code stringlengths 14 2.05k | label int64 0 1 | programming_language stringclasses 7 values | cwe_id stringlengths 6 14 | cwe_name stringlengths 5 98 ⌀ | description stringlengths 36 379 ⌀ | url stringlengths 36 48 ⌀ | label_name stringclasses 2 values |
|---|---|---|---|---|---|---|---|
{replAllMrk:t,replAllPos:q};A.isCellEditable(O)&&(A.model.setValue(O,M(T,n,I.value,q-n.length,A.getCurrentCellStyle(O))),z++)}L!=b.currentPage&&b.editor.graph.model.execute(new SelectPage(b,L));mxUtils.write(R,mxResources.get("matchesRepl",[z]))}catch(V){b.handleError(V)}finally{A.getModel().endUpdate(),b.editor.graph.setSelectionCells(m),b.editor.graph.rendering=!0}t++});C.setAttribute("title",mxResources.get("replaceAll"));C.style.float="none";C.style.width="120px";C.style.marginTop="6px";C.style.marginLeft= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
var PopupDialog=function(b,e,f,c,k){k=null!=k?k:!0;var l=document.createElement("div");l.style.textAlign="left";l.style.height="100%";mxUtils.write(l,mxResources.get("fileOpenLocation"));mxUtils.br(l);mxUtils.br(l);var u=mxUtils.button(mxResources.get("openInThisWindow"),function(){k&&b.hideDialog();null!=c&&c()});u.className="geBtn";u.style.marginBottom="8px";u.style.width="280px";l.appendChild(u);mxUtils.br(l);var x=mxUtils.button(mxResources.get("openInNewWindow"),function(){k&&b.hideDialog();
null!=f&&f();b.openLink(e,null,!0)});x.className="geBtn gePrimaryBtn";x.style.width=u.style.width;l.appendChild(x);mxUtils.br(l);mxUtils.br(l);mxUtils.write(l,mxResources.get("allowPopups"));this.container=l},ImageDialog=function(b,e,f,c,k,l,u,x){function E(){0<K.value.length?v.removeAttribute("disabled"):v.setAttribute("disabled","disabled")}l=null!=l?l:!0;var D=b.editor.graph,A=document.createElement("div");mxUtils.write(A,e);e=document.createElement("div");e.className="geTitle";e.style.backgroundColor= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxDualRuler.prototype.setUnit=function(b){this.vRuler.setUnit(b);this.hRuler.setUnit(b)};mxDualRuler.prototype.setStyle=function(b){this.vRuler.setStyle(b);this.hRuler.setStyle(b)};mxDualRuler.prototype.destroy=function(){this.vRuler.destroy();this.hRuler.destroy();this.ui.refresh=this.editorUiRefresh;mxGuide.prototype.move=this.origGuideMove;mxGuide.prototype.destroy=this.origGuideDestroy;this.ui.getDiagramContainerOffset=this.editorUiGetDiagContOffset};function mxFreehand(b){var e=null!=b.view&&null!=b.view.canvas?b.view.canvas.ownerSVGElement:null;if(null!=b.container&&null!=e){b.addListener(mxEvent.ESCAPE,mxUtils.bind(this,function(){this.stopDrawing()}));var f=mxFreehand.prototype.NORMAL_SMOOTHING,c=null,k=[],l,u=[],x,E=!1,D=!0,A=!0,K=!0,H=!0,d=[],g=!1,n=!1,q=!1,t={size:5,thinning:.5,smoothing:.5,streamline:.5,start:{taper:0,cap:!0},end:{taper:0,cap:!0}},v=!0;this.setClosedPath=function(P){E=P};this.setAutoClose=function(P){D=P};this.setAutoInsert= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g(B)}}),g)};EditorUi.prototype.getDatabaseItemKeys=function(d,g,n){this.openDatabase(mxUtils.bind(this,function(q){try{n=n||"objects";var t=q.transaction([n],"readonly").objectStore(n).getAllKeys();t.onsuccess=function(){d(t.result)};t.onerror=g}catch(v){null!=g&&g(v)}}),g)};EditorUi.prototype.commentsSupported=function(){var d=this.getCurrentFile();return null!=d?d.commentsSupported():!1};EditorUi.prototype.commentsRefreshNeeded=function(){var d=this.getCurrentFile();return null!=d?d.commentsRefreshNeeded():
!0};EditorUi.prototype.commentsSaveNeeded=function(){var d=this.getCurrentFile();return null!=d?d.commentsSaveNeeded():!1};EditorUi.prototype.getComments=function(d,g){var n=this.getCurrentFile();null!=n?n.getComments(d,g):d([])};EditorUi.prototype.addComment=function(d,g,n){var q=this.getCurrentFile();null!=q?q.addComment(d,g,n):g(Date.now())};EditorUi.prototype.canReplyToReplies=function(){var d=this.getCurrentFile();return null!=d?d.canReplyToReplies():!0};EditorUi.prototype.canComment=function(){var d= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
m.prototype.lineTo=function(W,V){this.passThrough?this.originalLineTo.apply(this.canvas,arguments):(this.addOp(this.lineOp,W,V),this.lastX=W,this.lastY=V)};m.prototype.moveTo=function(W,V){this.passThrough?this.originalMoveTo.apply(this.canvas,arguments):(this.addOp(this.moveOp,W,V),this.lastX=W,this.lastY=V,this.firstX=W,this.firstY=V)};m.prototype.close=function(){this.passThrough?this.originalClose.apply(this.canvas,arguments):this.addOp(this.closeOp)};m.prototype.quadTo=function(W,V,Q,X){this.passThrough? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(G){this.diagramContainer.style.width="10px";this.diagramContainer.style.height="10px";this.diagramContainer.style.border="";this.bottomResizer.style.visibility="hidden";this.rightResizer.style.visibility="hidden";g.style.visibility="hidden";d.style.visibility="hidden";n.style.display="none"}));this.windowResized=mxUtils.bind(this,function(){});this.inlineSizeChanged()};EditorUi.prototype.installImagePasteHandler=function(){if(!mxClient.IS_IE){var d=this.editor.graph;d.container.addEventListener("paste",
mxUtils.bind(this,function(g){if(!mxEvent.isConsumed(g))try{for(var n=g.clipboardData||g.originalEvent.clipboardData,q=!1,t=0;t<n.types.length;t++)if("text/"===n.types[t].substring(0,5)){q=!0;break}if(!q){var v=n.items;for(index in v){var B=v[index];if("file"===B.kind){if(d.isEditing())this.importFiles([B.getAsFile()],0,0,this.maxImageSize,function(I,G,S,U,N,P){d.insertImage(I,N,P)},function(){},function(I){return"image/"==I.type.substring(0,6)},function(I){for(var G=0;G<I.length;G++)I[G]()});else{var F=
this.editor.graph.getInsertPoint();this.importFiles([B.getAsFile()],F.x,F.y,this.maxImageSize);mxEvent.consume(g)}break}}}}catch(I){}}),!1)}};EditorUi.prototype.installNativeClipboardHandler=function(){function d(){window.setTimeout(function(){n.innerHTML=" ";n.focus();document.execCommand("selectAll",!1,null)},0)}var g=this.editor.graph,n=document.createElement("div");n.setAttribute("autocomplete","off");n.setAttribute("autocorrect","off");n.setAttribute("autocapitalize","off");n.setAttribute("spellcheck", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
path:F,id:I};null==G&&null==I&&(G=b.mode==B);G&&N.setAttribute("selected","selected")}n.appendChild(N)}return N}function u(B){b.pickFolder(B,function(F){var I=null;B==App.MODE_GOOGLE&&null!=F.docs&&0<F.docs.length?I={mode:B,path:F.docs[0].name,id:F.docs[0].id}:B==App.MODE_ONEDRIVE&&null!=F.value&&0<F.value.length?I={mode:B,path:F.value[0].name,id:F.value[0].id}:(B==App.MODE_GITHUB||B==App.MODE_GITLAB)&&null!=F&&0<F.length&&(I={mode:B,path:decodeURIComponent(F),id:F});null!=I&&(q.style.display="",
b.addRecent(I,"Folders"),F=l(I.mode,I.path,I.id,!0),F.parentNode.firstChild!=F&&F.parentNode.insertBefore(F,F.parentNode.firstChild))},!0,!0,!0,!0)}function x(){var B=b.getRecent("Folders");if(null!=B&&0<B.length){for(var F=0;F<B.length;F++)l(B[F].mode,B[F].path,B[F].id);q.style.display=""}else q.style.display="none";l(App.MODE_GOOGLE,mxResources.get("myDrive"));l(App.MODE_GOOGLE,null,null,null,null,!0);l(App.MODE_ONEDRIVE,mxResources.get("myFiles"));l(App.MODE_ONEDRIVE,null,null,null,null,!0);null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0;L<M.length;L++){var m=g.view.getState(g.model.getTerminal(M[L],!1));null!=m&&(!p&&Math.min(m.x+m.width,y.x+y.width)>=Math.max(m.x,y.x)||p&&Math.min(m.y+m.height,y.y+y.height)>=Math.max(m.y,y.y))&&C.push(m)}C.sort(function(z,J){return p?z.x+z.width-J.x-J.width:z.y+z.height-J.y-J.height})}return C}function H(M,p){var y=x(M),C=p==mxConstants.DIRECTION_EAST||p==mxConstants.DIRECTION_WEST;(y==mxConstants.DIRECTION_EAST||y==mxConstants.DIRECTION_WEST)==C&&y!=p?d.actions.get("selectParent").funct():y==
p?(p=g.getOutgoingTreeEdges(M),null!=p&&0<p.length&&g.setSelectionCell(g.model.getTerminal(p[0],!1))):(y=g.getIncomingTreeEdges(M),null!=y&&0<y.length&&(C=K(g.model.getTerminal(y[0],!0),C,M),M=g.view.getState(M),null!=M&&(M=mxUtils.indexOf(C,M),0<=M&&(M+=p==mxConstants.DIRECTION_NORTH||p==mxConstants.DIRECTION_WEST?-1:1,0<=M&&M<=C.length-1&&g.setSelectionCell(C[M].cell)))))}var d=this,g=d.editor.graph,n=g.getModel(),q=d.menus.createPopupMenu;d.menus.createPopupMenu=function(M,p,y){q.apply(this,arguments); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"/dropbox";DropboxClient.prototype.logout=function(){this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken();this.setUser(null);b=null;this.client.authTokenRevoke().then(mxUtils.bind(this,function(){this.client.setAccessToken(null)}))};DropboxClient.prototype.updateUser=function(e,f,c){var k=!0,l=window.setTimeout(mxUtils.bind(this,function(){k=!1;f({code:App.ERROR_TIMEOUT})}),this.ui.timeout), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
App.prototype.loadFileSystemEntry=function(b,e,f){f=null!=f?f:mxUtils.bind(this,function(c){this.handleError(c)});try{b.getFile().then(mxUtils.bind(this,function(c){var k=new FileReader;k.onload=mxUtils.bind(this,function(l){try{if(null!=e){var u=l.target.result;"image/png"==c.type&&(u=this.extractGraphModelFromPng(u));e(new LocalFile(this,u,c.name,null,b,c))}else this.openFileHandle(l.target.result,c.name,c,!1,b)}catch(x){f(x)}});k.onerror=f;"image"!==c.type.substring(0,5)&&"application/pdf"!==c.type||
"image/svg"===c.type.substring(0,9)?k.readAsText(c):k.readAsDataURL(c)}),f)}catch(c){f(c)}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.selectFilename=function(a){var b=a.value.lastIndexOf(".");if(0<b){var e=a.value.substring(b+1);"drawio"!=e&&0<=mxUtils.indexOf(["png","svg","html","xml"],e)&&(e=a.value.lastIndexOf(".drawio.",b),0<e&&(b=e))}b=0<b?b:a.value.length;Editor.selectSubstring(a,0,b)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.lightboxHost+"/?client=1"+(null!=g?"&page="+g:"")+(t?"&edit=_blank":"")+(v?"&layers=1":"")+"');}}})(this);"),N+="cursor:pointer;"),d&&(d=parseInt(F.getAttribute("width")),t=parseInt(F.getAttribute("height")),F.setAttribute("viewBox","-0.5 -0.5 "+d+" "+t),N+="max-width:100%;max-height:"+t+"px;",F.removeAttribute("height")),""!=N&&F.setAttribute("style",N),this.editor.addFontCss(F),this.editor.graph.mathEnabled&&this.editor.addMathCss(F),B(mxUtils.getXml(F))};EditorUi.prototype.timeSince=function(d){d=
Math.floor((new Date-d)/1E3);var g=Math.floor(d/31536E3);if(1<g)return g+" "+mxResources.get("years");g=Math.floor(d/2592E3);if(1<g)return g+" "+mxResources.get("months");g=Math.floor(d/86400);if(1<g)return g+" "+mxResources.get("days");g=Math.floor(d/3600);if(1<g)return g+" "+mxResources.get("hours");g=Math.floor(d/60);return 1<g?g+" "+mxResources.get("minutes"):1==g?g+" "+mxResources.get("minute"):null};EditorUi.prototype.decodeNodeIntoGraph=function(d,g){if(null!=d){var n=null;if("diagram"==d.nodeName)n= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(m,z){Graph.addFont(m,z);document.execCommand("fontname",!1,m);if(null!=z){var J=this.cellEditor.textarea.getElementsByTagName("font");z=Graph.getFontUrl(m,z);for(var O=0;O<J.length;O++)J[O].getAttribute("face")==m&&J[O].getAttribute("data-font-src")!=z&&J[O].setAttribute("data-font-src",z)}};var v=Graph.prototype.isFastZoomEnabled;Graph.prototype.isFastZoomEnabled=function(){return v.apply(this,arguments)&&(!this.shadowVisible||!mxClient.IS_SF)};Graph.prototype.updateGlobalUrlVariables=function(){this.globalVars= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null==L.getTerminal(m[z],!0)){L.setTerminal(m[z],M,!0);var J=g.getCellGeometry(m[z]);J.points=null;null!=J.getTerminalPoint(!0)&&J.setTerminalPoint(null,!0)}}finally{L.endUpdate()}return m}}var I={67:d.actions.get("selectChildren"),88:d.actions.get("selectDescendants"),80:d.actions.get("selectParent"),83:d.actions.get("selectSiblings")},G=d.onKeyDown;d.onKeyDown=function(M){try{var p=g.getSelectionCell();if(g.isEnabled()&&!g.isEditing()&&null!=p){var y=mxEvent.isAltDown(M)&&mxEvent.isShiftDown(M)? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
D.parentNode.parentNode.getAttribute("role")?(this.sharingFailed=!0,D.click(),c(),u=!0):"DIV"==D.nodeName&&"shr-q-shr-r-shr-xb"==D.className&&(u=!0)}u&&(this.sharingObserver.disconnect(),this.sharingObserver=null)})),this.sharingObserver.observe(document,{childList:!0,subtree:!0}))}catch(l){this.ui.handleError(l)}}))};DriveClient.prototype.clearPersistentToken=function(){var f=JSON.parse(this.getPersistentToken(!0))||{};delete f.current;delete f[this.userId];for(var c in f){f.current={userId:c,expires:0};
break}DrawioClient.prototype.setPersistentToken.call(this,JSON.stringify(f))};DriveClient.prototype.setPersistentToken=function(f,c){var k=JSON.parse(this.getPersistentToken(!0))||{};f.userId=this.userId;k.current=f;k[this.userId]={user:this.user};DrawioClient.prototype.setPersistentToken.call(this,JSON.stringify(k),c)}})();DropboxFile=function(b,e,f){DrawioFile.call(this,b,e);this.stat=f};mxUtils.extend(DropboxFile,DrawioFile);DropboxFile.prototype.getId=function(){return this.stat.path_display.substring(1)};DropboxFile.prototype.getHash=function(){return"D"+encodeURIComponent(this.getId())};DropboxFile.prototype.getMode=function(){return App.MODE_DROPBOX};DropboxFile.prototype.isAutosaveOptional=function(){return!0};DropboxFile.prototype.getTitle=function(){return this.stat.name}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(){return this.user};DriveClient.prototype.getUsersList=function(){var f=[],c=JSON.parse(this.getPersistentToken(!0)),k=null;if(null!=c){null!=c.current&&(k=c.current.userId,f.push(c[k].user),f[0].isCurrent=!0);for(var l in c)"current"!=l&&l!=k&&f.push(c[l].user)}return f};DriveClient.prototype.logout=function(){this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&userId="+this.userId+"&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
GitHubFile.prototype.setDescriptorEtag=function(b,e){b.sha=e};GitHubFile.prototype.save=function(b,e,f,c,k,l){this.doSave(this.getTitle(),e,f,c,k,l)};GitHubFile.prototype.saveAs=function(b,e,f){this.doSave(b,e,f)};GitHubFile.prototype.doSave=function(b,e,f,c,k,l){var u=this.meta.name;this.meta.name=b;DrawioFile.prototype.save.apply(this,[null,mxUtils.bind(this,function(){this.meta.name=u;this.saveFile(b,!1,e,f,c,k,l)}),f,c,k])}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
}finally{g.getModel().endUpdate()}v&&(g.setSelectionCell(n),g.scrollCellToVisible(n))}};f=mxUtils.button(mxResources.get("preview"),function(){d(A,K,!1)});f.className="geBtn";E.appendChild(f);f=mxUtils.button(mxResources.get("apply"),function(){d(b.editor.graph,e,!0)});f.className="geBtn gePrimaryBtn";E.appendChild(f);b.editor.cancelFirst||E.appendChild(k);x.appendChild(E);u.appendChild(x);l.appendChild(u);this.container=l},CustomDialog=function(b,e,f,c,k,l,u,x,E,D,A,K){var H=document.createElement("div");
H.appendChild(e);var d=document.createElement("div");d.style.marginTop=null!=K?K:"30px";d.style.textAlign="center";null!=u&&d.appendChild(u);b.isOffline()||null==l||(e=mxUtils.button(mxResources.get("help"),function(){b.openLink(l)}),e.className="geBtn",d.appendChild(e));E=mxUtils.button(E||mxResources.get("cancel"),function(){b.hideDialog();null!=c&&c()});E.className="geBtn";x&&(E.style.display="none");b.editor.cancelFirst&&d.appendChild(E);k=mxUtils.button(k||mxResources.get("ok"),mxUtils.bind(this,
function(){D||b.hideDialog(null,null,this.container);if(null!=f){var g=f();if("string"===typeof g){b.showError(mxResources.get("error"),g);return}}D&&b.hideDialog(null,null,this.container)}));d.appendChild(k);k.className="geBtn gePrimaryBtn";b.editor.cancelFirst||d.appendChild(E);if(null!=A)for(x=0;x<A.length;x++)(function(g,n,q){g=mxUtils.button(g,function(t){n(t)});null!=q&&g.setAttribute("title",q);g.className="geBtn";d.appendChild(g)})(A[x][0],A[x][1],A[x][2]);H.appendChild(d);this.cancelBtn=
E;this.okButton=k;this.container=H},TemplatesDialog=function(b,e,f,c,k,l,u,x,E,D,A,K,H,d,g){function n(ka){ta.innerText=ka;ta.style.display="block";setTimeout(function(){ta.style.display="none"},4E3)}function q(){null!=z&&(z.style.fontWeight="normal",z.style.textDecoration="none",J=z,z=null)}function t(ka,fa,ma,na,oa,ia,ja){if(-1<ka.className.indexOf("geTempDlgRadioBtnActive"))return!1;ka.className+=" geTempDlgRadioBtnActive";C.querySelector(".geTempDlgRadioBtn[data-id="+na+"]").className="geTempDlgRadioBtn "+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.showDialog(d.container,620,460,!0,!0,null,null,null,null,!0);d.init();document.execCommand("selectall",!1,null)};EditorUi.prototype.doSaveLocalFile=function(d,g,n,q,t,v){"text/xml"!=n||/(\.drawio)$/i.test(g)||/(\.xml)$/i.test(g)||/(\.svg)$/i.test(g)||/(\.html)$/i.test(g)||(g=g+"."+(null!=v?v:"drawio"));if(window.Blob&&navigator.msSaveOrOpenBlob)d=q?this.base64ToBlob(d,n):new Blob([d],{type:n}),navigator.msSaveOrOpenBlob(d,g);else if(mxClient.IS_IE)n=window.open("about:blank","_blank"),null==
n?mxUtils.popup(d,!0):(n.document.write(d),n.document.close(),n.document.execCommand("SaveAs",!0,g),n.close());else if(mxClient.IS_IOS&&this.isOffline())navigator.standalone||null==n||"image/"!=n.substring(0,6)?this.showTextDialog(g+":",d):this.openInNewWindow(d,n,q);else{var B=document.createElement("a");v=(null==navigator.userAgent||0>navigator.userAgent.indexOf("PaleMoon/"))&&"undefined"!==typeof B.download;if(mxClient.IS_GC&&null!=navigator.userAgent){var F=navigator.userAgent.match(/Chrom(e|ium)\/([0-9]+)\./);
v=65==(F?parseInt(F[2],10):!1)?!1:v}if(v||this.isOffline()){B.href=URL.createObjectURL(q?this.base64ToBlob(d,n):new Blob([d],{type:n}));v?B.download=g:B.setAttribute("target","_blank");document.body.appendChild(B);try{window.setTimeout(function(){URL.revokeObjectURL(B.href)},2E4),B.click(),B.parentNode.removeChild(B)}catch(I){}}else this.createEchoRequest(d,g,n,q,t).simulate(document,"_blank")}};EditorUi.prototype.createEchoRequest=function(d,g,n,q,t,v){d="xml="+encodeURIComponent(d);return new mxXmlRequest(SAVE_URL, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
G=new mxAsyncCanvas(this.thumbImageCache);I.images=this.thumbImageCache.images;var S=new mxImageExport;S.drawShape=function(U,N){U.shape instanceof mxShape&&U.shape.checkBounds()&&(N.save(),N.translate(.5,.5),U.shape.paint(N),N.translate(-.5,-.5),N.restore())};S.drawText=function(U,N){};S.drawState(u.getView().getState(u.model.root),G);G.finish(mxUtils.bind(this,function(){try{S.drawState(u.getView().getState(u.model.root),I),u!=this.editor.graph&&null!=u.container.parentNode&&u.container.parentNode.removeChild(u.container)}catch(U){K= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
[1])),g.model.execute(new ChangePage(this,this.currentPage,this.currentPage,0))),this.editor.setGraphXml(d),null!=this.currentPage&&(this.currentPage.root=this.editor.graph.model.root,g.model.execute(new ChangePage(this,this.currentPage,this.currentPage,0)));if(null!=n)for(t=0;t<n.length;t++)g.model.execute(new ChangePage(this,n[t],null))}finally{g.model.endUpdate()}}};EditorUi.prototype.createFileData=function(d,g,n,q,t,v,B,F,I,G,S){g=null!=g?g:this.editor.graph;t=null!=t?t:!1;I=null!=I?I:!0;S=null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
GitHubClient.prototype.maxFileSize=5E7;GitHubClient.prototype.authToken="token";GitHubClient.prototype.setToken=function(e){b=e};GitHubClient.prototype.updateUser=function(e,f,c){var k=!0,l=window.setTimeout(mxUtils.bind(this,function(){k=!1;f({code:App.ERROR_TIMEOUT,message:mxResources.get("timeout")})}),this.ui.timeout),u=new mxXmlRequest(this.baseUrl+"/user",null,"GET"),x=this.authToken+" "+b;u.setRequestHeaders=function(E,D){E.setRequestHeader("Authorization",x)};u.send(mxUtils.bind(this,function(){window.clearTimeout(l); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxAsyncCanvas.prototype.setFontFamily=function(b){this.state.fontFamily=b};mxAsyncCanvas.prototype.setFontStyle=function(b){this.state.fontStyle=b};mxAsyncCanvas.prototype.rect=function(b,e,f,c){};mxAsyncCanvas.prototype.roundrect=function(b,e,f,c,k,l){};mxAsyncCanvas.prototype.ellipse=function(b,e,f,c){};mxAsyncCanvas.prototype.rewriteImageSource=function(b){if("http://"==b.substring(0,7)||"https://"==b.substring(0,8))b="/proxy?url="+encodeURIComponent(b);return b}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
I.offsetTop);this.showShapePicker(Math.max(this.diagramContainer.scrollLeft+Math.max(24,R.x)),this.diagramContainer.scrollTop+R.y,null,null,null,null,mxUtils.bind(this,function(M){return g.getCenterInsertPoint(g.getBoundingBoxFromGeometry(M,!0))}),"simple"==d,!1)}mxEvent.consume(P)}));B.style.backgroundSize="24px";"simple"==d?B.style.flexShrink="0":B.style.marginBottom="4px";var G=!1,S=mxUtils.bind(this,function(P){if(P||document.body.contains(n)){P=function(y,C,L,m,z,J){null!=C&&y.setAttribute("title",
C);y.style.cursor="pointer";y.style.margin="simple"==d?"0px":"8px 0px 8px 2px";y.style.display="simple"==d?"inline-block":"block";n.appendChild(y);"simple"==d?y.style.opacity="0.7":null!=m&&(C=z,C=null!=C?C:30,J=null!=J?J:26,y.style.position="relative",y.style.overflow="visible",L=document.createElement("div"),L.style.position="absolute",L.style.fontSize="8px",L.style.left=C+"px",L.style.top=J+"px",mxUtils.write(L,m),y.appendChild(L));return y};n.innerText="";if(!G){var R=window.innerWidth||document.documentElement.clientWidth|| | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
JSON.stringify(c)+"\r\n---------314159265358979323846\r\nContent-Type: application/octect-stream\r\nContent-Transfer-Encoding: base64\r\n\r\n"+(null!=k?u?k:!window.btoa||mxClient.IS_IE||mxClient.IS_IE11?Base64.encode(k):Graph.base64EncodeUnicode(k):"")+"\r\n---------314159265358979323846--"};l||(f.fullUrl+="&newRevision=false");E&&(f.fullUrl+="&pinned=true");return f};DriveClient.prototype.createLinkPicker=function(){var f=e.linkPicker;if(null==f||e.linkPickerToken!=b){e.linkPickerToken=b;f=(new google.picker.DocsView(google.picker.ViewId.FOLDERS)).setParent("root").setIncludeFolders(!0).setSelectFolderEnabled(!0); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(R){this.spinner.stop();try{this.saveCanvas(R,t?this.getFileData(!0,null,null,null,n,F):null,I,null==this.pages||0==this.pages.length,S)}catch(M){this.handleError(M)}}),null,this.thumbImageCache,null,mxUtils.bind(this,function(R){this.spinner.stop();this.handleError(R)}),null,n,d||1,g,q,null,null,v,B,G,U,N)}catch(R){this.spinner.stop(),this.handleError(R)}}};EditorUi.prototype.isCorsEnabledForUrl=function(d){return this.editor.isCorsEnabledForUrl(d)};EditorUi.prototype.importXml=function(d, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null;EditorUi.prototype.shareCursorPosition=!0;EditorUi.prototype.showRemoteCursors=!0;(function(){EditorUi.prototype.useCanvasForExport=!1;EditorUi.prototype.jpgSupported=!1;try{var d=document.createElement("canvas");EditorUi.prototype.canvasSupported=!(!d.getContext||!d.getContext("2d"))}catch(t){}try{var g=document.createElement("canvas"),n=new Image;n.onload=function(){try{g.getContext("2d").drawImage(n,0,0);var t=g.toDataURL("image/png");EditorUi.prototype.useCanvasForExport=null!=t&&6<t.length}catch(v){}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.isDiagramEmpty()&&this.currentPage.getName()==mxResources.get("pageWithNumber",[1])};EditorUi.prototype.confirmImageResize=function(d,g){g=null!=g?g:!1;var n=null!=this.spinner&&null!=this.spinner.pause?this.spinner.pause():function(){},q=isLocalStorage||mxClient.IS_CHROMEAPP?mxSettings.getResizeImages():null,t=function(v,B){if(v||g)mxSettings.setResizeImages(v?B:null),mxSettings.save();n();d(B)};null==q||g?this.showDialog((new ConfirmDialog(this,mxResources.get("resizeLargeImages"),function(v){t(v, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
P()},mxEvent.addListener(A,"scroll",t))}),n)}}))});b?this.user?F():this.updateUser(function(){F()},n,!0):this.authenticate(mxUtils.bind(this,function(){this.updateUser(function(){F()},n,!0)}),n)};GitLabClient.prototype.logout=function(){this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken();this.setUser(null);b=null;this.setToken(null)}})();DrawioComment=function(b,e,f,c,k,l,u){this.file=b;this.id=e;this.content=f;this.modifiedDate=c;this.createdDate=k;this.isResolved=l;this.user=u;this.replies=[]};DrawioComment.prototype.addReplyDirect=function(b){null!=b&&this.replies.push(b)};DrawioComment.prototype.addReply=function(b,e,f,c,k){e()};DrawioComment.prototype.editComment=function(b,e,f){e()};DrawioComment.prototype.deleteComment=function(b,e){b()};DriveComment=function(b,e,f,c,k,l,u,x){DrawioComment.call(this,b,e,f,c,k,l,u);this.pCommentId=x};mxUtils.extend(DriveComment,DrawioComment);DriveComment.prototype.addReply=function(b,e,f,c,k){b={content:b.content};c?b.verb="resolve":k&&(b.verb="reopen");this.file.ui.drive.executeRequest({url:"/files/"+this.file.getId()+"/comments/"+this.id+"/replies",params:b,method:"POST"},mxUtils.bind(this,function(l){e(l.replyId)}),f)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!1;try{var g=JSON.parse(e.getText());null!=g&&"Resource not accessible by integration"==g.message?H():(null!=g&&null!=g.errors&&0<g.errors.length&&(d="too_large"==g.errors[0].code),c({message:mxResources.get(d?"drawingTooLarge":"forbidden")}))}catch(n){c({message:mxResources.get(d?"drawingTooLarge":"forbidden")})}}else 404===e.getStatus()?l?c({code:e.getStatus(),message:this.getErrorMessage(e,mxResources.get("fileNotFound"))}):H():409===e.getStatus()?c({code:e.getStatus(),status:409}):c({code:e.getStatus(),
message:this.getErrorMessage(e,mxResources.get("error")+" "+e.getStatus())})}),mxUtils.bind(this,function(H){window.clearTimeout(A);D&&c(H)}))}),x=mxUtils.bind(this,function(E){null==this.user?this.updateUser(function(){x(!0)},c,E):u(E)});null==b?this.authenticate(function(){x(!0)},c):x(!1)};GitHubClient.prototype.getLibrary=function(e,f,c){this.getFile(e,f,c,!0)};GitHubClient.prototype.getSha=function(e,f,c,k,l,u,x){var E="&t="+(new Date).getTime();e=new mxXmlRequest(this.baseUrl+"/repos/"+e+"/"+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null,J),0<O.length&&(m=mxUtils.parseXml(O),m=m.documentElement))))}if(null!=m&&"svg"==m.nodeName)if(O=m.getAttribute("content"),null!=O&&"<"!=O.charAt(0)&&"%"!=O.charAt(0)&&(O=unescape(window.atob?atob(O):Base64.decode(cont,O))),null!=O&&"%"==O.charAt(0)&&(O=decodeURIComponent(O)),null!=O&&0<O.length)m=mxUtils.parseXml(O).documentElement;else throw{message:mxResources.get("notADiagramFile")};null==m||z||(T=null,"diagram"==m.nodeName?T=m:"mxfile"==m.nodeName&&(O=m.getElementsByTagName("diagram"),0<
O.length&&(T=O[Math.max(0,Math.min(O.length-1,urlParams.page||0))])),null!=T&&(m=Editor.parseDiagramNode(T,J)));null==m||"mxGraphModel"==m.nodeName||z&&"mxfile"==m.nodeName||(m=null);return m};Editor.parseDiagramNode=function(m,z){var J=mxUtils.trim(mxUtils.getTextContent(m)),O=null;0<J.length?(m=Graph.decompress(J,null,z),null!=m&&0<m.length&&(O=mxUtils.parseXml(m).documentElement)):(m=mxUtils.getChildNodes(m),0<m.length&&(O=mxUtils.createXmlDocument(),O.appendChild(O.importNode(m[0],!0)),O=O.documentElement)); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
error:c});null==this.user&&this.updateUser(this.emptyFn,this.emptyFn,!0)});null==b||6E4>this.tokenExpiresOn-Date.now()?this.authenticate(mxUtils.bind(this,function(){this.inlinePicker?k():this.ui.showDialog((new BtnDialog(this.ui,this,mxResources.get("open"),mxUtils.bind(this,function(){this.ui.hideDialog();k()}))).container,300,140,!0,!0)}),c):k()};OneDriveClient.prototype.logout=function(){if(isLocalStorage){var e=localStorage.getItem("odpickerv7cache");null!=e&&'{"odsdkLoginHint":{'==e.substring(0,
19)&&localStorage.removeItem("odpickerv7cache")}window.open(this.authUrl+"/oauth2/v2.0/logout","logout","width=525,height=525,status=no,resizable=yes,toolbar=no,menubar=no,scrollbars=yes");this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken();this.setUser(null);b=null}})();GitHubFile=function(b,e,f){DrawioFile.call(this,b,e);this.meta=f;this.peer=this.ui.gitHub};mxUtils.extend(GitHubFile,DrawioFile);GitHubFile.prototype.share=function(){this.ui.editor.graph.openLink("https://github.com/"+encodeURIComponent(this.meta.org)+"/"+encodeURIComponent(this.meta.repo)+"/settings/access")}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
t,mxResources.get("ok"),function(F){null!=F?t=F:v.value="blank"},mxResources.get("url"),null,null,null,null,function(){v.value="blank"});this.showDialog(B.container,300,80,!0,!1);B.init()}}));mxEvent.addListener(n,"change",mxUtils.bind(this,function(){n.checked&&(null==g||g.checked)?v.removeAttribute("disabled"):v.setAttribute("disabled","disabled")}));mxUtils.br(d);return{getLink:function(){return n.checked?"blank"===v.value?"_blank":t:null},getEditInput:function(){return n},getEditSelect:function(){return v}}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!1;l.connectionHandler.createEdgeState=function(n){n=l.createEdge(null,null,null,null,null,u);return new mxCellState(this.graph.view,n,this.graph.getCellStyle(n))};var x=l.getDefaultParent(),E=mxUtils.bind(this,function(n){var q=new mxCellOverlay(this.connectImage,"Add outgoing");q.cursor="hand";q.addListener(mxEvent.CLICK,function(t,v){l.connectionHandler.reset();l.clearSelection();var B=l.getCellGeometry(n),F;K(function(){F=l.insertVertex(x,null,"Entry",B.x,B.y,80,30,"rounded=1;");E(F);l.view.refresh(F); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(d,g){mxSettings.setUi(d);(g=this.doSetCurrentTheme(d)||g)||this.alert(mxResources.get("restartForChangeRequired"))};EditorUi.prototype.isDefaultTheme=function(d){return""==d||"dark"==d||"default"==d||"kennedy"==d||null==d};EditorUi.prototype.doSetCurrentTheme=function(d,g,n){function q(I){return"simple"==I||0==g&&"sketch"==I}g=null!=g?g:150;var t=Editor.currentTheme,v=q(t)&&this.isDefaultTheme(d)||this.isDefaultTheme(t)&&q(d),B=v&&"sketch"!=d&&"sketch"!=t;if(v&&!this.themeSwitching){Editor.currentTheme= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
u=this.client.usersGetCurrentAccount();u.then(mxUtils.bind(this,function(x){window.clearTimeout(l);k&&(this.setUser(new DrawioUser(x.account_id,x.email,x.name.display_name)),e())}));u["catch"](mxUtils.bind(this,function(x){window.clearTimeout(l);k&&(null==x||401!==x.status||c?f({message:mxResources.get("accessDenied")}):(this.setUser(null),this.client.setAccessToken(null),b=null,this.authenticate(mxUtils.bind(this,function(){this.updateUser(e,f,!0)}),f)))}))};DropboxClient.prototype.authenticate= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.currentTheme&&"min"!=Editor.currentTheme||this.addMenuItems(p,["-","outline","fullscreen"],y)});A=this.get("layout");var n=A.funct;A.funct=function(p,y){n.apply(this,arguments);p.addItem(mxResources.get("orgChart"),null,function(){var C=null,L=20,m=20,z=function(){"undefined"!==typeof mxOrgChartLayout&&null!=C&&c.tryAndHandle(mxUtils.bind(this,function(){var Z=c.editor.graph,Y=new mxOrgChartLayout(Z,C,L,m),aa=Z.getDefaultParent();1<Z.model.getChildCount(Z.getSelectionCell())&&(aa=Z.getSelectionCell());
Y.execute(aa)}))},J=document.createElement("div"),O=document.createElement("div");O.style.marginTop="6px";O.style.display="inline-block";O.style.width="140px";mxUtils.write(O,mxResources.get("orgChartType")+": ");J.appendChild(O);var T=document.createElement("select");T.style.width="200px";T.style.boxSizing="border-box";O=[mxResources.get("linear"),mxResources.get("hanger2"),mxResources.get("hanger4"),mxResources.get("fishbone1"),mxResources.get("fishbone2"),mxResources.get("1ColumnLeft"),mxResources.get("1ColumnRight"), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"metaEdit","0")?d.showDataDialog(C):n.apply(this,arguments)}}catch(J){d.handleError(J)}};g.getLinkTitle=function(C){return d.getLinkTitle(C)};g.customLinkClicked=function(C){var L=!1;try{d.handleCustomLink(C),L=!0}catch(m){d.handleError(m)}return L};var q=g.parseBackgroundImage;g.parseBackgroundImage=function(C){var L=q.apply(this,arguments);null!=L&&null!=L.src&&Graph.isPageLink(L.src)&&(L={originalSrc:L.src});return L};var t=g.setBackgroundImage;g.setBackgroundImage=function(C){null!=C&&null!=C.originalSrc&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
[R],"{1} ago"));P.setAttribute("title",N.toLocaleDateString()+" "+N.toLocaleTimeString())}function D(N){var P=document.createElement("img");P.className="geCommentBusyImg";P.src=IMAGE_PATH+"/spin.gif";N.appendChild(P);N.busyImg=P}function A(N){N.style.border="1px solid red";N.removeChild(N.busyImg)}function K(N){N.style.border="";N.removeChild(N.busyImg)}function H(N,P,R,M,p){function y(W,V,Q){var X=document.createElement("li");X.className="geCommentAction";var Z=document.createElement("a");Z.className=
"geCommentActionLnk";mxUtils.write(Z,W);X.appendChild(Z);mxEvent.addListener(Z,"click",function(Y){V(Y,N);Y.preventDefault();mxEvent.consume(Y)});T.appendChild(X);Q&&(X.style.display="none")}function C(){function W(X){V.push(Q);if(null!=X.replies)for(var Z=0;Z<X.replies.length;Z++)Q=Q.nextSibling,W(X.replies[Z])}var V=[],Q=m;W(N);return{pdiv:Q,replies:V}}function L(W,V,Q,X,Z){function Y(){D(ba);N.addReply(da,function(sa){da.id=sa;N.replies.push(da);K(ba);Q&&Q()},function(sa){aa();A(ba);b.handleError(sa, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
v&&t.apply(this,arguments)});n=n||{};n.callbackId=this.remoteInvokeCallbacks.length;this.remoteInvokeCallbacks.push({callback:F,error:I});d=JSON.stringify({event:"remoteInvoke",funtionName:d,functionArgs:g,msgMarkers:n});null!=this.remoteWin?this.remoteWin.postMessage(d,"*"):this.remoteInvokeQueue.push(d)};EditorUi.prototype.handleRemoteInvoke=function(d,g){var n=mxUtils.bind(this,function(G,S){var U={event:"remoteInvokeResponse",msgMarkers:d.msgMarkers};null!=S?U.error={errResp:S}:null!=G&&(U.resp=
G);this.remoteWin.postMessage(JSON.stringify(U),"*")});try{var q=d.funtionName,t=this.remoteInvokableFns[q];if(null!=t&&"function"===typeof this[q]){if(t.allowedDomains){for(var v=!1,B=0;B<t.allowedDomains.length;B++)if(g=="https://"+t.allowedDomains[B]){v=!0;break}if(!v){n(null,"Invalid Call: "+q+" is not allowed.");return}}var F=d.functionArgs;Array.isArray(F)||(F=[]);if(t.isAsync)F.push(function(){n(Array.prototype.slice.apply(arguments))}),F.push(function(G){n(null,G||"Unkown Error")}),this[q].apply(this,
F);else{var I=this[q].apply(this,F);n([I])}}else n(null,"Invalid Call: "+q+" is not found.")}catch(G){n(null,"Invalid Call: An error occurred, "+G.message)}};EditorUi.prototype.openDatabase=function(d,g){if(null==this.database){var n=window.indexedDB||window.mozIndexedDB||window.webkitIndexedDB;if(null!=n)try{var q=n.open("database",2);q.onupgradeneeded=function(t){try{var v=q.result;1>t.oldVersion&&v.createObjectStore("objects",{keyPath:"key"});2>t.oldVersion&&(v.createObjectStore("files",{keyPath:"title"}), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(k){this.savingFile=!1;null!=c&&c(k)})):this.ui.pickFolder(App.MODE_TRELLO,mxUtils.bind(this,function(k){this.ui.trello.insertFile(b,this.getData(),mxUtils.bind(this,function(l){this.savingFile=!1;null!=f&&f();this.ui.fileLoaded(l);0<this.saveNeededCounter&&(this.saveNeededCounter--,this.saveFile(b,e,f,c))}),mxUtils.bind(this,function(){this.savingFile=!1;null!=c&&c()}),!1,k)}))):null!=f&&f()};TrelloLibrary=function(b,e,f){TrelloFile.call(this,b,e,f)};mxUtils.extend(TrelloLibrary,TrelloFile);TrelloLibrary.prototype.doSave=function(b,e,f){this.saveFile(b,!1,e,f)};TrelloLibrary.prototype.open=function(){};TrelloClient=function(b){DrawioClient.call(this,b,"tauth");Trello.setKey(this.key)};mxUtils.extend(TrelloClient,DrawioClient);TrelloClient.prototype.key="e89d109082298ce91f6576f82f458551";TrelloClient.prototype.baseUrl="https://api.trello.com/1/";TrelloClient.prototype.SEPARATOR="|$|";TrelloClient.prototype.maxFileSize=1E7;TrelloClient.prototype.extension=".xml"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
B);ImageDialog.filePicked=function(M){M.action==google.picker.Action.PICKED&&null!=M.docs[0].thumbnails&&(M=M.docs[0].thumbnails[M.docs[0].thumbnails.length-1],null!=M&&(H.value=M.url,B()));H.focus()};x.appendChild(K);x.appendChild(d);mxUtils.br(x);mxUtils.br(x);D?(K.setAttribute("checked","checked"),K.checked=!0):(A.setAttribute("checked","checked"),A.checked=!0);!E&&K.checked&&(mxUtils.write(q,mxResources.get("pageNotFound")),q.setAttribute("disabled","disabled"),q.setAttribute("selected","selected"), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
t=-1,v=function(){null!=u?(null!=x&&x(t),t=u(q)):q()};this.drawRuler=v;this.sizeListener=e=l(function(){var B=g.container;f?(B=B.offsetHeight+E,H.height!=B&&(H.height=B,K.style.height=B+"px",v())):(B=B.offsetWidth+E,H.width!=B&&(H.width=B,K.style.width=B+"px",v()))},10);this.pageListener=function(){v()};this.scrollListener=c=l(function(){var B=f?g.container.scrollTop:g.container.scrollLeft;D.lastScroll!=B&&(D.lastScroll=B,v())},10);this.unitListener=function(B,F){D.setUnit(F.getProperty("unit"))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
StorageFile.listFiles=function(b,e,f,c){b.getDatabaseItems(function(k){var l=[];if(null!=k)for(var u=0;u<k.length;u++)"."==k[u].title.charAt(0)||null!=e&&k[u].type!=e||l.push(k[u]);f(l)},function(){null==b.database?f(StorageFile.listLocalStorageFiles(e)):null!=c&&c()},"filesInfo")};StorageFile.deleteFile=function(b,e,f,c){b.removeDatabaseItem([e,e],f,function(){null==b.database?(localStorage.removeItem(e),f()):null!=c&&c()},["files","filesInfo"])};StorageLibrary=function(b,e,f){StorageFile.call(this,b,e,f)};mxUtils.extend(StorageLibrary,StorageFile);StorageLibrary.prototype.type="L";StorageLibrary.prototype.isAutosave=function(){return!0};StorageLibrary.prototype.saveAs=function(b,e,f){this.saveFile(b,!1,e,f)};StorageLibrary.prototype.getHash=function(){return"L"+encodeURIComponent(this.title)};StorageLibrary.prototype.getTitle=function(){return".scratchpad"==this.title?mxResources.get("scratchpad"):this.title}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(n,q,t){mxCellRenderer.prototype.installCellOverlayListeners.apply(this,arguments);mxEvent.addListener(t.node,mxClient.IS_POINTER?"pointerdown":"mousedown",function(v){q.fireEvent(new mxEventObject("pointerdown","event",v,"state",n))});!mxClient.IS_POINTER&&mxClient.IS_TOUCH&&mxEvent.addListener(t.node,"touchstart",function(v){q.fireEvent(new mxEventObject("pointerdown","event",v,"state",n))})};l.getAllConnectionConstraints=function(){return null};l.connectionHandler.marker.highlight.keepOnTop= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.isObjectEqual=function(b,e,f){if(null==b&&null==e)return!0;if(null!=b?null==e:null!=e)return!1;var c=function(k,l){return null==f||f[k]!=l?!0===l?1:l:void 0};return JSON.stringify(b,c)==JSON.stringify(e,c)};var mxSettings={currentVersion:18,defaultFormatWidth:600>screen.width?"0":"240",key:Editor.settingsKey,getLanguage:function(){return mxSettings.settings.language},setLanguage:function(b){mxSettings.settings.language=b},isMainSettings:function(){return".drawio-config"==mxSettings.key},getMainSettings:function(){var b=localStorage.getItem(".drawio-config");null==b?(b=mxSettings.getDefaults(),delete b.isNew):(b=JSON.parse(b),b.version=mxSettings.currentVersion);return b},getUi:function(){return mxSettings.isMainSettings()? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.getTextContent(Y[Z]);W=b.stringToCells(Graph.decompress(z));var aa=b.editor.graph.getBoundingBoxFromGeometry(W);x(null,null,0,0,0,0,{xml:z,w:aa.width,h:aa.height})}R=!0}}catch(ca){null!=window.console&&console.log("Error in library dialog: "+ca)}R||(b.spinner.stop(),b.handleError({message:mxResources.get("errorLoadingFile")}))}}catch(ca){null!=window.console&&console.log("Error in library dialog: "+ca)}return null}function E(S){S.dataTransfer.dropEffect=null!=q?"move":"copy";S.stopPropagation(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
var CommentsWindow=function(b,e,f,c,k,l){function u(){for(var N=v.getElementsByTagName("div"),P=0,R=0;R<N.length;R++)"none"!=N[R].style.display&&N[R].parentNode==v&&P++;B.style.display=0==P?"block":"none"}function x(N,P,R,M){function p(){P.removeChild(L);P.removeChild(m);C.style.display="block";y.style.display="block"}n={div:P,comment:N,saveCallback:R,deleteOnCancel:M};var y=P.querySelector(".geCommentTxt"),C=P.querySelector(".geCommentActionsList"),L=document.createElement("textarea");L.className= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.cameraImage,mxResources.get("export"))}};EditorUi.prototype.saveData=function(d,g,n,q,t){this.isLocalFileSave()?this.saveLocalFile(n,d,q,t,g):this.saveRequest(d,g,mxUtils.bind(this,function(v,B){return this.createEchoRequest(n,v,q,t,g,B)}),n,t,q)};EditorUi.prototype.saveRequest=function(d,g,n,q,t,v,B){B=null!=B?B:!mxClient.IS_IOS||!navigator.standalone;var F=this.getServiceCount(!1);isLocalStorage&&F++;var I=4>=F?2:6<F?4:3;d=new CreateDialog(this,d,mxUtils.bind(this,function(G,S){if("_blank"== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.getId()+"/comments"},mxUtils.bind(this,function(k){for(var l=[],u=0;u<k.items.length;u++){var x=f(this,k.items[u]);null!=x&&l.push(x)}b(l)}),e)};DriveFile.prototype.addComment=function(b,e,f){b={content:b.content};this.ui.drive.executeRequest({url:"/files/"+this.getId()+"/comments",method:"POST",params:b},mxUtils.bind(this,function(c){e(c.commentId)}),f)};DriveFile.prototype.canReplyToReplies=function(){return!1};DriveFile.prototype.canComment=function(){return this.desc.canComment}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
k,u=0;8>u;u++)l=1==(l&1)?3988292384^l>>>1:l>>>1,Editor.crcTable[k]=l;Editor.updateCRC=function(m,z,J,O){for(var T=0;T<O;T++)m=Editor.crcTable[(m^z.charCodeAt(J+T))&255]^m>>>8;return m};Editor.crc32=function(m){for(var z=-1,J=0;J<m.length;J++)z=z>>>8^Editor.crcTable[(z^m.charCodeAt(J))&255];return(z^-1)>>>0};Editor.writeGraphModelToPng=function(m,z,J,O,T){function W(Y,aa){var ca=X;X+=aa;return Y.substring(ca,X)}function V(Y){Y=W(Y,4);return Y.charCodeAt(3)+(Y.charCodeAt(2)<<8)+(Y.charCodeAt(1)<<16)+
(Y.charCodeAt(0)<<24)}function Q(Y){return String.fromCharCode(Y>>24&255,Y>>16&255,Y>>8&255,Y&255)}m=m.substring(m.indexOf(",")+1);m=window.atob?atob(m):Base64.decode(m,!0);var X=0;if(W(m,8)!=String.fromCharCode(137)+"PNG"+String.fromCharCode(13,10,26,10))null!=T&&T();else if(W(m,4),"IHDR"!=W(m,4))null!=T&&T();else{W(m,17);T=m.substring(0,X);do{var Z=V(m);if("IDAT"==W(m,4)){T=m.substring(0,X-8);"pHYs"==z&&"dpi"==J?(J=Math.round(O/.0254),J=Q(J)+Q(J)+String.fromCharCode(1)):J=J+String.fromCharCode(0)+
("zTXt"==z?String.fromCharCode(0):"")+O;O=4294967295;O=Editor.updateCRC(O,z,0,4);O=Editor.updateCRC(O,J,0,J.length);T+=Q(J.length)+z+J+Q(O^4294967295);T+=m.substring(X-8,m.length);break}T+=m.substring(X-8,X-4+Z);W(m,Z);W(m,4)}while(Z);return"data:image/png;base64,"+(window.btoa?btoa(T):Base64.encode(T,!0))}};if(window.ColorDialog){FilenameDialog.filenameHelpLink="https://www.drawio.com/doc/faq/save-file-formats";var x=ColorDialog.addRecentColor;ColorDialog.addRecentColor=function(m,z){x.apply(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
StorageFile.insertFile=function(b,e,f,c,k){var l=mxUtils.bind(this,function(u){var x=function(){var E=new StorageFile(b,f,e);E.saveFile(e,!1,function(){c(E)},k)};u?b.confirm(mxResources.get("replaceIt",[e]),x,k):x()});StorageFile.getFileContent(b,e,function(u){l(null!=u)},function(){l(!1)})};StorageFile.getFileContent=function(b,e,f,c){b.getDatabaseItem(e,function(k){f(null!=k?k.data:null)},mxUtils.bind(this,function(){null==b.database?b.getLocalData(e,f):null!=c&&c()}),"files")}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFileSync.prototype.cleanup=function(b,e,f){var c=this.cleanupThread;window.clearTimeout(this.cleanupThread);this.cleanupThread=null;if(this.isValidState()&&!this.file.inConflictState&&this.file.isRealtime()&&!this.file.isModified()){var k=[this.ui.diffPages(this.ui.pages,this.file.ownPages)];this.file.theirPages=this.ui.clonePages(this.file.ownPages);"1"==urlParams.test&&EditorUi.debug("DrawioFileSync.cleanup",[this],"thread",c,"patches",k,"checkFile",f,"checksum",this.ui.getHashValueForPages(this.ui.pages));
this.file.ignorePatches(k)||this.file.patch(k);f?this.file.getLatestVersion(mxUtils.bind(this,function(l){try{if(this.isValidState()&&!this.file.inConflictState&&this.file.isRealtime()){var u=l.getShadowPages();k=[this.ui.diffPages(this.ui.pages,u),this.ui.diffPages(u,this.file.ownPages)];this.file.ignorePatches(k)||this.file.patch(k);EditorUi.debug("DrawioFileSync.cleanup",[this],"newFile",l,"patches",k)}null!=b&&b()}catch(x){null!=e&&e(x)}}),e):(document.hidden||"1"!=urlParams.test||"1"!=urlParams.checksum||
this.testChecksum(),null!=b&&b())}else null!=b&&(b(),EditorUi.debug("DrawioFileSync.cleanup",[this],"checkFile",f,"modified",this.file.isModified()))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"center";f=mxUtils.button(mxResources.get("cancel"),function(){b.spinner.stop();b.hideDialog()});f.className="geBtn";b.editor.cancelFirst&&x.appendChild(f);ImageDialog.filePicked=function(B){B.action==google.picker.Action.PICKED&&null!=B.docs[0].thumbnails&&(B=B.docs[0].thumbnails[B.docs[0].thumbnails.length-1],null!=B&&(K.value=B.url));K.focus()};if(Graph.fileSupport){if(null==b.imgDlgFileInputElt){var t=document.createElement("input");t.setAttribute("multiple","multiple");t.setAttribute("type", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(ja?"geTempDlgRadioBtnLarge":"geTempDlgRadioBtnSmall");C.querySelector("."+fa).src="/images/"+ma+"-sel.svg";C.querySelector("."+oa).src="/images/"+ia+".svg";return!0}function v(ka,fa,ma,na){function oa(xa,Ka){null==ja?(xa=/^https?:\/\//.test(xa)&&!b.editor.isCorsEnabledForUrl(xa)?PROXY_URL+"?url="+encodeURIComponent(xa):TEMPLATE_PATH+"/"+xa,mxUtils.get(xa,mxUtils.bind(this,function(Ja){200<=Ja.getStatus()&&299>=Ja.getStatus()&&(ja=Ja.getText());Ka(ja)}))):Ka(ja)}function ia(xa,Ka,Ja){if(null!=xa&&
mxUtils.isAncestorNode(document.body,fa)&&(xa=mxUtils.parseXml(xa),xa=Editor.extractGraphModel(xa.documentElement,!0),null!=xa)){"mxfile"==xa.nodeName&&(xa=Editor.parseDiagramNode(xa.getElementsByTagName("diagram")[0]));var Aa=new mxCodec(xa.ownerDocument),La=new mxGraphModel;Aa.decode(xa,La);xa=La.root.getChildAt(0).children||[];b.sidebar.createTooltip(fa,xa,Math.min((window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth)-80,1E3),Math.min((window.innerHeight||document.documentElement.clientHeight||
document.body.clientHeight)-80,800),null!=ka.title?mxResources.get(ka.title,null,ka.title):null,!0,new mxPoint(Ka,Ja),!0,null,!0);var Da=document.createElement("div");Da.className="geTempDlgDialogMask";C.appendChild(Da);var va=b.sidebar.hideTooltip;b.sidebar.hideTooltip=function(){Da&&(C.removeChild(Da),Da=null,va.apply(this,arguments),b.sidebar.hideTooltip=va)};mxEvent.addListener(Da,"click",function(){b.sidebar.hideTooltip()})}}var ja=null;if(pa||b.sidebar.currentElt==fa)b.sidebar.hideTooltip(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
D.appendChild(l);K.appendChild(D);E?(D.style.marginTop="10px",H=document.createElement("p"),H.style.marginTop="20px",H.style.marginBottom="0px",H.appendChild(d),k=document.createElement("span"),mxUtils.write(k," "+mxResources.get("rememberThisSetting")),H.appendChild(k),K.appendChild(H),mxEvent.addListener(k,"click",function(n){d.checked=!d.checked;mxEvent.consume(n)})):D.style.marginTop="12px";this.init=function(){g.focus()};this.container=K},HeadlessEditorUi=function(){EditorUi.call(this,new Editor(!0),
document.createElement("div"),!0)};mxUtils.extend(HeadlessEditorUi,EditorUi);HeadlessEditorUi.prototype.createUi=function(){};HeadlessEditorUi.prototype.addTrees=function(){};HeadlessEditorUi.prototype.onBeforeUnload=function(){};HeadlessEditorUi.prototype.updateActionStates=function(){};EditorUi.DIFF_INSERT="i";EditorUi.DIFF_REMOVE="r";EditorUi.DIFF_UPDATE="u";EditorUi.transientViewStateProperties="defaultParent currentRoot scrollLeft scrollTop scale translate lastPasteXml pasteCounter".split(" ");EditorUi.prototype.viewStateProperties={background:!0,backgroundImage:!0,shadowVisible:!0,foldingEnabled:!0,pageScale:!0,mathEnabled:!0,pageFormat:!0,extFonts:!0}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxJsCanvas.prototype.roundrect=function(b,e,f,c,k,l){this.begin();this.moveTo(b+k,e);this.lineTo(b+f-k,e);this.quadTo(b+f,e,b+f,e+l);this.lineTo(b+f,e+c-l);this.quadTo(b+f,e+c,b+f-k,e+c);this.lineTo(b+k,e+c);this.quadTo(b,e+c,b,e+c-l);this.lineTo(b,e+l);this.quadTo(b,e,b+k,e)};mxJsCanvas.prototype.ellipse=function(b,e,f,c){this.ctx.save();this.ctx.translate(b+f/2,e+c/2);this.ctx.scale(f/2,c/2);this.ctx.beginPath();this.ctx.arc(0,0,1,0,2*Math.PI,!1);this.ctx.restore()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
W[V];W.stroke!=mxConstants.NONE&&null!=W.stroke||delete this.nextShape.options.stroke;W.filled||delete this.nextShape.options.fill;this.passThrough=!0;this.rc.draw(this.nextShape);this.passThrough=!1}};m.prototype.stroke=function(){this.passThrough?this.originalStroke.apply(this.canvas,arguments):this.drawPath(this.getStyle(!0,!1))};m.prototype.fill=function(){this.passThrough?this.originalFill.apply(this.canvas,arguments):this.drawPath(this.getStyle(!1,!0))};m.prototype.fillAndStroke=function(){this.passThrough? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"keys",Ea,"values",Qa,"cells",aa.getSelectionCells()))}finally{aa.getModel().endUpdate()}}function T(pa,ra,ua){var Ga=mxUtils.getOffset(m,!0),Ea=mxUtils.getOffset(pa,!0);ra.style.position="absolute";ra.style.left=Ea.x-Ga.x+"px";ra.style.top=Ea.y-Ga.y+"px";ra.style.width=pa.offsetWidth+"px";ra.style.height=pa.offsetHeight-(ua?4:0)+"px";ra.style.zIndex=5}function W(pa,ra,ua){var Ga=document.createElement("div");Ga.style.width="32px";Ga.style.height="4px";Ga.style.margin="2px";Ga.style.border="1px solid black"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
[C],[L])):this.joinFile(!0)}catch(m){p=m,e.file.fireEvent(new mxEventObject("realtimeStateChanged")),EditorUi.debug("P2PCollab:","sendReply error",arguments,m)}});this.sendMessage=c;this.sendDiff=function(C){this.sendMessage("diff",{diff:C})};this.sendNotification=function(C){this.sendMessage("notify",{msg:C})};this.getState=function(){return null!=H?H.readyState:3};this.getLastError=function(){return p};this.mouseListeners={startX:0,startY:0,scrollLeft:0,scrollTop:0,mouseDown:function(C,L){},mouseMove:function(C,
L){var m,z=-1;return function(){clearTimeout(m);var J=this,O=arguments,T=function(){m=null;z=Date.now();C.apply(J,O)};Date.now()-z>L?T():m=setTimeout(T,L)}}(function(C,L){k(L)},300),mouseUp:function(C,L){k(L)}};A.addMouseListener(this.mouseListeners);this.shareCursorPositionListener=function(){b.isShareCursorPosition()||c("cursor",{hide:!0})};b.addListener("shareCursorPositionChanged",this.shareCursorPositionListener);this.selectionChangeListener=function(C,L){C=function(J){return null!=J?J.id:null}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!1,!0)}finally{I.model.endUpdate()}}}catch(L){if(t)throw L;this.handleError(L)}return F};EditorUi.prototype.updatePageLinks=function(d,g){for(var n=0;n<g.length;n++)this.updatePageLinksForCell(d,g[n].root),null!=g[n].viewState&&this.updateBackgroundPageLink(d,g[n].viewState.backgroundImage)};EditorUi.prototype.updateBackgroundPageLink=function(d,g){try{if(null!=g&&Graph.isPageLink(g.originalSrc)){var n=d[g.originalSrc.substring(g.originalSrc.indexOf(",")+1)];null!=n&&(g.originalSrc="data:page/id,"+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!0;Editor.enableRealtime=!0;Editor.enableRealtimeCache=!0;Editor.p2pSyncNotify=!1;Editor.compressXml=!0;Editor.defaultCompressed=!1;Editor.oneDriveInlinePicker=null!=window.urlParams&&"0"==window.urlParams.inlinePicker?!1:!0;Editor.globalVars=null;Editor.config=null;Editor.configVersion=null;Editor.defaultBorder=5;Editor.commonProperties=[{name:"enumerate",dispName:"Enumerate",type:"bool",defVal:!1,onChange:function(m){m.refresh()}},{name:"enumerateValue",dispName:"Enumerate Value",type:"string", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.createParentLookup=function(b,e){function f(D){var A=c[D];null==A&&(A={inserted:[],moved:{}},c[D]=A);return A}var c={};if(null!=e[EditorUi.DIFF_INSERT])for(var k=0;k<e[EditorUi.DIFF_INSERT].length;k++){var l=e[EditorUi.DIFF_INSERT][k],u=null!=l.parent?l.parent:"",x=null!=l.previous?l.previous:"";f(u).inserted[x]=l}if(null!=e[EditorUi.DIFF_UPDATE])for(var E in e[EditorUi.DIFF_UPDATE])l=e[EditorUi.DIFF_UPDATE][E],null!=l.previous&&(u=l.parent,null==u&&(k=b.getCell(E),null!=k&&(k= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
B.apply(this,arguments);null==z&&null!=this.globalVars&&(z=this.globalVars[m]);return z};Graph.prototype.getDefaultStylesheet=function(){if(null==this.defaultStylesheet){var m=this.themes["default-style2"];this.defaultStylesheet=(new mxCodec(m.ownerDocument)).decode(m)}return this.defaultStylesheet};Graph.prototype.isViewer=function(){return urlParams.viewer};var F=Graph.prototype.getSvg;Graph.prototype.getSvg=function(m,z,J,O,T,W,V,Q,X,Z,Y,aa,ca,da){var ba=null,sa=null,za=null;aa||null==this.themes|| | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.getId()+"/comments"},mxUtils.bind(this,function(k){for(var l=[],u=0;u<k.items.length;u++){var x=f(this,k.items[u]);null!=x&&l.push(x)}b(l)}),e)};DriveFile.prototype.addComment=function(b,e,f){b={content:b.content};this.ui.drive.executeRequest({url:"/files/"+this.getId()+"/comments",method:"POST",params:b},mxUtils.bind(this,function(c){e(c.commentId)}),f)};DriveFile.prototype.canReplyToReplies=function(){return!1};DriveFile.prototype.canComment=function(){return this.desc.canComment}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
arguments);mxSettings.setRecentColors(ColorDialog.recentColors);mxSettings.save()};var E=ColorDialog.resetRecentColors;ColorDialog.resetRecentColors=function(){E.apply(this,arguments);mxSettings.setRecentColors(ColorDialog.recentColors);mxSettings.save()}}"undefined"!==typeof window.EditDataDialog&&(EditDataDialog.getDisplayIdForCell=function(m,z){var J=null;null!=m.editor.graph.getModel().getParent(z)?J=z.getId():null!=m.currentPage&&(J=m.currentPage.getId());return J});if(null!=window.StyleFormatPanel){var D= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
AspectDialog.prototype.createViewer=function(b,e,f,c){mxEvent.disableContextMenu(b);b.style.userSelect="none";var k=new Graph(b);k.setTooltips(!1);k.setEnabled(!1);k.setPanning(!1);k.minFitScale=null;k.maxFitScale=null;k.centerZoom=!0;e="mxGraphModel"==e.nodeName?e:Editor.parseDiagramNode(e);if(null!=e){var l=e.getAttribute("background");if(null==l||""==l||l==mxConstants.NONE)l=null!=c?c:"#ffffff";b.style.backgroundColor=l;c=new mxCodec(e.ownerDocument);b=k.getModel();c.decode(e,b);e=b.getChildCount(b.root);
c=null==f;for(l=0;l<e;l++){var u=b.getChildAt(b.root,l);b.setVisible(u,c||f==u.id)}k.maxFitScale=1;k.fit(0);k.center()}return k}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!1,App.loadScripts(["js/shapes-14-6-5.min.js","js/stencils.min.js","js/extensions.min.js"],g,function(B){document.body.innerHTML="";var F=document.createElement("pre");mxUtils.write(F,B.stack);document.body.appendChild(F)}))},function(d){d=document.getElementById("geStatus");null!=d&&(d.innerHTML="Error loading page. <a>Please try refreshing.</a>",d.getElementsByTagName("a")[0].onclick=function(){mxLanguage="en";c(mxResources.getDefaultBundle(RESOURCE_BASE,mxLanguage)||mxResources.getSpecialBundle(RESOURCE_BASE,
mxLanguage))})})};if(!App.isMainCalled)if(App.isMainCalled=!0,window.onerror=function(H,d,g,n,q){EditorUi.logError("Global: "+(null!=H?H:""),d,g,n,q,null,!0);null==window.console||EditorUi.isElectronApp?(mxLog.show(),mxLog.debug("Message:",H,"\nURL:",d,"\nLine:",g,"\nColumn:",n,"\nError:",q)):console.error("Message:",H,"\nURL:",d,"\nLine:",g,"\nColumn:",n,"\nError:",q);window.setTimeout(function(){alert("Error: "+(null!=H?H:""))},100)},window.top!=window.self||"import.diagrams.net"!==window.location.hostname&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.sendErrorReport=function(b,e,f,c){try{var k=this.compressReportData(this.getAnonymizedXmlForPages(this.getShadowPages()),25E3),l=this.compressReportData(this.getAnonymizedXmlForPages(this.ui.pages),25E3),u=this.getCurrentUser(),x=null!=u?this.ui.hashValue(u.id):"unknown",E=null!=this.sync?"-client_"+this.sync.clientId:"-nosync",D=this.getTitle(),A=D.lastIndexOf(".");u="xml";0<A&&(u=D.substring(A));var K=null!=f?f.stack:Error().stack;EditorUi.sendReport(b+" "+(new Date).toISOString()+
":\n\nAppVersion="+navigator.appVersion+"\nFile="+this.ui.hashValue(this.getId())+" ("+this.getMode()+")"+(this.isModified()?" modified":"")+"\nSize/Type="+this.getSize()+" ("+u+")\nUser="+x+E+"\nPrefix="+this.ui.editor.graph.model.prefix+"\nSync="+DrawioFile.SYNC+(null!=this.sync?(this.sync.enabled?" enabled":"")+(this.sync.isConnected()?" connected":""):"")+"\nPlugins="+(null!=mxSettings.settings?mxSettings.getPlugins():"null")+"\n\nStats:\n"+JSON.stringify(this.stats,null,2)+(null!=e?"\n\n"+e:
"")+(null!=f?"\n\nError: "+f.message:"")+"\n\nStack:\n"+K+"\n\nShadow:\n"+k+"\n\nData:\n"+l,c)}catch(H){}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
m.prototype.lineTo=function(W,V){this.passThrough?this.originalLineTo.apply(this.canvas,arguments):(this.addOp(this.lineOp,W,V),this.lastX=W,this.lastY=V)};m.prototype.moveTo=function(W,V){this.passThrough?this.originalMoveTo.apply(this.canvas,arguments):(this.addOp(this.moveOp,W,V),this.lastX=W,this.lastY=V,this.firstX=W,this.firstY=V)};m.prototype.close=function(){this.passThrough?this.originalClose.apply(this.canvas,arguments):this.addOp(this.closeOp)};m.prototype.quadTo=function(W,V,Q,X){this.passThrough? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!navigator.onLine||!d&&("1"==urlParams.stealth||"1"==urlParams.lockdown)};EditorUi.prototype.isExternalDataComms=function(){return"1"!=urlParams.offline&&!this.isOffline()&&!this.isOfflineApp()};EditorUi.prototype.createSpinner=function(d,g,n){var q=null==d||null==g;n=null!=n?n:24;var t=new Spinner({lines:12,length:n,width:Math.round(n/3),radius:Math.round(n/2),rotate:0,color:Editor.isDarkMode()?"#c0c0c0":"#000",speed:1.5,trail:60,shadow:!1,hwaccel:!1,zIndex:2E9}),v=t.spin;t.spin=function(F,I){var G= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
n)});F()};GitHubClient.prototype.logout=function(){this.clearPersistentToken();this.setUser(null);b=null}})();TrelloFile=function(b,e,f){DrawioFile.call(this,b,e);this.meta=f;this.saveNeededCounter=0};mxUtils.extend(TrelloFile,DrawioFile);TrelloFile.prototype.getHash=function(){return"T"+encodeURIComponent(this.meta.compoundId)};TrelloFile.prototype.getMode=function(){return App.MODE_TRELLO};TrelloFile.prototype.isAutosave=function(){return!0};TrelloFile.prototype.getTitle=function(){return this.meta.name};TrelloFile.prototype.isRenamable=function(){return!1};TrelloFile.prototype.getSize=function(){return this.meta.bytes}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
App.prototype.showSplash=function(b){if("1"!=urlParams.noFileMenu){var e=this.getServiceCount(!0),f=mxUtils.bind(this,function(){var k=new SplashDialog(this);this.showDialog(k.container,340,mxClient.IS_CHROMEAPP||EditorUi.isElectronApp?200:230,!0,!0,mxUtils.bind(this,function(l){l&&!mxClient.IS_CHROMEAPP&&(l=Editor.useLocalStorage,this.createFile(this.defaultFilename+(EditorUi.isElectronApp?".drawio":""),null,null,null,null,null,null,"1"!=urlParams.local),Editor.useLocalStorage=l)}),!0)});if(this.editor.isChromelessView())this.handleError({message:mxResources.get("noFileSelected")},
mxResources.get("errorLoadingFile"),mxUtils.bind(this,function(){this.showSplash()}));else if(mxClient.IS_CHROMEAPP||null!=this.mode&&!b)null==urlParams.create&&f();else{b=4==e?2:3;var c=new StorageDialog(this,mxUtils.bind(this,function(){this.hideDialog();f()}),b);this.showDialog(c.container,3>b?200:300,3<e?320:210,!0,!1)}}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"...",function(){var Z=[{layout:"mxOrgChartLayout",config:{branchOptimizer:parseInt(T.value),parentChildSpacing:parseInt(Q.value),siblingSpacing:parseInt(X.value)}}];c.hideDialog();c.showCustomLayoutDialog(JSON.stringify(Z,null,2))});O.className="geBtn";J=new CustomDialog(c,J,function(){null==C&&(C=2);c.loadOrgChartLayouts(z)},null,null,null,O);c.showDialog(J.container,355,140,!0,!0)},y,null,l());p.addSeparator(y);p.addItem(mxResources.get("parallels"),null,mxUtils.bind(this,function(){c.tryAndHandle(mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
defVal:"",isVisible:function(m,z){return"1"==mxUtils.getValue(m.style,"enumerate","0")}},{name:"comic",dispName:"Comic",type:"bool",defVal:!1,isVisible:function(m,z){return"1"!=mxUtils.getValue(m.style,"sketch","0")}},{name:"jiggle",dispName:"Jiggle",type:"float",min:0,defVal:1,isVisible:function(m,z){return"1"==mxUtils.getValue(m.style,"comic","0")||"1"==mxUtils.getValue(m.style,"sketch","1"==urlParams.rough?"1":"0")}},{name:"fillWeight",dispName:"Fill Weight",type:"int",defVal:-1,isVisible:function(m, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
if(null==na&&(ia=oa.indexOf("/"),na=oa.substring(0,ia),null==ma)){var ja=oa.indexOf("/",ia+1);-1<ja&&(ma=oa.substring(ia+1,ja))}ia=Ga[na];null==ia&&(Ra++,ia=[],Ga[na]=ia);oa=ka.getAttribute("clibs");null!=fa[oa]&&(oa=fa[oa]);oa={url:ka.getAttribute("url"),libs:ka.getAttribute("libs"),title:ka.getAttribute("title")||ka.getAttribute("name"),preview:ka.getAttribute("preview"),clibs:oa,tags:ka.getAttribute("tags")};ia.push(oa);null!=ma&&(ia=Ea[na],null==ia&&(ia={},Ea[na]=ia),na=ia[ma],null==na&&(na=[],
ia[ma]=na),na.push(oa))}ka=ka.nextSibling}U(Ga,Qa,Ia)}})}function P(ka){u&&(Ba.scrollTop=0,ba.innerText="",Fa.spin(ba),m=!1,L=!0,sa.innerText=mxResources.get("recentDiag"),Y=null,u(Va,function(){n(mxResources.get("cannotLoad"));Va([])},ka?null:l))}function R(ka){if(""==ka)null!=J&&(J.click(),J=null);else{if(null==TemplatesDialog.tagsList[c]){var fa={};for(Ka in Ga)for(var ma=Ga[Ka],na=0;na<ma.length;na++){var oa=ma[na];if(null!=oa.tags)for(var ia=oa.tags.toLowerCase().split(";"),ja=0;ja<ia.length;ja++)null== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.isOffline(!0)?window.setTimeout(B,0):(this.loadingMermaid=!0,"1"==urlParams.dev?("1"==urlParams.mermaidToDrawioTest&&mxMermaidToDrawio.addListener(mxUtils.bind(this,function(F){this.importXml(F,null,null,null,null,null,!0)})),mxscript("js/mermaid/mermaid.min.js",B,null,null,null,v)):mxscript("js/extensions.min.js",B,null,null,null,v))};EditorUi.prototype.generatePlantUmlImage=function(d,g,n,q){function t(F,I,G){c1=F>>2;c2=(F&3)<<4|I>>4;c3=(I&15)<<2|G>>6;c4=G&63;r="";r+=v(c1&63);r+=v(c2&63);r+=
v(c3&63);return r+=v(c4&63)}function v(F){if(10>F)return String.fromCharCode(48+F);F-=10;if(26>F)return String.fromCharCode(65+F);F-=26;if(26>F)return String.fromCharCode(97+F);F-=26;return 0==F?"-":1==F?"_":"?"}var B=new XMLHttpRequest;B.open("GET",("txt"==g?PLANT_URL+"/txt/":"png"==g?PLANT_URL+"/png/":PLANT_URL+"/svg/")+function(F){r="";for(i=0;i<F.length;i+=3)r=i+2==F.length?r+t(F.charCodeAt(i),F.charCodeAt(i+1),0):i+1==F.length?r+t(F.charCodeAt(i),0,0):r+t(F.charCodeAt(i),F.charCodeAt(i+1),F.charCodeAt(i+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
f.setCellStyles(mxConstants.STYLE_ROTATION,Number(t.value),[e[B]])}}finally{f.getModel().endUpdate()}});v.className="geBtn gePrimaryBtn";mxEvent.addListener(k,"keypress",function(B){13==B.keyCode&&v.click()});l=document.createElement("div");l.style.marginTop="20px";l.style.textAlign="right";b.editor.cancelFirst?(l.appendChild(c),l.appendChild(v)):(l.appendChild(v),l.appendChild(c));k.appendChild(l);this.container=k},LibraryDialog=function(b,e,f,c,k,l){function u(S){for(S=document.elementFromPoint(S.clientX,
S.clientY);null!=S&&S.parentNode!=d;)S=S.parentNode;var U=null;if(null!=S){var N=d.firstChild;for(U=0;null!=N&&N!=S;)N=N.nextSibling,U++}return U}function x(S,U,N,P,R,M,p,y,C){try{if(b.spinner.stop(),null==U||"image/"==U.substring(0,6))if(null==S&&null!=p||null==n[S]){var L=function(){Q.innerText="";Q.style.cursor="pointer";Q.style.whiteSpace="nowrap";Q.style.textOverflow="ellipsis";mxUtils.write(Q,null!=X.title&&0<X.title.length?X.title:mxResources.get("untitled"));Q.style.color=null==X.title||0== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"https://github.com/apps/diagrams-net-app-test":"https://github.com/apps/draw-io-app")}),mxResources.get("cancel"),f,480,null,!1)};GitHubClient.prototype.executeRequest=function(e,f,c,k,l){var u=mxUtils.bind(this,function(E){var D=!0,A=window.setTimeout(mxUtils.bind(this,function(){D=!1;c({code:App.ERROR_TIMEOUT,retry:x})}),this.ui.timeout),K=this.authToken+" "+b;e.setRequestHeaders=function(H,d){H.setRequestHeader("Authorization",K)};e.send(mxUtils.bind(this,function(){window.clearTimeout(A);var H= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxJsCanvas.prototype.image=function(b,e,f,c,k,l,u,x){k=this.rewriteImageSource(k);k=this.images[k];if(null!=k&&0<k.height&&0<k.width){var E=this.ctx;E.save();if(l){l=k.width;var D=k.height,A=Math.min(f/l,c/D);b+=(f-l*A)/2;e+=(c-D*A)/2;f=l*A;c=D*A}u&&(E.translate(2*b+f,0),E.scale(-1,1));x&&(E.translate(0,2*e+c),E.scale(1,-1));E.drawImage(k,b,e,f,c);E.restore()}};mxJsCanvas.prototype.begin=function(){this.ctx.beginPath()};mxJsCanvas.prototype.close=function(){this.ctx.closePath()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l)for(u=0;u<l.length;u++)l[u].node.style.visibility=c?"visible":"hidden"};var f=mxGuide.prototype.destroy;mxGuide.prototype.destroy=function(){f.call(this);var c=this.guidesArrVer,k=this.guidesArrHor;if(null!=c){for(var l=0;l<c.length;l++)c[l].destroy();this.guidesArrVer=null}if(null!=k){for(l=0;l<k.length;l++)k[l].destroy();this.guidesArrHor=null}}})();function mxRuler(b,e,f,c){function k(){var B=b.diagramContainer;K.style.top=B.offsetTop-E+"px";K.style.left=B.offsetLeft-E+"px";K.style.width=(f?0:B.offsetWidth)+E+"px";K.style.height=(f?B.offsetHeight:0)+E+"px"}function l(B,F,I){if(null!=u)return B;var G;return function(){var S=this,U=arguments,N=I&&!G;clearTimeout(G);G=setTimeout(function(){G=null;I||B.apply(S,U)},F);N&&B.apply(S,U)}}var u=window.requestAnimationFrame||window.mozRequestAnimationFrame||window.webkitRequestAnimationFrame||window.msRequestAnimationFrame, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
q||"objects";var v=t.transaction([q],"readonly").objectStore(q).get(d);v.onsuccess=function(){g(v.result)};v.onerror=n}catch(B){null!=n&&n(B)}}),n)};EditorUi.prototype.getDatabaseItems=function(d,g,n){this.openDatabase(mxUtils.bind(this,function(q){try{n=n||"objects";var t=q.transaction([n],"readonly").objectStore(n).openCursor(IDBKeyRange.lowerBound(0)),v=[];t.onsuccess=function(B){null==B.target.result?d(v):(v.push(B.target.result.value),B.target.result.continue())};t.onerror=g}catch(B){null!=g&&
g(B)}}),g)};EditorUi.prototype.getDatabaseItemKeys=function(d,g,n){this.openDatabase(mxUtils.bind(this,function(q){try{n=n||"objects";var t=q.transaction([n],"readonly").objectStore(n).getAllKeys();t.onsuccess=function(){d(t.result)};t.onerror=g}catch(v){null!=g&&g(v)}}),g)};EditorUi.prototype.commentsSupported=function(){var d=this.getCurrentFile();return null!=d?d.commentsSupported():!1};EditorUi.prototype.commentsRefreshNeeded=function(){var d=this.getCurrentFile();return null!=d?d.commentsRefreshNeeded(): | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"geCommentActionLnk";mxUtils.write(Z,W);X.appendChild(Z);mxEvent.addListener(Z,"click",function(Y){V(Y,N);Y.preventDefault();mxEvent.consume(Y)});T.appendChild(X);Q&&(X.style.display="none")}function C(){function W(X){V.push(Q);if(null!=X.replies)for(var Z=0;Z<X.replies.length;Z++)Q=Q.nextSibling,W(X.replies[Z])}var V=[],Q=m;W(N);return{pdiv:Q,replies:V}}function L(W,V,Q,X,Z){function Y(){D(ba);N.addReply(da,function(sa){da.id=sa;N.replies.push(da);K(ba);Q&&Q()},function(sa){aa();A(ba);b.handleError(sa,
null,null,null,mxUtils.htmlEntities(mxResources.get("objectNotFound")))},X,Z)}function aa(){x(da,ba,function(sa){Y()},!0)}var ca=C().pdiv,da=b.newComment(W,b.getCurrentUser());da.pCommentId=N.id;null==N.replies&&(N.replies=[]);var ba=H(da,N.replies,ca,M+1);V?aa():Y()}if(p||!N.isResolved){B.style.display="none";var m=document.createElement("div");m.className="geCommentContainer";m.setAttribute("data-commentId",N.id);m.style.marginLeft=20*M+5+"px";N.isResolved&&!Editor.isDarkMode()&&(m.style.backgroundColor= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.state.y+this.state.height+(40>this.state.height?10:0)+2+"px")};var P=mxVertexHandler.prototype.setHandlesVisible;mxVertexHandler.prototype.setHandlesVisible=function(M){P.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.style.display=M?"":"none")};var R=mxVertexHandler.prototype.destroy;mxVertexHandler.prototype.destroy=function(M,p){R.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.parentNode.removeChild(this.moveHandle),this.moveHandle=null)}};if("undefined"!==typeof Sidebar){var f= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l?"&page="+l:""))+window.location.hash})})(f.items[c]);b(f.items)}),e)};DriveFile.prototype.getLatestVersion=function(b,e){this.ui.drive.getFile(this.getId(),b,e,!0)};DriveFile.prototype.getChannelId=function(){var b=this.ui.drive.getCustomProperty(this.desc,"channel");null!=b&&(b="G-"+this.getId()+"."+b);return b};DriveFile.prototype.getChannelKey=function(){return this.ui.drive.getCustomProperty(this.desc,"key")};DriveFile.prototype.getLastModifiedDate=function(){return new Date(this.desc.modifiedDate)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.ui.pages.push(this.ui.createPage());0>mxUtils.indexOf(this.ui.pages,this.ui.currentPage)&&this.ui.selectPage(this.ui.pages[0],!0)}finally{x.container.style.visibility="";x.model.endUpdate();x.cellRenderer.redraw=K;this.changeListenerEnabled=E;f||(k.history=l,k.indexOfNextAdd=u,k.fireEvent(new mxEventObject(mxEvent.CLEAR)));if(null==this.ui.currentPage||this.ui.currentPage.needsUpdate)A!=x.mathEnabled?(this.ui.editor.updateGraphComponents(),x.refresh()):(D!=x.foldingEnabled?x.view.revalidate():
x.view.validate(),x.sizeDidChange());null!=this.sync&&this.isRealtime()&&!c&&(this.sync.snapshot=this.ui.clonePages(this.ui.pages));this.ui.editor.fireEvent(new mxEventObject("pagesPatched","patches",b))}EditorUi.debug("DrawioFile.patch",[this],"patches",b,"resolver",e,"undoable",f)}return b}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
B)}})));d(v);v.onversionchange=function(){v.close()}}catch(B){null!=g?g(B):null!=window.console&&console.warn(B)}});q.onerror=g;q.onblocked=function(){}}catch(t){null!=g?g(t):null!=window.console&&console.error(t)}else null!=g&&g(Error("IndexedDB not supported"))}else d(this.database)};EditorUi.prototype.setDatabaseItem=function(d,g,n,q,t){this.openDatabase(mxUtils.bind(this,function(v){try{t=t||"objects";Array.isArray(t)||(t=[t],d=[d],g=[g]);var B=v.transaction(t,"readwrite");B.oncomplete=n;B.onerror=
q;for(v=0;v<t.length;v++)B.objectStore(t[v]).put(null!=d&&null!=d[v]?{key:d[v],data:g[v]}:g[v])}catch(F){null!=q&&q(F)}}),q)};EditorUi.prototype.removeDatabaseItem=function(d,g,n,q){this.openDatabase(mxUtils.bind(this,function(t){q=q||"objects";Array.isArray(q)||(q=[q],d=[d]);t=t.transaction(q,"readwrite");t.oncomplete=g;t.onerror=n;for(var v=0;v<q.length;v++)t.objectStore(q[v]).delete(d[v])}),n)};EditorUi.prototype.getDatabaseItem=function(d,g,n,q){this.openDatabase(mxUtils.bind(this,function(t){try{q= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(m){if(null!=m){Editor.prototype.fontCss=m;var z=document.getElementsByTagName("script")[0];if(null!=z&&null!=z.parentNode){var J=document.createElement("style");J.setAttribute("type","text/css");J.appendChild(document.createTextNode(m));z.parentNode.insertBefore(J,z);m=m.split("url(");for(J=1;J<m.length;J++){var O=m[J].indexOf(")");O=Editor.trimCssUrl(m[J].substring(0,O));var T=document.createElement("link");T.setAttribute("rel","preload");T.setAttribute("href",O);T.setAttribute("as","font");
T.setAttribute("crossorigin","");z.parentNode.insertBefore(T,z)}}}};Editor.trimCssUrl=function(m){return m.replace(RegExp("^[\\s\"']+","g"),"").replace(RegExp("[\\s\"']+$","g"),"")};Editor.GOOGLE_FONTS="https://fonts.googleapis.com/css?family=";Editor.GUID_ALPHABET="0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ-_";Editor.GUID_LENGTH=20;Editor.guid=function(m){m=null!=m?m:Editor.GUID_LENGTH;for(var z=[],J=0;J<m;J++)z.push(Editor.GUID_ALPHABET.charAt(Math.floor(Math.random()*Editor.GUID_ALPHABET.length))); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"Invalid data",toString:function(){return this.message}};};var e=Editor.prototype.getGraphXml;Editor.prototype.getGraphXml=function(m,z){m=null!=m?m:!0;var J=e.apply(this,arguments);null!=this.graph.currentStyle&&"default-style2"!=this.graph.currentStyle&&J.setAttribute("style",this.graph.currentStyle);var O=this.graph.getBackgroundImageObject(this.graph.backgroundImage,z);null!=O&&J.setAttribute("backgroundImage",JSON.stringify(O));J.setAttribute("math",this.graph.mathEnabled?"1":"0");J.setAttribute("shadow", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
2;t.style.border="3px dotted rgb(254, 137, 12)";t.style.pointerEvents="none";t.style.position="absolute";t.style.top=g+"px";t.style.left=n+"px";t.style.width=Math.max(0,v-3)+"px";t.style.height=Math.max(0,q-3)+"px";null!=d&&d.parentNode==this.editor.graph.container?this.editor.graph.container.appendChild(t):document.body.appendChild(t);return t};EditorUi.prototype.stringToCells=function(d){d=mxUtils.parseXml(d);var g=this.editor.extractGraphModel(d.documentElement);d=[];if(null!=g){var n=new mxCodec(g.ownerDocument),
q=new mxGraphModel;n.decode(g,q);g=q.getChildAt(q.getRoot(),0);for(n=0;n<q.getChildCount(g);n++)d.push(q.getChildAt(g,n))}return d};EditorUi.prototype.openFileHandle=function(d,g,n,q,t){if(null!=g&&0<g.length){if(!this.useCanvasForExport&&/(\.png)$/i.test(g)||/(\.pdf)$/i.test(g))g=g.substring(0,g.length-4),/(\.drawio)$/i.test(g)||(g+=".drawio");var v=mxUtils.bind(this,function(F){g=0<=g.lastIndexOf(".")?g.substring(0,g.lastIndexOf("."))+".drawio":g+".drawio";if("<mxlibrary"==F.substring(0,10)){null== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
ca:null)},b.mode!=App.MODE_GOOGLE||null==b.stateArg||null==b.stateArg.folderId)}}function G(fa,ma,na,oa,ia,ja,wa){null!=ba&&(ba.style.backgroundColor="transparent",ba.style.border="1px solid transparent");L.removeAttribute("disabled");da=ma;aa=na;ca=ja;ba=fa;sa=oa;za=wa;Ba=ia;ba.style.backgroundColor=x;ba.style.border=E}function S(fa,ma,na,oa,ia,ja,wa,xa,Ka,Ja,Aa){function La(Na,Ya){null==Ma?(Oa=Na,Oa=/^https?:\/\//.test(Oa)&&!b.editor.isCorsEnabledForUrl(Oa)?PROXY_URL+"?url="+encodeURIComponent(Oa):
TEMPLATE_PATH+"/"+Oa,mxUtils.get(Oa,mxUtils.bind(this,function(Wa){200<=Wa.getStatus()&&299>=Wa.getStatus()&&(Ma=Wa.getText());Ya(Ma,Oa)}))):Ya(Ma,Oa)}function Da(Na,Ya){if(null==fa||z||b.sidebar.currentElt==va)b.sidebar.hideTooltip();else if(b.sidebar.hideTooltip(),null!=J){var Wa="<mxfile><diagram>"+Graph.compress('<mxGraphModel><root><mxCell id="0"/><mxCell id="1" parent="0"/><mxCell id="2" value="" style="shape=image;image='+J.src+';imageAspect=1;" parent="1" vertex="1"><mxGeometry width="'+J.naturalWidth+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
var X=this.fill,Z=this.stroke;this.stroke=this.fill=null;var Y=this.configurePointerEvents,aa=W.setStrokeColor;W.setStrokeColor=function(){};var ca=W.setFillColor;W.setFillColor=function(){};Q||null==X||(this.configurePointerEvents=function(){});W.handJiggle.passThrough=!0;O.apply(this,arguments);W.handJiggle.passThrough=!1;W.setFillColor=ca;W.setStrokeColor=aa;this.configurePointerEvents=Y;this.stroke=Z;this.fill=X;W.restore();Q&&null!=X&&(W.addTolerance=function(){})}O.apply(this,arguments);W.addTolerance= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(d,g,n){var q=new XMLHttpRequest;q.open("POST",OPEN_URL);q.setRequestHeader("Content-Type","application/x-www-form-urlencoded");q.onreadystatechange=function(){g(q)};q.send("format=xml&filename="+encodeURIComponent(n)+"&data="+encodeURIComponent(d));try{EditorUi.logEvent({category:"GLIFFY-IMPORT-FILE",action:"size_"+file.size})}catch(t){}};EditorUi.prototype.isResampleImageSize=function(d,g){g=null!=g?g:this.resampleThreshold;return d>g};EditorUi.prototype.resizeImage=function(d,g,n,q,t,v, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxAsyncCanvas.prototype.setFontFamily=function(b){this.state.fontFamily=b};mxAsyncCanvas.prototype.setFontStyle=function(b){this.state.fontStyle=b};mxAsyncCanvas.prototype.rect=function(b,e,f,c){};mxAsyncCanvas.prototype.roundrect=function(b,e,f,c,k,l){};mxAsyncCanvas.prototype.ellipse=function(b,e,f,c){};mxAsyncCanvas.prototype.rewriteImageSource=function(b){if("http://"==b.substring(0,7)||"https://"==b.substring(0,8))b="/proxy?url="+encodeURIComponent(b);return b}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.recentCustomFonts[O]=T,z=document.getElementsByTagName("head")[0],null!=J&&("link"==T.elt.nodeName.toLowerCase()?(T.elt.onload=J,T.elt.onerror=J):J()),null!=z&&z.appendChild(T.elt)):null!=J&&J()}else null!=J&&J()}else null!=J&&J();return m};Graph.getFontUrl=function(m,z){m=Graph.customFontElements[m.toLowerCase()];null!=m&&(z=m.url);return z};Graph.processFontAttributes=function(m){m=m.getElementsByTagName("*");for(var z=0;z<m.length;z++){var J=m[z].getAttribute("data-font-src");if(null!=J){var O= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return S};EditorUi.prototype.getXmlFileData=function(d,g,n,q){d=null!=d?d:!0;g=null!=g?g:!1;n=null!=n?n:!Editor.defaultCompressed;var t=this.editor.getGraphXml(d,q);if(d&&null!=this.fileNode&&null!=this.currentPage)if(d=function(I){var G=I.getElementsByTagName("mxGraphModel");G=0<G.length?G[0]:null;null==G&&n?(G=mxUtils.trim(mxUtils.getTextContent(I)),I=I.cloneNode(!1),0<G.length&&(G=Graph.decompress(G),null!=G&&0<G.length&&I.appendChild(mxUtils.parseXml(G).documentElement))):null==G||n?I=I.cloneNode(!0):
(I=I.cloneNode(!1),mxUtils.setTextContent(I,Graph.compressNode(G)));t.appendChild(I)},EditorUi.removeChildNodes(this.currentPage.node),mxUtils.setTextContent(this.currentPage.node,Graph.compressNode(t)),t=this.fileNode.cloneNode(!1),g)d(this.currentPage.node);else for(g=0;g<this.pages.length;g++){var v=this.pages[g],B=v.node;if(v!=this.currentPage)if(v.needsUpdate){var F=new mxCodec(mxUtils.createXmlDocument());F=F.encode(new mxGraphModel(v.root));this.editor.graph.saveViewState(v.viewState,F,null, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
aa=Array(Y.length);for(var ca=0;ca<Y.length;ca++)aa[ca]=String.fromCharCode(Y[ca]);aa=aa.join("")}W=null!=W?W:"data:image/png;base64,";aa=W+Editor.base64Encode(aa)}z(aa)}}else null!=J&&(0==Y.getStatus()?J({message:mxResources.get("accessDenied")},Y):404==Y.getStatus()?J({message:mxResources.get("fileNotFound"),code:Y.getStatus()},Y):J({message:this.getErrorMessage(Y)},Y))}),function(Y){null!=J&&J({message:mxResources.get("error")+" "+Y.getStatus()})},X,this.timeout,function(){T&&null!=J&&J({code:App.ERROR_TIMEOUT,
retry:Z})},Q)});Z()}catch(Y){null!=J&&J(Y)}};Editor.prototype.getErrorMessage=function(m){var z=mxResources.get("error")+" "+m.getStatus();try{var J=m.getText(),O=JSON.parse(J);null!=O&&null!=O.error&&null!=O.error.message&&(z=O.error.message+" ("+z+")")}catch(T){}return z};Editor.prototype.absoluteCssFonts=function(m){var z=null;if(null!=m){var J=m.split("url(");if(0<J.length){z=[J[0]];m=window.location.pathname;var O=null!=m?m.lastIndexOf("/"):-1;0<=O&&(m=m.substring(0,O+1));O=document.getElementsByTagName("base"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Math.round(Math.pow(2,x)*(1+.1*(Math.random()-.5))*this.coolOff))):null!=k&&k(g):k(g)}}}catch(t){if(null!=k)k(t);else throw t;}}))}catch(d){if(null!=k)k(d);else throw d;}});null!=b&&this.authCalled?E():this.execute(E)}catch(D){if(null!=k)k(D);else throw D;}};DriveClient.prototype.createAuthWin=function(f){return window.open(f?f:"about:blank","gdauth",["width=525,height=525","top="+(window.screenY+Math.max(window.outerHeight-525,0)/2),"left="+(window.screenX+Math.max(window.outerWidth-525,0)/2),"status=no,resizable=yes,toolbar=no,menubar=no,scrollbars=yes"].join())}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.