{"vulnerability": "CVE-2025-0142", "sightings": [{"uuid": "d9052b24-0335-42ab-8dea-979978d789c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0142", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lfp5igdsmy2m", "content": "", "creation_timestamp": "2025-01-14T11:28:39.357873Z"}, {"uuid": "5693385c-d63c-426c-aba8-eb48fe355e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0142", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113919014854127924", "content": "", "creation_timestamp": "2025-01-30T19:43:38.290520Z"}, {"uuid": "727dfefb-9e9c-43a6-92b3-54d7dea22a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0142", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgycfzmzpa2r", "content": "", "creation_timestamp": "2025-01-30T20:15:57.725924Z"}, {"uuid": "2016af6e-8b2f-4d57-8f3b-92def4d639f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0142", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgynbk6ejx25", "content": "", "creation_timestamp": "2025-01-30T23:30:17.812438Z"}, {"uuid": "1ff06cae-4cd3-4cd5-a1b1-c0832e20c206", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0142", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113873287621870613", "content": "", "creation_timestamp": "2025-01-22T17:54:36.419967Z"}, {"uuid": "ade21fff-0c14-4bab-a91b-b576b94a11f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0142", "type": "seen", "source": "https://gist.github.com/takitakirumbawoo-netizen/ef7c36cab2564f42de111008f87ff7db", "content": "", "creation_timestamp": "2025-12-31T02:24:12.000000Z"}, {"uuid": "e9c491e4-c989-44be-bce6-623be0aaf117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0142", "type": "seen", "source": "https://t.me/cvedetector/16822", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0142 - Zoom Jenkins Marketplace Clear Text Storage Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-0142 \nPublished : Jan. 30, 2025, 8:15 p.m. | 59\u00a0minutes ago \nDescription : Cleartext storage of sensitive information in the Zoom Jenkins Marketplace plugin before version 1.4 may allow an authenticated user to conduct a disclosure of information via network access. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T22:38:19.000000Z"}]}