-
Marc Cornellà authored
The `omz_urldecode` function uses an eval to decode the input which can be exploited to inject commands. This is used only in the svn plugin and it requires a complex process to exploit, so it is highly unlikely to have been used by an attacker.
Name |
Last commit
|
Last update |
---|---|---|
.github | ||
cache | ||
custom | ||
lib | ||
log | ||
plugins | ||
templates | ||
themes | ||
tools | ||
.editorconfig | ||
.gitignore | ||
.gitpod.Dockerfile | ||
.gitpod.yml | ||
CODE_OF_CONDUCT.md | ||
CONTRIBUTING.md | ||
LICENSE.txt | ||
README.md | ||
SECURITY.md | ||
oh-my-zsh.sh |