Files
neovim/runtime/lua
Justin M. Keyes 799cbfff85 fix(vim.secure): read() command injection vulnerability #39918
Problem:
Malicious filename can execute code because of ":" cmdline expansion.

Solution:
Use `fnameescape()`.

fix https://github.com/neovim/neovim/issues/39914
2026-05-20 15:27:43 -04:00
..
2026-03-16 10:29:58 +01:00
2025-02-09 18:10:54 +01:00
2026-05-14 13:13:30 -04:00