X
Thinta lapha ukuze uye kuveshini yamakhalekhukhwini kusayithi.

Isithangami Sabeseki

Lolu chungechunge lwabekwa kunqolobane. Uyacelwa ubuze umbuzo omusha uma udinga usizo.

For the past two months our PCI compliance test has noted "BEAST (Browser Exploit Against SSL/TLS) Vulnerability" and SSLv2 cryptographic weaknesses.

Kuphostiwe

Is this a settings issue that I can resolve?

Is this a settings issue that I can resolve?

Eminye Imininingwane Yohlelo

Fakela amapulagi

  • The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
  • Shockwave Flash 11.4 r402
  • Google Update
  • NPRuntime Script Plug-in Library for Java(TM) Deploy
  • iTunes Detector Plug-in
  • Adobe Shockwave for Director Netscape plug-in, version 11.6.6.636
  • Adobe PDF Plug-In For Firefox and Netscape "9.5.2"
  • Adobe PDF Plug-In For Firefox and Netscape 10.1.4
  • Windows Activation Technologies Plugin for Mozilla
  • 4.1.10329.0
  • Motive Management Plug-in for Mozilla Browsers
  • Plug-in for detecting Nero Kwik Media.
  • Adobe Shockwave for Director Netscape plug-in, version 11.6.1.629
  • NPWLPG
  • The plug-in allows you to open and edit files using Microsoft Office applications
  • Office Authorization plug-in for NPAPI browsers
  • np-mswmp

Isisebenziso

  • I-ejenti Engumsebenzisi: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0

Eminye Imininingwane

cor-el
  • Top 10 Contributor
  • Moderator
17416 izisombululo 157343 izimpendulo
Kuphostiwe

SSL2 is no longer supported in current Firefox version AFAIK.

See also:

  • bug 665814 - (CVE-2011-3389) Rizzo/Duong chosen plaintext attack (BEAST) on SSL/TLS 1.0 (facilitated by websockets -76)

Maybe try to ask advice at a security related forum.

SSL2 is no longer supported in current Firefox version AFAIK. *[https://bugzilla.mozilla.org/show_bug.cgi?id=593077 bug 593077] - Remove SSL 2.0 support See also: *[https://bugzilla.mozilla.org/show_bug.cgi?id=665814 bug 665814] - (CVE-2011-3389) Rizzo/Duong chosen plaintext attack (BEAST) on SSL/TLS 1.0 (facilitated by websockets -76) Maybe try to ask advice at a security related forum. *http://www.mozilla.org/about/forums/#dev-security