoft vulnerabilities during the period. A few days ago, Moore quietly added exploit code for this latest flaw to his Metasploit hacking tool. The exploit caught Microsoft’s attention after it was posted to the milw0rm.com website, Moore said. But the security researcher believes that any competent hacker could have developed an exploit based on his July blog posting.So far, Microsoft has patched only two of Moore’s flaws. In fact, Microsoft engineers haven’t even been able to investigate close to a third of the vulnerabilities, Moore said. Microsoft executives could not immediately be reached for comment, but the company’s security advisory said this latest WebViewFolderIcon bug will be patched on Oct. 10.“We have been in contact with HD Moore and at this time our investigations have revealed that most issues relating to Internet Explorer in particular will result in the browser closing unexpectedly,” Microsoft’s public relations agency said Thursday in a statement. “Because of their nature, most of these issues will more likely be resolved through a service pack release rather than a security update.” Microsoft has been busy this month, rushing out an emergency, “out-of-cycle” fix for a flaw in Internet Explorer’s vector markup language (VML) rendering engine that was being widely exploited by attackers. Microsoft has even more work ahead of it, according to Moore. In early August, he handed Microsoft another 70 bugs that he had not publicly disclosed. Still, he believes that more of his flaws should have been fixed by now.“I was kind of amused that they would do an out-of-cycle patch for the VML bug, but would let all of these lapse,” he said. Microsoft has told him that at least four of his bugs are “exploitable issues,” meaning that an attacker could take advantage of them to run unauthorized software on a victim’s computer, Moore said.Earlier this week, Symantec said that Microsoft was the slowest of the major browser makers at patching its bugs during the first half of this year. But according to Symantec’s numbers, Microsoft patched IE bugs, on average, nine days after the public disclosure of a flaw. Most of the 22 Month of Browser Bugs flaws have been in public for two months now.-Robert McMillan, IDG News Service (San Francisco Bureau) Related Links: Critical IE Bug Gets Early Fix from Microsoft ZERT Patches IE Zeroday Flaw Before Microsoft Microsoft Expects to Release Only 3 Patches in Sept. Symantec: Browser Bugs Rampant in ’06This article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in.Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Sponsored by Huawei Beyond gigabit: the need for 10 Gbps in business networks Interview with Liu Jianning, Vice President of Huawei's Data Communication Marketing & Solutions Sales Dept By CIO Online Staff Nov 30, 2023 9 mins Cloud Architecture Networking brandpost Sponsored by SAP Generative AI’s ‘show me the money’ moment We’re past the hype and slick gen AI sales pitches. Business leaders want results. By Julia White Nov 30, 2023 5 mins Artificial Intelligence brandpost Sponsored by Zscaler How customers capture real economic value with zero trust Unleashing economic value: Zscaler's Zero Trust Exchange transforms security architecture while cutting costs. By Zscaler Nov 30, 2023 4 mins Security brandpost Sponsored by SAP A cloud-based solution to rescue millions from energy poverty Aware of the correlation between energy and financial poverty, Savannah Energy is helping to generate clean, competitively priced electricity across Africa by integrating its old systems into one cloud-based platform. By Keith E. Greenberg, SAP Contributor Nov 30, 2023 5 mins Digital Transformation Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe