cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2012-4960,https://securityvulnerability.io/vulnerability/CVE-2012-4960,,"The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.",Huawei,"Me60,S7700,E200 Usg5100,E200e-x2,E200x3,S5306,S5300,S9300,S6700,S2300,S5700,Eudemon300,Eudemon Usg9500,Cx600,Ar G3,Nip200,Ne5000e,S3300,Ne80e,Ar 19\/29\/49,E200e-x1,Eudemon1000,Ne40e,Wlan Ac 6605,H3c Ar\(oem In\),Eudemon 8160e,Eudemon Usg5300,E200 Usg2200,Eudemon8000e-x,Ne40,E200e-b,S5300hi,Eudemon Usg9300,Ne80,Atn,S3700,S3300hi,E200e-c,Eudemon200,E200x7,S6300,Nip5100,Svn5000,Nip1000,Ma5200g,Acu,Ne40e\/80e,Ne20,Eudemon 8080e,Ne20e-x6,Eudemon Usg5500,Nip100,Cx300,Svn5300,E200e-usg2100,Svn3000,S2700,Cx200,Eudemon1000e-u,Eudemon100e,Svn2000,Nip2200,E200x5,Nip2100,Eudemon500,Eudemon1000e-x",,,0.0076500000432133675,false,,false,false,false,,,false,false,,2013-06-20T15:00:00.000Z,0