{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T14:34:07.323","vulnerabilities":[{"cve":{"id":"CVE-2014-8951","sourceIdentifier":"cve@mitre.org","published":"2014-11-16T17:59:07.020","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Check Point Security Gateway R75, R76, R77, and R77.10, when UserCheck is enabled and the (1) Application Control, (2) URL Filtering, (3) DLP, (4) Threat Emulation, (5) Anti-Bot, or (6) Anti-Virus blade is used, allows remote attackers to cause a denial of service (fwk0 process crash, core dump, and restart) via a redirect to the UserCheck page."},{"lang":"es","value":"Una vulnerabilidad sin especificar en Check Point Security Gateway R75, R76, R77, y R77.10, cuando el UserCheck está activado y (1) Application Control, (2) URL Filtering, (3) DLP, (4) Threat Emulation, (5) Anti-Bot, o (6) Anti-Virus blade está en uso, permite a atacantes remotos provocar una denegación de servicio (caída del proceso fwk0, volcado de memoria y reinicio) a través de una redirección a la página de UserCheck."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:security_gateway:r75:*:*:*:*:*:*:*","matchCriteriaId":"1A489A6D-EB07-42CD-A831-4BFFC131DB57"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:security_gateway:r76:*:*:*:*:*:*:*","matchCriteriaId":"7A76290E-924C-46CC-ABD5-B4AB193A7E5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:security_gateway:r77:*:*:*:*:*:*:*","matchCriteriaId":"11B8D136-7127-444F-BB8C-196A76AC764A"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:security_gateway:r77.10:*:*:*:*:*:*:*","matchCriteriaId":"6BCFFDF7-6382-40A0-A078-759EE09B0252"}]}]}],"references":[{"url":"http://secunia.com/advisories/58487","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/67993","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98761","source":"cve@mitre.org"},{"url":"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk100505","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/58487","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/67993","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98761","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk100505","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}