X
點擊此處開啟此網站的行動版。

技術支援討論區

For the past two months our PCI compliance test has noted "BEAST (Browser Exploit Against SSL/TLS) Vulnerability" and SSLv2 cryptographic weaknesses.

已張貼

Is this a settings issue that I can resolve?

Is this a settings issue that I can resolve?

額外的系統細節

已安裝的外掛程式

  • The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
  • Shockwave Flash 11.4 r402
  • Google Update
  • NPRuntime Script Plug-in Library for Java(TM) Deploy
  • iTunes Detector Plug-in
  • Adobe Shockwave for Director Netscape plug-in, version 11.6.6.636
  • Adobe PDF Plug-In For Firefox and Netscape "9.5.2"
  • Adobe PDF Plug-In For Firefox and Netscape 10.1.4
  • Windows Activation Technologies Plugin for Mozilla
  • 4.1.10329.0
  • Motive Management Plug-in for Mozilla Browsers
  • Plug-in for detecting Nero Kwik Media.
  • Adobe Shockwave for Director Netscape plug-in, version 11.6.1.629
  • NPWLPG
  • The plug-in allows you to open and edit files using Microsoft Office applications
  • Office Authorization plug-in for NPAPI browsers
  • np-mswmp

應用程式

  • User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0

更多資訊

cor-el
  • Top 10 Contributor
  • Moderator
17467 個解決方法 157845 個答案

SSL2 is no longer supported in current Firefox version AFAIK.

See also:

  • bug 665814 - (CVE-2011-3389) Rizzo/Duong chosen plaintext attack (BEAST) on SSL/TLS 1.0 (facilitated by websockets -76)

Maybe try to ask advice at a security related forum.

SSL2 is no longer supported in current Firefox version AFAIK. *[https://bugzilla.mozilla.org/show_bug.cgi?id=593077 bug 593077] - Remove SSL 2.0 support See also: *[https://bugzilla.mozilla.org/show_bug.cgi?id=665814 bug 665814] - (CVE-2011-3389) Rizzo/Duong chosen plaintext attack (BEAST) on SSL/TLS 1.0 (facilitated by websockets -76) Maybe try to ask advice at a security related forum. *http://www.mozilla.org/about/forums/#dev-security