Mozilla has updated Firefox to patch 14 vulnerabilities, three of them critical. However, the company has still failed to fix several flaws.

Firefox and Firefox, which originally were to be released last Wednesday, were delayed to patch a series of bugs, including some disclosed this month by Polish researcher Michal Zelewski. Two others forwarded to Mozilla developers by Zelewski, however, didn't make it into Friday's updates.

"Neither of those will make this release," said Daniel Veditz, of the Mozilla security. "It is important that we get the security fixes we have into the hands of our users."

Of the bugs filed by Zelewski but not fixed in the updates, the most serious is a memory corruption flaw that could let attackers inject code remotely into Firefox-equipped machines simply by duping users into visiting a malicious web page. "Firefox is susceptible to a seemingly pretty nasty, and apparently easily exploitable, memory corruption vulnerability," wrote Zelewski on Bugzilla.

Security vendor Symantec agreed. "Successfully exploiting this issue may allow remote attackers to execute arbitrary machine code in the context of the affected application. This could facilitate the remote compromise of affected computers," it reported in an alert sent to subscribers to its DeepSight threat system. US-CERT, the federally funded vulnerability monitoring center, has also issued a warning, and recommended that Firefox users disable JavaScript.

Also unrepaired in the latest browser versions is a third Zelewski-discovered bug that could give cybercriminals a leg up when running phishing attacks.

Mozilla spelled out the security fixes in Firefox and

Firefox is nearly at the end of its supported lifespan. After 24 April, Mozilla will stop issuing security and stability updates to that edition.

Firefox can be downloaded from the Mozilla Web site in versions for Windows, Mac OS X and Linux in 36 languages. Users can also update current editions with the Check for Updates command in the Help menu.