Files
neovim/test/functional
Justin M. Keyes 799cbfff85 fix(vim.secure): read() command injection vulnerability #39918
Problem:
Malicious filename can execute code because of ":" cmdline expansion.

Solution:
Use `fnameescape()`.

fix https://github.com/neovim/neovim/issues/39914
2026-05-20 15:27:43 -04:00
..
2026-05-17 10:02:12 -04:00
2026-05-07 10:36:48 +02:00
2026-04-25 11:16:18 -04:00