{"vulnerability": "CVE-2021-22530", "sightings": [{"uuid": "edc6debe-a03b-4976-a540-3f23af5a9724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22530", "type": "seen", "source": "https://t.me/cvedetector/4314", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-22530 - NetIQ Advance Authentication Brute Force API Login Exposure\", \n  \"Content\": \"CVE ID : CVE-2021-22530 \nPublished : Aug. 28, 2024, 7:15 a.m. | 37\u00a0minutes ago \nDescription : A vulnerability identified in NetIQ Advance Authentication that doesn't enforce account lockout when brute force attack is performed on API based login. This issue may lead to user account compromise if successful or may impact server performance. This issue impacts all NetIQ Advance Authentication before 6.3.5.1 \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-28T10:07:02.000000Z"}]}