Files
neovim/runtime/lua/vim
Justin M. Keyes 799cbfff85 fix(vim.secure): read() command injection vulnerability #39918
Problem:
Malicious filename can execute code because of ":" cmdline expansion.

Solution:
Use `fnameescape()`.

fix https://github.com/neovim/neovim/issues/39914
2026-05-20 15:27:43 -04:00
..
2026-04-30 07:26:40 -04:00
2026-05-10 11:03:15 -04:00
2026-05-18 11:20:18 +02:00
2026-01-09 10:07:15 +01:00
2026-05-11 16:51:58 +08:00
2026-05-10 11:03:15 -04:00
2026-05-14 13:13:30 -04:00
2026-05-18 11:20:18 +02:00