For the Logjam vulnerability with most Firefox based browsers.

For the Logjam vulnerability follow the steps below.

  1. Type about:config into the address bar and enter.
  2. Click the ‘I’ll be careful, I promise’ button.
  3. Type security.ssl3.dhe_rsa_aes_128_sha into the search bar.
  4. Double click the preference name that appears and change the value from true to false.
  5. Type security.ssl3.dhe_rsa_aes_256_sha into the search bar.
  6. Double click the preference name that appears and change the value from true to false.

https://www.ssllabs.com/ssltest/viewMyClient.html (This test shows the ‘browser to be vulnerable to Logjam’ after the config changes.)
https://weakdh.org/ (This test shows ‘Good News! Your browser is safe against the Logjam attack’ after the config changes.)
Edit note: Due to the conflicting results above when using CID version 26, I can’t vouch for their accuracy. ???

Warning notes:
These config changes may have no effect when using standard user accounts on some systems.

Kind regards.

Edit: I have been informed that the above suggestion fails to work with some versions, so I will do some further testing tomorrow.
Apologies for any inconvenience this has caused.

When using CID version 37 Beta with the above config changes, the results from the two testing sites no longer conflict with each other.