"At the present time, Microsoft is unaware of any attacks attempting to exploit this blended threat," reads the Microsoft Security Advisory.
"On completion of this investigation, Microsoft will take the appropriate measures to protect our customers.
"This may include providing a solution through a service pack, the monthly update process or an out-of-cycle security update depending on customers' needs."
Microsoft recommends that users avoid the browser or limit its ability to download directly to the desktop.
The flaw was found by vulnerability tester Nitesh Dhanjani and detailed in his blog.
"It is possible for a rogue website to litter the user's Desktop (Windows) or Downloads directory (~/Downloads/ in OSX)," he wrote.
"This can happen because the Safari browser cannot be configured to obtain the user's permission before it downloads a resource. Safari downloads the resource without the user's consent and places it in a default location (unless changed)."