Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ransomlook:ransomlook:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ransomlook
Ransomlook ransomlook |
|
| Vendors & Products |
Ransomlook
Ransomlook ransomlook |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RansomLook is a tool to monitor Ransomware groups and markets and extract their victims. Prior to 1.9.0, the API in the affected application improperly filters private location entries in website/web/api/genericapi.py. Because the code removes elements from a list while iterating over it, entries marked as private may be unintentionally retained in API responses, allowing unauthorized disclosure of non-public location information. This vulnerability is fixed in 1.9.0. | |
| Title | RansomLook - Improper Filtering of Private Location Entries in API Endpoints Leads to Information Exposure | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T17:29:55.759Z
Reserved: 2026-04-14T13:24:29.475Z
Link: CVE-2026-40584
Updated: 2026-04-21T17:29:52.286Z
Status : Analyzed
Published: 2026-04-21T17:16:56.240
Modified: 2026-04-27T19:47:38.727
Link: CVE-2026-40584
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:46:06Z