{"vulnerability": "CVE-2024-11075", "sightings": [{"uuid": "310df65e-28d9-4b18-9e3a-fdff1dcce62f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11075", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113509822295421769", "content": "", "creation_timestamp": "2024-11-19T13:20:35.662054Z"}, {"uuid": "a6b8c6fa-56fb-4c2e-8036-68b0c073dcc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11075", "type": "seen", "source": "https://t.me/cvedetector/11451", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11075 - Docker Docker Images Privilege Escalation in Incoming Goods Suite\", \n  \"Content\": \"CVE ID : CVE-2024-11075 \nPublished : Nov. 19, 2024, 2:15 p.m. | 37\u00a0minutes ago \nDescription : A vulnerability in the Incoming Goods Suite allows a user with unprivileged access to the underlying system (e.g. local or via SSH) a privilege escalation to the administrative level due to the usage of component vendor Docker images running with root permissions. Exploiting this misconfiguration leads to the fact that an attacker can gain administrative control. over the whole system. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T15:58:25.000000Z"}]}