Safety vulnerability ID: 42316
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
Latest version: 1.3.12
A web interface to access GNU Mailman v3 archives
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application