cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-24914,https://securityvulnerability.io/vulnerability/CVE-2024-24914,Alert: Injection Vulnerability Affecting Gaia Users through Special HTTP Requests,"This vulnerability allows authenticated users of the Check Point Gaia software to inject malicious code or commands into the system through the manipulation of global variables via specially crafted HTTP requests. Such exploitation could lead to unauthorized actions within the application, making it critical for users to apply the available security fix to safeguard their systems. For further details on mitigations, refer to the official support documentation.",Checkpoint,"Clusterxl, Multi-domain Security Management, Quantum Appliances, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, Quantum Security Management",8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-11-07T11:25:53.238Z,0 CVE-2023-28130,https://securityvulnerability.io/vulnerability/CVE-2023-28130,Privilege Escalation Vulnerability in Check Point Gaia Portal,"A local user can exploit a vulnerability in the Check Point Gaia Portal's hostnames page, potentially leading to unauthorized privilege escalation. This weakness enables attackers to execute commands at elevated levels, compromising system integrity and security. Administrators are advised to review this issue promptly and apply necessary patches to mitigate risks associated with this flaw.",Checkpoint,"Quantum Appliances, Quantum Security Gateways",7.2,HIGH,0.0007900000200606883,false,false,false,false,,false,false,2023-07-26T11:15:00.000Z,0 CVE-2019-8462,https://securityvulnerability.io/vulnerability/CVE-2019-8462,,"In a rare scenario, Check Point R80.30 Security Gateway before JHF Take 50 managed by Check Point R80.30 Management crashes with a unique configuration of enhanced logging.",Checkpoint,Check Point Security Gateway,7.5,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2019-10-02T16:37:41.000Z,0 CVE-2014-8950,https://securityvulnerability.io/vulnerability/CVE-2014-8950,,"Unspecified vulnerability in Check Point Security Gateway R77 and R77.10, when the (1) URL Filtering or (2) Identity Awareness blade is used, allows remote attackers to cause a denial of service (crash) via vectors involving an HTTPS request.",Checkpoint,Security Gateway,,,0.006940000224858522,false,false,false,false,,false,false,2014-11-16T17:00:00.000Z,0 CVE-2014-8951,https://securityvulnerability.io/vulnerability/CVE-2014-8951,,"Unspecified vulnerability in Check Point Security Gateway R75, R76, R77, and R77.10, when UserCheck is enabled and the (1) Application Control, (2) URL Filtering, (3) DLP, (4) Threat Emulation, (5) Anti-Bot, or (6) Anti-Virus blade is used, allows remote attackers to cause a denial of service (fwk0 process crash, core dump, and restart) via a redirect to the UserCheck page.",Checkpoint,Security Gateway,,,0.006850000005215406,false,false,false,false,,false,false,2014-11-16T17:00:00.000Z,0 CVE-2014-8952,https://securityvulnerability.io/vulnerability/CVE-2014-8952,,"Multiple unspecified vulnerabilities in Check Point Security Gateway R75.40VS, R75.45, R75.46, R75.47, R76, R77, and R77.10, when the (1) IPS blade, (2) IPsec Remote Access, (3) Mobile Access / SSL VPN blade, (4) SSL Network Extender, (5) Identify Awareness blade, (6) HTTPS Inspection, (7) UserCheck, or (8) Data Leak Prevention blade module is enabled, allow remote attackers to cause a denial of service (""stability issue"") via an unspecified ""traffic condition.""",Checkpoint,Security Gateway,,,0.006850000005215406,false,false,false,false,,false,false,2014-11-16T17:00:00.000Z,0 CVE-2013-7350,https://securityvulnerability.io/vulnerability/CVE-2013-7350,,"Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to ""important security fixes.""",Checkpoint,Security Gateway,,,0.002589999930933118,false,false,false,false,,false,false,2014-04-01T06:35:00.000Z,0 CVE-2014-1672,https://securityvulnerability.io/vulnerability/CVE-2014-1672,,"Check Point R75.47 Security Gateway and Management Server does not properly enforce Anti-Spoofing when the routing table is modified and the ""Get - Interfaces with Topology"" action is performed, which allows attackers to bypass intended access restrictions.",Checkpoint,"Management Server,Security Gateway",,,0.0013899999903514981,false,false,false,false,,false,false,2014-01-26T01:00:00.000Z,0