Microsofts Internet Explorer isnt the only Web browser with serious security issues.
Mozilla on Sept. 15 shipped a "highly critical" Firefox update to correct a range of security flaws that could lead to security bypass, cross-site scripting, spoofing, denial-of-service and system access attacks.
The open-source group patched a total of seven vulnerabilities in its flagship browser and warned that the majority of the flaws could be exploited to run attacker code without any user interaction beyond normal Web browsing.
Since releasing Firefox 1.5 in November 2005, Mozilla has patched 59 security vulnerabilities in the browser, more than half rated by the company as "critical."
The browser refresh also fixes a crash that presents evidence of memory corruption, an auto-update compromise through DNS and SSL spoofing, and a signature forgery issue that allows malicious hackers to forge SSL certificates.
In addition, it fixes several time-dependent errors during text display that can be exploited to corrupt memory.
The company also shipped a new version of the Thunderbird mail client to provide patches for six security bugs that could cause man-in-the-middle attacks, security restrictions bypass and system compromise attacks.
A "highly critical" update was also issued for the Mozilla SeaMonkey suite to correct a range of spoofing, denial-of-service and system access vulnerabilities.
The updates come just weeks after Mozilla announced the hiring of former Microsoft security strategist Window Snyder as its new quality control czar. Snyder, who was responsible for security sign-off for Microsofts Windows XP Service Pack 2 and Windows Server 2003, will spearhead Mozillas security strategy.