Mozilla Firefox 16 was released yesterday and addresses numerous security vulnerabilities, most of which are rated as critical.
The new version of Firefox was accompanied by 14 security advisories. Eleven of those are rated as critical and some of them cover more than one vulnerability.
Many of the critical security holes that were addressed in Firefox 16 could have allowed attackers to execute arbitrary code on the system, bypass security checks that prevent web pages from interacting with the browser in unauthorised ways, perform spoofing or clickjacking attacks, and, in the case of the Android version of Firefox, allow a malicious web page opened in reader mode to gain the browser's permissions on the OS.
The other three security advisories were rated as medium severity and covered vulnerabilities that could have allowed attackers to execute cross-site scripting (XSS) or script injection attacks.
Most of the vulnerabilities fixed in Firefox 16, were also addressed in Mozilla Thunderbird 16 and Mozilla SeaMonkey 2.13 which were also released. Some of the fixes have also been backported to the Firefox and Thunderbird ESR (Extended Support Release) versions that are used in enterprise environments.