code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
else if("sfnt"==V||/(\.sfnt)($|\?)/i.test(X))Z="application/font-sfnt";this.mapFontUrl(Z,X,mxUtils.bind(this,function(Y,aa){this.loadUrl(aa,mxUtils.bind(this,function(ca){this.cachedFonts[X]=ca;O--;T()}),mxUtils.bind(this,function(ca){O--;T()}),!0,null,"data:"+Y+";charset=utf-8;base64,")}))}})(Editor.trimCssUrl(J[m].substring(0,W)),V)}T()}else z(m)};Editor.prototype.loadFonts=function(m){null!=this.fontCss&&null==this.resolvedFontCss?this.embedCssFonts(this.fontCss,mxUtils.bind(this,function(z){this.resolvedFontCss= z;null!=m&&m()})):null!=m&&m()};Editor.prototype.createGoogleFontCache=function(){var m={},z;for(z in Graph.fontMapping)Graph.isCssFontUrl(z)&&(m[z]=Graph.fontMapping[z]);return m};Editor.prototype.embedExtFonts=function(m){var z=this.graph.getCustomFonts();if(0<z.length){var J=[],O=0;null==this.cachedGoogleFonts&&(this.cachedGoogleFonts=this.createGoogleFontCache());for(var T=mxUtils.bind(this,function(){0==O&&this.embedCssFonts(J.join(""),m)}),W=0;W<z.length;W++)mxUtils.bind(this,function(V,Q){Graph.isCssFontUrl(Q)?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(function(){var b=new mxObjectCodec(new ChangeGridColor,["ui"]);b.beforeDecode=function(e,f,c){c.ui=e.ui;return f};mxCodecRegistry.register(b)})();(function(){EditorUi.VERSION="21.3.8";EditorUi.compactUi="atlas"!=Editor.currentTheme;Editor.isDarkMode()&&(mxGraphView.prototype.gridColor=mxGraphView.prototype.defaultDarkGridColor);EditorUi.enableLogging="1"!=urlParams.stealth&&"1"!=urlParams.lockdown&&(/.*\.draw\.io$/.test(window.location.hostname)||/.*\.diagrams\.net$/.test(window.location.hostname))&&"support.draw.io"!=window.location.hostname;EditorUi.drawHost=window.DRAWIO_BASE_URL;EditorUi.lightboxHost=window.DRAWIO_LIGHTBOX_URL;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(null==R.getCell()||R.getCell()==H)};K.panningHandler.isForcePanningEvent=function(R){return 2==R.evt.button};var d=K.isCellSelectable;K.isCellSelectable=function(R){return R==H?!1:d.apply(this,arguments)};K.getLinkForCell=function(){return null};var g=K.view.getState(H);A=K.getAllConnectionConstraints(g);for(var n=0;null!=A&&n<A.length;n++){var q=K.getConnectionPoint(g,A[n]);l(q.x-3,q.y-3,A[n])}K.fit(8);K.center();n=b.createToolbarButton(Editor.zoomInImage,mxResources.get("zoomIn"),function(){K.zoomIn()},
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
if(null!=Y.tags.visible){null==da&&(da=[]);var ba=this.getAllTags();for(ca=0;ca<ba.length;ca++)0>mxUtils.indexOf(Y.tags.visible,ba[ca])&&0>mxUtils.indexOf(da,ba[ca])&&da.push(ba[ca])}null!=da&&this.setHiddenTags(da);this.refresh()}0<aa.length&&(O++,this.executeAnimations(aa,Q,Z?1:Y.steps,Z?0:Y.delay));0==O?X():V()}else this.stoppingCustomActions=this.executingCustomActions=!1,V(),null!=z&&z()});X()}};Graph.prototype.doUpdateCustomLinksForCell=function(m,z){var J=this.getLinkForCell(z);null!=J&&"data:action/json,"== J.substring(0,17)&&this.setLinkForCell(z,this.updateCustomLink(m,J));if(this.isHtmlLabel(z)){var O=document.createElement("div");O.innerHTML=Graph.sanitizeHtml(this.getLabel(z));for(var T=O.getElementsByTagName("a"),W=!1,V=0;V<T.length;V++)J=T[V].getAttribute("href"),null!=J&&"data:action/json,"==J.substring(0,17)&&(T[V].setAttribute("href",this.updateCustomLink(m,J)),W=!0);W&&this.labelChanged(z,O.innerHTML)}};Graph.prototype.updateCustomLink=function(m,z){if("data:action/json,"==z.substring(0,17))try{var J=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
S.style.display="none";l=mxUtils.button(l||mxResources.get("edit"),function(){c.apply(this,[K.value])});l.className="geBtn gePrimaryBtn";d=document.createElement("div");d.style.position="absolute";d.style.bottom="30px";d.style.right="40px";d.style.textAlign="right";g=document.createElement("div");g.className="geToolbarContainer";g.style.cssText="box-shadow:none !important;background-color:transparent;padding:2px;border-style:none !important;bottom:30px;";this.init=function(){function U(M){if(null!= M){var p=M.getAttribute("background");if(null==p||""==p||p==mxConstants.NONE)p=Editor.isDarkMode()?"transparent":"#ffffff";q.style.backgroundColor=p;(new mxCodec(M.ownerDocument)).decode(M,t.getModel());t.maxFitScale=1;t.fit(8);t.center()}return M}function N(M){null!=M&&(M=U(Editor.parseDiagramNode(M)));return M}mxEvent.addListener(S,"change",function(M){F=parseInt(S.value);N(I[F]);mxEvent.consume(M)});if("mxfile"==B.nodeName){var P=B.getElementsByTagName("diagram");I=[];for(var R=0;R<P.length;R++)I.push(P[R]);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){null!=v&&(v(),v=null);b.showImageDialog(mxResources.get("addImageUrl"),"",function(S,U,N){F=!1;if(null!=S){if("data:image/"==S.substring(0,11)){var P=S.indexOf(",");0<P&&(S=S.substring(0,P)+";base64,"+S.substring(P+1))}x(S,null,0,0,U,N);d.scrollTop=d.scrollHeight}})});e.setAttribute("id","btnAddImageUrl");e.className="geBtn";c.appendChild(e);this.saveBtnClickHandler=function(S,U,N,P){b.saveLibrary(S,U,N,P)};e=mxUtils.button(mxResources.get("save"),mxUtils.bind(this,function(){null!=v&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var SaveDialog=function(b,e,f,c,k){function l(B,F,I,G,S,U){S=null!=S?S:b.getTitleForService(B);var N=null;if(0<=mxUtils.indexOf(t,B)||null!=b.getServiceForName(B)){N=document.createElement("option");if(U)N.innerHTML=mxUtils.htmlEntities(S)+"&nbsp;&nbsp;&#8211&nbsp;&nbsp;"+mxUtils.htmlEntities(mxResources.get("pickFolder"))+"...",N.setAttribute("value","pickFolder-"+B),N.setAttribute("title",S+" - "+mxResources.get("pickFolder")+"...");else{U=B+(null!=I?"-"+I:"");var P=v[U];null!=P&&null!=P.option&& P.option.parentNode.removeChild(P.option);P=null;if(null!=F){"/"==F.charAt(F.length-1)&&(F=F.substring(0,F.length-1));"/"==F.charAt(0)&&(F=F.substring(1));P=F;var R=P.lastIndexOf("/");0<=R&&(P=P.substring(R+1));25<P.length&&(P=P.substring(0,25)+"...")}N.innerHTML=(null!=P?mxUtils.htmlEntities(P)+"&nbsp;&nbsp;&#8211&nbsp;&nbsp;":"")+mxUtils.htmlEntities(S);N.setAttribute("title",S+(null!=F?" ("+F+")":"")+(null!=I&&decodeURIComponent(I)!=F?" ["+I+"]":""));N.setAttribute("value",U);v[U]={option:N,mode:B, path:F,id:I};null==G&&null==I&&(G=b.mode==B);G&&N.setAttribute("selected","selected")}n.appendChild(N)}return N}function u(B){b.pickFolder(B,function(F){var I=null;B==App.MODE_GOOGLE&&null!=F.docs&&0<F.docs.length?I={mode:B,path:F.docs[0].name,id:F.docs[0].id}:B==App.MODE_ONEDRIVE&&null!=F.value&&0<F.value.length?I={mode:B,path:F.value[0].name,id:F.value[0].id}:(B==App.MODE_GITHUB||B==App.MODE_GITLAB)&&null!=F&&0<F.length&&(I={mode:B,path:decodeURIComponent(F),id:F});null!=I&&(q.style.display="",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
t.pasteCounter=0);var B=t.pasteCounter*t.gridSize;if(n||this.isCompatibleString(d))v=this.importXml(d,B,B),t.setSelectionCells(v);else if(g&&1==t.getSelectionCount()){B=t.getStartEditingCell(t.getSelectionCell(),q);if(/\.(gif|jpg|jpeg|tiff|png|svg)$/i.test(d)&&"image"==t.getCurrentCellStyle(B)[mxConstants.STYLE_SHAPE])t.setCellStyles(mxConstants.STYLE_IMAGE,d,[B]);else{t.model.beginUpdate();try{t.labelChanged(B,d),Graph.isLink(d)&&t.setLinkForCell(B,d)}finally{t.model.endUpdate()}}t.setSelectionCell(B)}else v= t.getInsertPoint(),t.isMouseInsertPoint()&&(B=0,t.lastPasteXml==d&&0<t.pasteCounter&&t.pasteCounter--),v=this.insertTextAt(d,v.x+B,v.y+B,!0),t.setSelectionCells(v);t.isSelectionEmpty()||(t.scrollCellToVisible(t.getSelectionCell()),null!=this.hoverIcons&&this.hoverIcons.update(t.view.getState(t.getSelectionCell())));return v};EditorUi.prototype.pasteCells=function(d,g,n,q){if(!mxEvent.isConsumed(d)){var t=g,v=!1;if(n&&null!=d.clipboardData&&d.clipboardData.getData){var B=d.clipboardData.getData("text/plain"),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
P()},mxEvent.addListener(A,"scroll",t))}),n)}}))});b?this.user?F():this.updateUser(function(){F()},n,!0):this.authenticate(mxUtils.bind(this,function(){this.updateUser(function(){F()},n,!0)}),n)};GitLabClient.prototype.logout=function(){this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken();this.setUser(null);b=null;this.setToken(null)}})();DrawioComment=function(b,e,f,c,k,l,u){this.file=b;this.id=e;this.content=f;this.modifiedDate=c;this.createdDate=k;this.isResolved=l;this.user=u;this.replies=[]};DrawioComment.prototype.addReplyDirect=function(b){null!=b&&this.replies.push(b)};DrawioComment.prototype.addReply=function(b,e,f,c,k){e()};DrawioComment.prototype.editComment=function(b,e,f){e()};DrawioComment.prototype.deleteComment=function(b,e){b()};DriveComment=function(b,e,f,c,k,l,u,x){DrawioComment.call(this,b,e,f,c,k,l,u);this.pCommentId=x};mxUtils.extend(DriveComment,DrawioComment);DriveComment.prototype.addReply=function(b,e,f,c,k){b={content:b.content};c?b.verb="resolve":k&&(b.verb="reopen");this.file.ui.drive.executeRequest({url:"/files/"+this.file.getId()+"/comments/"+this.id+"/replies",params:b,method:"POST"},mxUtils.bind(this,function(l){e(l.replyId)}),f)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g.parentNode&&g.parentNode.removeChild(g)}))};var A=!1;EditorUi.prototype.initFormatWindow=function(){if(!A&&null!=this.formatWindow){A=!0;var H=this.formatWindow.window.toggleMinimized,d=240;this.formatWindow.window.toggleMinimized=function(){H.apply(this,arguments);this.minimized?(d=parseInt(this.div.style.width),this.div.style.width="140px",this.table.style.width="140px",this.div.style.left=parseInt(this.div.style.left)+d-140+"px"):(this.div.style.width=d+"px",this.table.style.width=this.div.style.width, this.div.style.left=Math.max(0,parseInt(this.div.style.left)-d+140)+"px");this.fit()};mxEvent.addListener(this.formatWindow.window.title,"dblclick",mxUtils.bind(this,function(g){mxEvent.getSource(g)==this.formatWindow.window.title&&this.formatWindow.window.toggleMinimized()}))}};var K=EditorUi.prototype.init;EditorUi.prototype.init=function(){function H(Q,X,Z){var Y=v.menus.get(Q),aa=G.addMenu(mxResources.get(Q),mxUtils.bind(this,function(){Y.funct.apply(this,arguments)}),I);aa.className="geMenuItem";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d){var g=e.apply(this,arguments);if(null==g)try{var n=d.indexOf("&lt;mxfile ");if(0<=n){var q=d.lastIndexOf("&lt;/mxfile&gt;");q>n&&(g=d.substring(n,q+15).replace(/&gt;/g,">").replace(/&lt;/g,"<").replace(/\\&quot;/g,'"').replace(/\n/g,""))}else{var t=mxUtils.parseXml(d),v=this.editor.extractGraphModel(t.documentElement,null!=this.pages||"hidden"==this.diagramContainer.style.visibility);g=null!=v?mxUtils.getXml(v):""}}catch(B){}return g};EditorUi.prototype.validateFileData=function(d){if(null!= d&&0<d.length){var g=d.indexOf('<meta charset="utf-8">');0<=g&&(d=d.slice(0,g)+'<meta charset="utf-8"/>'+d.slice(g+23-1,d.length));d=Graph.zapGremlins(d)}return d};EditorUi.prototype.replaceFileData=function(d){d=this.validateFileData(d);d=null!=d&&0<d.length?mxUtils.parseXml(d).documentElement:null;var g=null!=d?this.editor.extractGraphModel(d,!0):null;null!=g&&(d=g);if(null!=d){g=this.editor.graph;g.model.beginUpdate();try{var n=null!=this.pages?this.pages.slice():null,q=d.getElementsByTagName("diagram");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.diagramContainer.scrollLeft+=d.x-g.x;this.diagramContainer.scrollTop+=d.x-g.x};EditorUi.prototype.isAutoDarkModeSupported=function(){return null!=window.matchMedia};EditorUi.prototype.isAutoDarkMode=function(d){return!d&&"auto"==urlParams.dark||Editor.isSettingsEnabled()&&("auto"==mxSettings.settings.darkMode||"draw.io"==this.getServiceName()&&"1"!=urlParams.embed&&(!this.editor.chromeless||this.editor.editable)&&null==mxSettings.settings.darkMode)};EditorUi.prototype.setDarkMode=function(d){this.doSetDarkMode(d, mxUtils.bind(this,function(){this.fireEvent(new mxEventObject("darkModeChanged"))}),mxUtils.bind(this,function(g){null!=window.console&&console.error(g);this.editor.setStatus(g.message)}))};EditorUi.prototype.createDarkStyle=function(){var d=document.createElement("link");d.setAttribute("rel","stylesheet");d.setAttribute("href",STYLE_PATH+"/dark.css");d.setAttribute("charset","UTF-8");d.setAttribute("type","text/css");return d};EditorUi.prototype.doSetDarkMode=function(d,g,n){var q=mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Xa?this.src=Xa:(this.src=Editor.errorImage,this.onerror=null)};mxEvent.addGestureListeners(va,mxUtils.bind(this,function(Na){G(va,null,null,fa,wa,Aa)}),null,null);mxEvent.addListener(va,"dblclick",function(Na){I();mxEvent.consume(Na)})}else if(!Ja&&null!=fa&&0<fa.length){var Sa=function(Na){L.setAttribute("disabled","disabled");va.style.backgroundColor="transparent";va.style.border="1px solid transparent";C.spin(ha);La(fa,function(Ya,Wa){C.stop();null!=Ya&&(G(va,Ya,ma,null,null,Aa,Wa),Na&&I())})};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(W,V,Q,X,Z,Y){this.passThrough?this.originalRoundrect.apply(this.canvas,arguments):(this.begin(),this.moveTo(W+Z,V),this.lineTo(W+Q-Z,V),this.quadTo(W+Q,V,W+Q,V+Y),this.lineTo(W+Q,V+X-Y),this.quadTo(W+Q,V+X,W+Q-Z,V+X),this.lineTo(W+Z,V+X),this.quadTo(W,V+X,W,V+X-Y),this.lineTo(W,V+Y),this.quadTo(W,V,W+Z,V))};m.prototype.drawPath=function(W){if(0<this.path.length){this.passThrough=!0;try{this.rc.path(this.path.join(" "),W)}catch(Q){}this.passThrough=!1}else if(null!=this.nextShape){for(var V in W)this.nextShape.options[V]=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
method:"PUT",contentType:"application/json; charset=UTF-8",params:c}};DriveClient.prototype.getLibrary=function(f,c,k){return this.getFile(f,c,k,!0,!0)};DriveClient.prototype.loadDescriptor=function(f,c,k,l){this.executeRequest({url:"/files/"+f+"?supportsAllDrives=true&fields="+(null!=l?l:this.allFields)},c,k)};DriveClient.prototype.listFiles=function(f,c,k,l,u){this.executeRequest({url:"/files?supportsAllDrives=true&includeItemsFromAllDrives=true&q="+encodeURIComponent("(mimeType contains '"+this.xmlMimeType+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e.prev.getId():"";null!=e.page.getName()&&b[E].getName()!=e.page.getName()&&(K.name=e.page.getName());mxUtils.isEmptyObject(K)||(u[D]=K)}delete l[b[E].getId()];x=b[E]}for(D in l)e=l[D],f.push({id:e.page.getId(),data:mxUtils.getXml(e.page.node),previous:null!=e.prev?e.prev.getId():""});mxUtils.isEmptyObject(u)||(k[EditorUi.DIFF_UPDATE]=u);0<c.length&&(k[EditorUi.DIFF_REMOVE]=c);0<f.length&&(k[EditorUi.DIFF_INSERT]=f)}return k};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxEvent.getClientX(M),mxEvent.getClientY(M),this.graph.getSubtree(this.state.cell));this.graph.graphHandler.cellWasClicked=!0;this.graph.isMouseTrigger=mxEvent.isMouseEvent(M);this.graph.isMouseDown=!0;d.hoverIcons.reset();mxEvent.consume(M)})))};var N=mxVertexHandler.prototype.redrawHandles;mxVertexHandler.prototype.redrawHandles=function(){N.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.style.left=this.state.x+this.state.width+(40>this.state.width?10:0)+2+"px",this.moveHandle.style.top= this.state.y+this.state.height+(40>this.state.height?10:0)+2+"px")};var P=mxVertexHandler.prototype.setHandlesVisible;mxVertexHandler.prototype.setHandlesVisible=function(M){P.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.style.display=M?"":"none")};var R=mxVertexHandler.prototype.destroy;mxVertexHandler.prototype.destroy=function(M,p){R.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.parentNode.removeChild(this.moveHandle),this.moveHandle=null)}};if("undefined"!==typeof Sidebar){var f=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d){return 1!=d};EditorUi.prototype.getEditBlankXml=function(){return this.getFileData(!0)};EditorUi.prototype.exportFile=function(d,g,n,q,t,v){};EditorUi.prototype.getServiceForName=function(d){return null};EditorUi.prototype.getTitleForService=function(d){return mxResources.get(d)};EditorUi.prototype.pickFolder=function(d,g,n){g(null)};EditorUi.prototype.exportSvg=function(d,g,n,q,t,v,B,F,I,G,S,U,N,P){if(this.spinner.spin(document.body,mxResources.get("export")))try{var R=this.editor.graph.isSelectionEmpty();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
App.prototype.addLanguageMenu=function(b,e,f){var c=null;null!=this.menus.get("language")&&(c=document.createElement("div"),c.setAttribute("title",mxResources.get("language")),c.className="atlas"!=Editor.currentTheme?"geIcon geAdaptiveAsset":"",c.style.backgroundImage="url("+Editor.globeImage+")",c.style.backgroundPosition="right center",c.style.backgroundRepeat="no-repeat",c.style.backgroundSize="19px 19px",c.style.width="19px",c.style.height="19px",mxUtils.setOpacity(c,40),c.style.position="absolute", c.style.cursor="pointer",c.style.bottom="20px",c.style.right=null!=f?f:"22px",e&&(c.style.direction="rtl",c.style.textAlign="right",c.style.right=null!=f?f:"24px",e=document.createElement("span"),e.style.display="inline-block",e.style.fontSize="12px",e.style.margin="2px 24px 0 0",e.style.userSelect="none",mxUtils.write(e,mxResources.get("language")),c.appendChild(e),e.className="atlas"!=Editor.currentTheme?"geAdaptiveAsset":""),mxEvent.addListener(c,"click",mxUtils.bind(this,function(k){this.editor.graph.popupMenuHandler.hideMenu(); var l=new mxPopupMenu(this.menus.get("language").funct);l.div.className+=" geMenubarMenu";l.smartSeparators=!0;l.showDisabled=!0;l.autoExpand=!0;l.hideMenu=mxUtils.bind(this,function(){mxPopupMenu.prototype.hideMenu.apply(l,arguments);l.destroy()});var u=mxUtils.getOffset(c);l.popup(u.x,u.y+c.offsetHeight,null,k);this.setCurrentMenu(l)})),b.appendChild(c));return c};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
1)),null!=u&&0<u.length&&(l=u));this.insertFile(e.name,l,mxUtils.bind(this,function(x){f(e.name,x)}),c)}),mxUtils.bind(this,function(){this.ui.spinner.stop()})):(this.ui.spinner.stop(),c({message:mxResources.get("errorLoadingFile")}))}),c,k)}})();OneDriveFile=function(b,e,f){DrawioFile.call(this,b,e);this.meta=f};mxUtils.extend(OneDriveFile,DrawioFile);OneDriveFile.prototype.autosaveDelay=500;OneDriveFile.prototype.isRealtimeSupported=function(){return!0};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m.ownerSVGElement.parentNode.insertBefore(this.webKitForceRepaintNode,m.ownerSVGElement))}};var N=Graph.prototype.refresh;Graph.prototype.refresh=function(){N.apply(this,arguments);this.refreshBackgroundImage()};Graph.prototype.refreshBackgroundImage=function(){null!=this.backgroundImage&&null!=this.backgroundImage.originalSrc&&(this.setBackgroundImage(this.backgroundImage),this.view.validateBackgroundImage())};var P=Graph.prototype.loadStylesheet;Graph.prototype.loadStylesheet=function(){P.apply(this, arguments);this.currentStyle="default-style2"};Graph.prototype.handleCustomLink=function(m){"data:action/json,"==m.substring(0,17)&&(m=JSON.parse(m.substring(17)),null!=m.actions&&this.executeCustomActions(m.actions))};Graph.prototype.executeCustomActions=function(m,z){if(this.executingCustomActions)this.stoppingCustomActions=!0,null!=this.pendingWaitThread&&window.clearTimeout(this.pendingWaitThread),null!=this.pendingExecuteNextAction&&this.pendingExecuteNextAction(),this.fireEvent(new mxEventObject("stopExecutingCustomActions"));
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(ja?"geTempDlgRadioBtnLarge":"geTempDlgRadioBtnSmall");C.querySelector("."+fa).src="/images/"+ma+"-sel.svg";C.querySelector("."+oa).src="/images/"+ia+".svg";return!0}function v(ka,fa,ma,na){function oa(xa,Ka){null==ja?(xa=/^https?:\/\//.test(xa)&&!b.editor.isCorsEnabledForUrl(xa)?PROXY_URL+"?url="+encodeURIComponent(xa):TEMPLATE_PATH+"/"+xa,mxUtils.get(xa,mxUtils.bind(this,function(Ja){200<=Ja.getStatus()&&299>=Ja.getStatus()&&(ja=Ja.getText());Ka(ja)}))):Ka(ja)}function ia(xa,Ka,Ja){if(null!=xa&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
z);EditorUi.debug("P2PCollab: error socket on",L.joinId);N||M!=L.joinId||(R==M&&(EditorUi.debug("P2PCollab: joinInProgress in error on",L.joinId),R=!1),m||(EditorUi.debug("P2PCollab: calling rejoin on",L.joinId),m=!0,this.joinFile(!0)));e.file.fireEvent(new mxEventObject("realtimeStateChanged"))}));e.file.fireEvent(new mxEventObject("realtimeStateChanged"))}catch(z){p=z,e.file.fireEvent(new mxEventObject("realtimeStateChanged"))}};this.destroy=function(){if(!N){EditorUi.debug("P2PCollab: destroyed"); N=!0;for(sessionId in g)D(sessionId);null!=this.mouseListeners&&A.removeMouseListener(this.mouseListeners);null!=this.selectionChangeListener&&A.getSelectionModel().removeListener(this.selectionChangeListener);null!=this.shareCursorPositionListener&&b.removeListener(this.shareCursorPositionListener);null!=this.cursorHandler&&(mxEvent.removeListener(A.container,"scroll",this.cursorHandler),A.getView().removeListener(mxEvent.SCALE,this.cursorHandler),A.getView().removeListener(mxEvent.TRANSLATE,this.cursorHandler), A.getView().removeListener(mxEvent.SCALE_AND_TRANSLATE,this.cursorHandler),b.editor.removeListener("pageSelected",this.cursorHandler),b.removeListener(this.cursorHandler));null!=H&&1<=H.readyState&&(H.close(1E3),H=null);for(var C in G)null!=G[C]&&G[C].destroy();e.file.fireEvent(new mxEventObject("realtimeStateChanged"))}}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.handleConflictError=function(b,e){var f=mxUtils.bind(this,function(){this.handleFileSuccess(!0)}),c=mxUtils.bind(this,function(u){this.handleFileError(u,!0)}),k=mxUtils.bind(this,function(){this.ui.spinner.spin(document.body,mxResources.get(this.savingSpinnerKey))&&(this.ui.editor.setStatus(""),this.save(!0,f,c,null,!0,this.constructor!=GitHubFile&&this.constructor!=GitLabFile||null==b?null:b.commitMessage))}),l=mxUtils.bind(this,function(){this.ui.spinner.spin(document.body,mxResources.get("updatingDocument"))&& this.synchronizeFile(mxUtils.bind(this,function(){this.ui.spinner.stop();this.ui.spinner.spin(document.body,mxResources.get(this.savingSpinnerKey))&&this.save(!0,f,c,null,null,this.constructor!=GitHubFile&&this.constructor!=GitLabFile||null==b?null:b.commitMessage)}),c)});"none"==DrawioFile.SYNC?this.showCopyDialog(f,c,k):this.invalidChecksum?this.showRefreshDialog(f,c,this.getErrorMessage(b)):e?this.showConflictDialog(k,l):this.addConflictStatus(this.getErrorMessage(b),mxUtils.bind(this,function(){this.ui.editor.setStatus(mxUtils.htmlEntities(mxResources.get("updatingDocument"))); this.synchronizeFile(f,c)}))};DrawioFile.prototype.getErrorMessage=function(b){var e=null!=b?null!=b.error?b.error.message:b.message:null;null==e&&null!=b&&b.code==App.ERROR_TIMEOUT?e=mxResources.get("timeout"):"0"==e&&(e=mxResources.get("noResponse"));return e};DrawioFile.prototype.isOverdue=function(){return null!=this.ageStart&&Date.now()-this.ageStart.getTime()>=this.ui.warnInterval};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
OneDriveFile.prototype.doSave=function(b,e,f,c,k,l){var u=this.meta.name;this.meta.name=b;DrawioFile.prototype.save.apply(this,[null,mxUtils.bind(this,function(){this.meta.name=u;this.saveFile(b,e,f,c,k,l)}),c,k,l])};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e.w,e.h,e,e.aspect,e.title);mxEvent.addListener(d,"dragleave",function(S){g.style.cursor="";for(var U=mxEvent.getSource(S);null!=U;){if(U==d||U==g){S.stopPropagation();S.preventDefault();break}U=U.parentNode}});var I=function(S){return function(U,N,P,R,M,p,y,C,L){null!=L&&(/(\.v(dx|sdx?))($|\?)/i.test(L.name)||/(\.vs(x|sx?))($|\?)/i.test(L.name))?b.importVisio(L,mxUtils.bind(this,function(m){x(m,N,P,R,M,p,y,"fixed",mxEvent.isAltDown(S)?null:y.substring(0,y.lastIndexOf(".")).replace(/_/g," "))})): null!=L&&(new XMLHttpRequest).upload&&b.isRemoteFileFormat(U,L.name)?b.isExternalDataComms()?b.parseFile(L,mxUtils.bind(this,function(m){4==m.readyState&&(b.spinner.stop(),200<=m.status&&299>=m.status&&(x(m.responseText,N,P,R,M,p,y,"fixed",mxEvent.isAltDown(S)?null:y.substring(0,y.lastIndexOf(".")).replace(/_/g," ")),d.scrollTop=d.scrollHeight))})):(b.spinner.stop(),b.showError(mxResources.get("error"),mxResources.get("notInOffline"))):(x(U,N,P,R,M,p,y,"fixed",mxEvent.isAltDown(S)?null:y.substring(0, y.lastIndexOf(".")).replace(/_/g," ")),d.scrollTop=d.scrollHeight)}};mxEvent.addListener(d,"dragover",E);mxEvent.addListener(d,"drop",D);mxEvent.addListener(g,"dragover",E);mxEvent.addListener(g,"drop",D);f.appendChild(d);c=document.createElement("div");c.style.textAlign="right";c.style.marginTop="20px";K=mxUtils.button(mxResources.get("cancel"),function(){b.hideDialog(!0)});K.setAttribute("id","btnCancel");K.className="geBtn";b.editor.cancelFirst&&c.appendChild(K);"draw.io"!=b.getServiceName()||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
typeof mxMermaidToDrawio)ea=da=va;va=m.cloneNode(!0);na.appendChild(va);Ma=function(Pa){O=null!=b.sidebar.tooltip&&"none"!=b.sidebar.tooltip.style.display};Oa=function(Pa){O||B(Ta,mxEvent.getClientX(Pa),mxEvent.getClientY(Pa),Sa,Da)};mxEvent.addGestureListeners(Sa,Ma,null,Oa);mxEvent.addGestureListeners(va,Ma,null,Oa)},function(va){b.handleError(va)})});Ka.setAttribute("disabled","disabled");Ka.className="geBtn gePrimaryBtn";oa=function(){window.setTimeout(function(){""!=ma.value?Ka.removeAttribute("disabled"):
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var N=new Spinner({left:"50%",lines:12,length:8,width:3,radius:5,rotate:0,color:"#000",speed:1,trail:60,shadow:!1,hwaccel:!1,className:"spinner",zIndex:2E9}),P=new Editor,R=null,M=null,p=null,y=!1,C=[],L=null,m=null;this.getSelectedItem=function(){null!=M&&l(M);return M};if(null==g("#mxODPickerCss")){var z=document.head||document.getElementsByTagName("head")[0],J=document.createElement("style");z.appendChild(J);J.type="text/css";J.id="mxODPickerCss";J.appendChild(document.createTextNode(U))}b.innerHTML=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.updateDocumentTitle();this.refresh()}));g.addListener("enabledChanged",mxUtils.bind(this,function(){g.isEnabled()||this.hideShapePicker()}));d=this;mxWindow.prototype.fit=function(){if(Editor.inlineFullscreen||null==d.embedViewport)mxUtils.fit(this.div);else{var C=parseInt(this.div.offsetLeft),L=parseInt(this.div.offsetWidth),m=d.embedViewport.x+d.embedViewport.width,z=parseInt(this.div.offsetTop),J=parseInt(this.div.offsetHeight),O=d.embedViewport.y+d.embedViewport.height;this.div.style.left= Math.max(d.embedViewport.x,Math.min(C,m-L))+"px";this.div.style.top=Math.max(d.embedViewport.y,Math.min(z,O-J))+"px";this.div.style.height=Math.min(d.embedViewport.height,parseInt(this.div.style.height))+"px";this.div.style.width=Math.min(d.embedViewport.width,parseInt(this.div.style.width))+"px"}};if(!this.editor.chromeless||this.editor.editable)if("simple"==Editor.currentTheme||"sketch"==Editor.currentTheme)M=Editor.currentTheme,Editor.currentTheme="",this.doSetCurrentTheme(M,0,mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"https://app.diagrams.net/";var B=d.editor.getEditBlankUrl;this.editor.getEditBlankUrl=function(C){C=null!=C?C:"";"1"==urlParams.dev&&(C+=(0<C.length?"&":"?")+"dev=1");return B.apply(this,arguments)};var F=g.addClickHandler;g.addClickHandler=function(C,L,m){var z=L;L=function(J,O){if(null==O){var T=mxEvent.getSource(J);"a"==T.nodeName.toLowerCase()&&(O=T.getAttribute("href"))}null!=O&&g.isCustomLink(O)&&(mxEvent.isTouchEvent(J)||!mxEvent.isPopupTrigger(J))&&g.customLinkClicked(O)&&mxEvent.consume(J); null!=z&&z(J,O)};F.call(this,C,L,m)};l.apply(this,arguments);mxClient.IS_SVG&&this.editor.graph.addSvgShadow(g.view.canvas.ownerSVGElement,null,!0);if(null!=this.menus){var I=Menus.prototype.addPopupMenuItems;this.menus.addPopupMenuItems=function(C,L,m){g.isSelectionEmpty()&&"simple"==Editor.currentTheme&&this.addMenuItems(C,["zoomIn","zoomOut","-"],null,m);I.apply(this,arguments);g.isSelectionEmpty()||null==d.addSelectionToScratchpad||this.addMenuItems(C,["-","addToScratchpad"],null,m);g.isSelectionEmpty()&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(EditorUi.prototype.maxImageBytes=m.maxImageBytes);null!=m.maxImageSize&&(EditorUi.prototype.maxImageSize=m.maxImageSize);null!=m.shareCursorPosition&&(EditorUi.prototype.shareCursorPosition=m.shareCursorPosition);null!=m.showRemoteCursors&&(EditorUi.prototype.showRemoteCursors=m.showRemoteCursors);null!=m.restrictExport&&(DrawioFile.RESTRICT_EXPORT=m.restrictExport)}};Editor.isSettingsEnabled=function(){return"undefined"!==typeof window.mxSettings&&(isLocalStorage||mxClient.IS_CHROMEAPP)};Editor.configureFontCss=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.createRoughCanvas=function(m){var z=rough.canvas({getContext:function(){return m}});z.draw=function(J){var O=J.sets||[];J=J.options||this.getDefaultOptions();for(var T=0;T<O.length;T++){var W=O[T];switch(W.type){case "path":null!=J.stroke&&this._drawToContext(m,W,J);break;case "fillPath":this._drawToContext(m,W,J);break;case "fillSketch":this.fillSketch(m,W,J)}}};z.fillSketch=function(J,O,T){var W=m.state.strokeColor,V=m.state.strokeWidth,Q=m.state.strokeAlpha,X=m.state.dashed,Z=T.fillWeight;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d;else if("mxfile"==d.nodeName){var q=d.getElementsByTagName("diagram");if(0<q.length){n=q[0];var t=g.getGlobalVariable;g.getGlobalVariable=function(v){return"page"==v?n.getAttribute("name")||mxResources.get("pageWithNumber",[1]):"pagenumber"==v?1:t.apply(this,arguments)}}}null!=n&&(d=Editor.parseDiagramNode(n))}q=this.editor.graph;try{this.editor.graph=g,this.editor.setGraphXml(d)}catch(v){}finally{this.editor.graph=q}return d};EditorUi.prototype.getSvgFileProperties=function(d){return this.getPngFileProperties(d)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxResources.get("ok"),ma,ka,function(wa){var xa=null!=wa&&0<wa.length;return xa&&g?(ma(wa),!1):xa},null,null,null,ia,d?null:[]),b.showDialog(ka.container,350,80,!0,!0),ka.init())}}function I(ka){la.innerText=mxResources.get(ca||ka?"create":"copy");ka=ka?"none":"";K&&(ya.style.display=ka);for(var fa=C.querySelectorAll(".geTempDlgLinkToDiagram"),ma=0;ma<fa.length;ma++)fa[ma].style.display=ka}function G(ka,fa,ma,na,oa){oa||(ba.innerText="",B(),X=ka,Z=na);var ia=null;if(ma){ia=document.createElement("table");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(m,z){Graph.addFont(m,z);document.execCommand("fontname",!1,m);if(null!=z){var J=this.cellEditor.textarea.getElementsByTagName("font");z=Graph.getFontUrl(m,z);for(var O=0;O<J.length;O++)J[O].getAttribute("face")==m&&J[O].getAttribute("data-font-src")!=z&&J[O].setAttribute("data-font-src",z)}};var v=Graph.prototype.isFastZoomEnabled;Graph.prototype.isFastZoomEnabled=function(){return v.apply(this,arguments)&&(!this.shadowVisible||!mxClient.IS_SF)};Graph.prototype.updateGlobalUrlVariables=function(){this.globalVars=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0==J%2,ba.flipBkg),z.parentNode.insertBefore(qa,z.nextSibling),z=qa;m.appendChild(da);Ba();return m};StyleFormatPanel.prototype.addStyles=function(m){if(null!=this.defaultColorSchemes){var z=function(ba){mxEvent.addListener(ba,"mouseenter",function(){ba.style.opacity="1"});mxEvent.addListener(ba,"mouseleave",function(){ba.style.opacity="0.5"})},J=this.editorUi,O=J.editor.graph,T=document.createElement("div");T.style.whiteSpace="nowrap";T.style.paddingLeft="24px";T.style.paddingRight="20px";m.style.paddingLeft=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
""),Ea.value=ra,Ea.style.width="96px",Ea.style.borderWidth="0px",Ia.appendChild(Ea)):(Ia.innerHTML=mxUtils.htmlEntities(decodeURIComponent(ra)),mxEvent.addListener(Ia,"click",mxUtils.bind(Y,function(){function Ua(){var fa=ka.value;fa=0==fa.length&&"string"!=Ha?0:fa;ua.allowAuto&&(null!=fa.trim&&"auto"==fa.trim().toLowerCase()?(fa="auto",Ha="string"):(fa=parseFloat(fa),fa=isNaN(fa)?0:fa));null!=ua.min&&fa<ua.min?fa=ua.min:null!=ua.max&&fa>ua.max&&(fa=ua.max);fa=encodeURIComponent(("int"==Ha?parseInt(fa): fa)+"");O(pa,fa,ua)}var ka=document.createElement("input");T(Ia,ka,!0);ka.value=decodeURIComponent(ra);ka.className="gePropEditor";"int"!=Ha&&"float"!=Ha||ua.allowAuto||(ka.type="number",ka.step="int"==Ha?"1":"any",null!=ua.min&&(ka.min=parseFloat(ua.min)),null!=ua.max&&(ka.max=parseFloat(ua.max)));m.appendChild(ka);mxEvent.addListener(ka,"keypress",function(fa){13==fa.keyCode&&Ua()});ka.focus();mxEvent.addListener(ka,"blur",function(){Ua()})})));ua.isDeletable&&(Ea=mxUtils.button("-",mxUtils.bind(Y,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d.indexOf("PK"))this.importZipFile(n,mxUtils.bind(this,function(F){this.spinner.stop();v(F)}),mxUtils.bind(this,function(){this.spinner.stop();this.openLocalFile(d,g,q)}));else{if("image/png"==n.type.substring(0,9))d=this.extractGraphModelFromPng(d);else if("application/pdf"==n.type){var B=Editor.extractGraphModelFromPdf(d);null!=B&&(t=null,q=!0,d=B)}this.spinner.stop();this.openLocalFile(d,g,q,t,null!=t?n:null)}}};EditorUi.prototype.openFiles=function(d,g){if(this.spinner.spin(document.body,mxResources.get("loading")))for(var n= 0;n<d.length;n++)mxUtils.bind(this,function(q){var t=new FileReader;t.onload=mxUtils.bind(this,function(v){try{this.openFileHandle(v.target.result,q.name,q,g)}catch(B){this.handleError(B)}});t.onerror=mxUtils.bind(this,function(v){this.spinner.stop();this.handleError(v);window.openFile=null});"image"!==q.type.substring(0,5)&&"application/pdf"!==q.type||"image/svg"===q.type.substring(0,9)?t.readAsText(q):t.readAsDataURL(q)})(d[n])};EditorUi.prototype.openLocalFile=function(d,g,n,q,t){var v=this.getCurrentFile(),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m+'";\nsrc: url("'+z+'");\n}'),m=document.createElement("style"),mxUtils.write(m,J));return m};Graph.addFont=function(m,z,J){if(null!=m&&0<m.length&&null!=z&&0<z.length){var O=m.toLowerCase();if("helvetica"!=O&&"arial"!=m&&"sans-serif"!=O){var T=Graph.customFontElements[O];null!=T&&T.url!=z&&(T.elt.parentNode.removeChild(T.elt),T=null);null==T?(T=z,"http:"==z.substring(0,5)&&(T=PROXY_URL+"?url="+encodeURIComponent(z)),T={name:m,url:z,elt:Graph.createFontElement(m,T)},Graph.customFontElements[O]=T, Graph.recentCustomFonts[O]=T,z=document.getElementsByTagName("head")[0],null!=J&&("link"==T.elt.nodeName.toLowerCase()?(T.elt.onload=J,T.elt.onerror=J):J()),null!=z&&z.appendChild(T.elt)):null!=J&&J()}else null!=J&&J()}else null!=J&&J();return m};Graph.getFontUrl=function(m,z){m=Graph.customFontElements[m.toLowerCase()];null!=m&&(z=m.url);return z};Graph.processFontAttributes=function(m){m=m.getElementsByTagName("*");for(var z=0;z<m.length;z++){var J=m[z].getAttribute("data-font-src");if(null!=J){var O=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){return this.user};DriveClient.prototype.getUsersList=function(){var f=[],c=JSON.parse(this.getPersistentToken(!0)),k=null;if(null!=c){null!=c.current&&(k=c.current.userId,f.push(c[k].user),f[0].isCurrent=!0);for(var l in c)"current"!=l&&l!=k&&f.push(c[l].user)}return f};DriveClient.prototype.logout=function(){this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&userId="+this.userId+"&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken(); this.setUser(null);b=null};DriveClient.prototype.execute=function(f){var c=mxUtils.bind(this,function(k){this.ui.showAuthDialog(this,!0,mxUtils.bind(this,function(l,u){this.authorize(!1,mxUtils.bind(this,function(){null!=u&&u();f()}),mxUtils.bind(this,function(x){var E=null!=x.message?x.message:mxResources.get("cannotLogin");null!=x&&null!=x.error&&403==x.error.code&&null!=x.error.data&&0<x.error.data.length&&"domainPolicy"==x.error.data[0].reason&&(E=x.error.message);this.logout();this.ui.showError(mxResources.get("error"),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.extractGraphModelFromXref(W));null!=J&&(J=decodeURIComponent(J.replace(/\\\(/g,"(").replace(/\\\)/g,")")));return J};Editor.extractGraphModelFromXref=function(m){var z=m.trailer,J=null;null!=z&&(z=/.* \/Info (\d+) (\d+) R/g.exec(z.join("\n")),null!=z&&0<z.length&&(z=m[z[1]],null!=z&&(z=/.* \/Subject (\d+) (\d+) R/g.exec(z.join("\n")),null!=z&&0<z.length&&(m=m[z[1]],null!=m&&(m=m.join("\n"),J=m.substring(1,m.length-1))))));return J};Editor.extractParserError=function(m,z){var J=null;m=null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.window.setClosable(!0);this.window.addListener("show",mxUtils.bind(this,function(){x.refresh();this.window.fit()}));b.installResizeHandler(this,!0)},AuthDialog=function(b,e,f,c){var k=document.createElement("div");k.style.textAlign="center";var l=document.createElement("p");l.style.fontSize="16pt";l.style.padding="0px";l.style.margin="0px";l.style.color="gray";mxUtils.write(l,mxResources.get("authorizationRequired"));var u="Unknown",x=document.createElement("img");x.setAttribute("border","0"); x.setAttribute("align","absmiddle");x.style.marginRight="10px";e==b.drive?(u=mxResources.get("googleDrive"),x.src=IMAGE_PATH+"/google-drive-logo-white.svg"):e==b.dropbox?(u=mxResources.get("dropbox"),x.src=IMAGE_PATH+"/dropbox-logo-white.svg"):e==b.oneDrive?(u=mxResources.get("oneDrive"),x.src=IMAGE_PATH+"/onedrive-logo-white.svg"):e==b.gitHub?(u=mxResources.get("github"),x.src=IMAGE_PATH+"/github-logo-white.svg"):e==b.gitLab?(u=mxResources.get("gitlab"),x.src=IMAGE_PATH+"/gitlab-logo.svg",x.style.width= "32px"):e==b.trello&&(u=mxResources.get("trello"),x.src=IMAGE_PATH+"/trello-logo-white.svg");b=document.createElement("p");mxUtils.write(b,mxResources.get("authorizeThisAppIn",[u]));var E=document.createElement("input");E.setAttribute("type","checkbox");u=mxUtils.button(mxResources.get("authorize"),function(){c(E.checked)});u.insertBefore(x,u.firstChild);u.style.marginTop="6px";u.className="geBigButton";u.style.fontSize="18px";u.style.padding="14px";k.appendChild(l);k.appendChild(b);k.appendChild(u); f&&(f=document.createElement("p"),f.style.marginTop="20px",f.appendChild(E),l=document.createElement("span"),mxUtils.write(l," "+mxResources.get("rememberMe")),f.appendChild(l),k.appendChild(f),E.checked=!0,E.defaultChecked=!0,mxEvent.addListener(l,"click",function(D){E.checked=!E.checked;mxEvent.consume(D)}));this.container=k},MoreShapesDialog=function(b,e,f){f=null!=f?f:b.sidebar.entries;var c=document.createElement("div"),k=[];if(null!=b.sidebar.customEntries)for(var l=0;l<b.sidebar.customEntries.length;l++){for(var u=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.editor.graph.setBackgroundImage;var A=this.pages[0];this.currentPage==A?u.setBackgroundImage(x):null!=A.viewState&&null!=A.viewState&&(x=A.viewState.backgroundImage,u.setBackgroundImage(x));u.getGlobalVariable=function(U){return"page"==U?A.getName():"pagenumber"==U?1:D.apply(this,arguments)};u.getGlobalVariable=D;document.body.appendChild(u.container);u.model.setRoot(A.root)}if(mxClient.IS_CHROMEAPP||this.useCanvasForExport)this.editor.exportToCanvas(mxUtils.bind(this,function(U){try{u!=this.editor.graph&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f){null==b||null==this.tokenRefreshThread||6E4>this.tokenExpiresOn-Date.now()?this.authenticate(e,null!=f?f:this.emptyFn):e()};OneDriveClient.prototype.getItemRef=function(e){var f=e.split("/");return 1<f.length?{driveId:f[0],id:f[1]}:{id:e}};OneDriveClient.prototype.getItemURL=function(e,f){var c=e.split("/");return 1<c.length?(e=c[1],(f?"":this.baseUrl)+"/drives/"+c[0]+("root"==e?"/root":"/items/"+e)):(f?"":this.baseUrl)+"/me/drive/items/"+e};OneDriveClient.prototype.getLibrary=function(e,f,c){this.getFile(e,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!q,null!=F&&q&&(t.shadowVisible=F),this.editor.graph.model.execute(t))});d=new BackgroundImageDialog(this,d,g,n,q);this.showDialog(d.container,400,q?240:220,!0,!0);d.init()};EditorUi.prototype.showLibraryDialog=function(d,g,n,q,t){d=new LibraryDialog(this,d,g,n,q,t);this.showDialog(d.container,640,440,!0,!1,mxUtils.bind(this,function(v){v&&null==this.getCurrentFile()&&"1"!=urlParams.embed&&this.showSplash()}));d.init()};var f=EditorUi.prototype.createFormat;EditorUi.prototype.createFormat=function(d){var g=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0;n<d.length;n++)mxUtils.bind(this,function(q){var t=new FileReader;t.onload=mxUtils.bind(this,function(v){try{this.openFileHandle(v.target.result,q.name,q,g)}catch(B){this.handleError(B)}});t.onerror=mxUtils.bind(this,function(v){this.spinner.stop();this.handleError(v);window.openFile=null});"image"!==q.type.substring(0,5)&&"application/pdf"!==q.type||"image/svg"===q.type.substring(0,9)?t.readAsText(q):t.readAsDataURL(q)})(d[n])};EditorUi.prototype.openLocalFile=function(d,g,n,q,t){var v=this.getCurrentFile(), B=mxUtils.bind(this,function(){window.openFile=null;if(null==g&&null!=this.getCurrentFile()&&this.isDiagramEmpty()){var F=mxUtils.parseXml(d);null!=F&&(this.editor.setGraphXml(F.documentElement),this.editor.graph.selectAll())}else this.fileLoaded(new LocalFile(this,d,g||this.defaultFilename,n,q,t))});if(null!=d&&0<d.length)null==v||!v.isModified()&&(mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||null!=q)?B():(mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||null!=q)&&null!=v&&v.isModified()?this.confirm(mxResources.get("allChangesLost"), null,B,mxResources.get("cancel"),mxResources.get("discardChanges")):(window.openFile=new OpenFile(function(){window.openFile=null}),window.openFile.setData(d,g),window.openWindow(this.getUrl(),null,mxUtils.bind(this,function(){null!=v&&v.isModified()?this.confirm(mxResources.get("allChangesLost"),null,B,mxResources.get("cancel"),mxResources.get("discardChanges")):B()})));else throw Error(mxResources.get("notADiagramFile"));};EditorUi.prototype.getBasenames=function(){var d={};if(null!=this.pages)for(var g=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Aa.forceConstant=3*V;Aa.disableEdgeStyle=!1;Aa.resetEdges=!1;var La=Aa.isVertexIgnored;Aa.isVertexIgnored=function(Da){return La.apply(this,arguments)||0>mxUtils.indexOf(v,Da)};this.executeLayout(function(){Aa.execute(I.getDefaultParent());na()},!0,Z);Z=null}}this.hideDialog()}finally{I.model.endUpdate()}null!=Z&&Z()}}catch(Da){this.handleError(Da)}};EditorUi.prototype.getSearch=function(d){var g="";if("1"!=urlParams.offline&&"1"!=urlParams.demo&&null!=d&&0<window.location.search.length){var n="?", q;for(q in urlParams)0>mxUtils.indexOf(d,q)&&null!=urlParams[q]&&(g+=n+q+"="+urlParams[q],n="&")}else g=window.location.search;return g};EditorUi.prototype.getUrl=function(d){d=null!=d?d:window.location.pathname;var g=0<d.indexOf("?")?1:0;if("1"==urlParams.offline)d+=window.location.search;else{var n="tmp libs clibs state fileId code share notitle data url embed client create title splash".split(" "),q;for(q in urlParams)0>mxUtils.indexOf(n,q)&&(d=0==g?d+"?":d+"&",null!=urlParams[q]&&(d+=q+"="+urlParams[q],
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
na.join(" ")}null!=ka?(O=ka,O.className+=" "+fa,T=ma,la.className="geTempDlgCreateBtn"):(T=O=null,la.className="geTempDlgCreateBtn geTempDlgBtnDisabled")}function F(ka,fa){if(null!=T){var ma=function(wa){ja.isExternal?E(ja,function(xa){na(xa,wa)},oa):ja.url?mxUtils.get(TEMPLATE_PATH+"/"+ja.url,mxUtils.bind(this,function(xa){200<=xa.getStatus()&&299>=xa.getStatus()?na(xa.getText(),wa):oa()})):na(b.emptyDiagramXml,wa)},na=function(wa,xa){g||b.hideDialog(!0);e(wa,xa,ja,fa)},oa=function(){n(mxResources.get("cannotLoad"));
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"/sites?search=";C=[{name:mxResources.get("sharepointSites",null,"Sharepoint Sites"),driveId:V}];ba=1;break;case "site":C.push({name:Z,driveId:V,folderId:Q,siteId:X});qa="/sites/"+X+"/drives";ba=2;break;case "subsite":C.push({name:Z,driveId:V,folderId:Q,siteId:X});qa="/drives/"+X+(Q?"/items/"+Q:"/root")+"/children";break;case "search":V=p;C=[{driveId:V,name:mxResources.get("back",null,"Back")}];Y=encodeURIComponent(Y.replace(/'/g,"\\'"));qa=V?"/drives/"+V+"/root/search(q='"+Y+"')":"/me/drive/root/search(q='"+ Y+"')";break;default:null==Q?C=[{driveId:V}]:C.push({name:Z,driveId:V,folderId:Q}),qa=(V?"/drives/"+V:"/me/drive")+(Q?"/items/"+Q:"/root")+"/children"}ba||(qa+=(0<qa.indexOf("?")?"&":"?")+"select=id,name,description,parentReference,file,createdBy,lastModifiedBy,lastModifiedDateTime,size,folder,remoteItem,@microsoft.graph.downloadUrl");var la=[];ca()}}function I(V){T.className=T.className.replace("odCatSelected","");T=V;T.className+=" odCatSelected"}function G(V){y||(W=null,F("search",null,null,null,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f.apply(this,arguments)};var c=Editor.prototype.updateGraphComponents;Editor.prototype.updateGraphComponents=function(){c.apply(this,arguments);this.graph.useCssTransforms=!mxClient.NO_FO&&this.isChromelessView()&&this.graph.isCssTransformsSupported();this.graph.updateCssTransform()};Editor.initMath=function(m,z){if("undefined"===typeof window.MathJax&&!mxClient.IS_IE&&!mxClient.IS_IE11){var J=function(){O=null;if(0<Editor.mathJaxQueue.length)Editor.doMathJaxRender(Editor.mathJaxQueue.shift());else Editor.onMathJaxDone()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
method:"POST",params:{title:c,properties:[{key:"channel",value:Editor.guid()}]}},k,l)};DriveClient.prototype.renameFile=function(f,c,k,l){null!=f&&null!=c&&this.executeRequest(this.createDriveRequest(f,{title:c}),k,l)};DriveClient.prototype.moveFile=function(f,c,k,l){null!=f&&null!=c&&this.executeRequest(this.createDriveRequest(f,{parents:[{kind:"drive#fileLink",id:c}]}),k,l)};DriveClient.prototype.createDriveRequest=function(f,c){return{url:"/files/"+f+"?uploadType=multipart&supportsAllDrives=true",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0>Z&&(Z=T.strokeWidth/2);m.setStrokeAlpha(m.state.fillAlpha);m.setStrokeColor(T.fill||"");m.setStrokeWidth(Z);m.setDashed(!1);this._drawToContext(J,O,T);m.setDashed(X);m.setStrokeWidth(V);m.setStrokeColor(W);m.setStrokeAlpha(Q)};z._drawToContext=function(J,O,T){J.begin();for(var W=0;W<O.ops.length;W++){var V=O.ops[W],Q=V.data;switch(V.op){case "move":J.moveTo(Q[0],Q[1]);break;case "bcurveTo":J.curveTo(Q[0],Q[1],Q[2],Q[3],Q[4],Q[5]);break;case "lineTo":J.lineTo(Q[0],Q[1])}}J.end();"fillPath"===O.type&& T.filled?J.fill():J.stroke()};return z};(function(){function m(W,V,Q){this.canvas=W;this.rc=V;this.shape=Q;this.canvas.setLineJoin("round");this.canvas.setLineCap("round");this.originalBegin=this.canvas.begin;this.canvas.begin=mxUtils.bind(this,m.prototype.begin);this.originalEnd=this.canvas.end;this.canvas.end=mxUtils.bind(this,m.prototype.end);this.originalRect=this.canvas.rect;this.canvas.rect=mxUtils.bind(this,m.prototype.rect);this.originalRoundrect=this.canvas.roundrect;this.canvas.roundrect=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
else{if(0<F.length){var I=JSON.parse(F);localStorage.setItem(g,JSON.stringify(I))}else localStorage.removeItem(g);this.hideDialog();this.alert(mxResources.get("restartForChangeRequired"))}}catch(G){this.handleError(G)}}),null,mxResources.get("close"),null,null,null,!0,null,null,t,n,q);this.showDialog(d.container,620,460,!0,!1);d.init()};EditorUi.prototype.showBackgroundImageDialog=function(d,g,n,q){d=null!=d?d:mxUtils.bind(this,function(t,v,B,F){v||(t=new ChangePageSetup(this,q?B:null,t),t.ignoreColor= !q,null!=F&&q&&(t.shadowVisible=F),this.editor.graph.model.execute(t))});d=new BackgroundImageDialog(this,d,g,n,q);this.showDialog(d.container,400,q?240:220,!0,!0);d.init()};EditorUi.prototype.showLibraryDialog=function(d,g,n,q,t){d=new LibraryDialog(this,d,g,n,q,t);this.showDialog(d.container,640,440,!0,!1,mxUtils.bind(this,function(v){v&&null==this.getCurrentFile()&&"1"!=urlParams.embed&&this.showSplash()}));d.init()};var f=EditorUi.prototype.createFormat;EditorUi.prototype.createFormat=function(d){var g=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"click",xa):(mxEvent.addListener(va,"click",function(Na){G(va,null,null,fa,wa)}),mxEvent.addListener(va,"dblclick",function(Na){I();mxEvent.consume(Na)}));null!=fa&&(ia=m.cloneNode(!0),va.appendChild(ia),mxEvent.addGestureListeners(ia,mxUtils.bind(this,function(Na){O=b.sidebar.currentElt==va}),null,null),mxEvent.addListener(ia,"click",mxUtils.bind(this,function(Na){O||Da(Na,null!=na?na:oa);mxEvent.consume(Na)})));ha.appendChild(va);return va}function U(){function fa(Da,va){Da=mxResources.get(Da,null, Da.substring(0,1).toUpperCase()+Da.substring(1));18<Da.length&&(Da=Da.substring(0,18)+"&hellip;");return Da+(null!=va?" ("+va.length+")":"")}function ma(Da,va,Ma){mxEvent.addListener(va,"click",function(){Ha!=va&&(null!=Ha&&(Ha.style.backgroundColor=""),Ha=va,Ha.style.backgroundColor=u,ha.scrollTop=0,ha.innerText="",y=0,null!=ra[Da].content?(ha.appendChild(ra[Da].content),da=ea,Ia=null,null!=ra[Da].content.init&&ra[Da].content.init()):(Ia=Ma?ua[Da][Ma]:ra[Da],W=null,v(!1)))});null!=urlParams["smart-template"]&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.adoptParentCell=function(b,e,f,c){var k=f[b],l=null!=e?e.parent:null!=k?k.parent:null;null!=l&&this.adoptParentCell(l,null,f,c);null!=k?c.inserted[b]||(c.cells[EditorUi.DIFF_INSERT].push(k),c.inserted[b]=!0):null!=e&&(null==c.cells[EditorUi.DIFF_UPDATE][b]&&(c.cells[EditorUi.DIFF_UPDATE][b]={}),c.cells[EditorUi.DIFF_UPDATE][b]=e)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.isRevisionHistoryEnabled=function(){var d=this.getCurrentFile();return null!=d&&(d.constructor==DriveFile&&d.isEditable()||d.constructor==DropboxFile)};EditorUi.prototype.getServiceName=function(){return"draw.io"};EditorUi.prototype.addRemoteServiceSecurityCheck=function(d){d.setRequestHeader("Content-Language","da, mi, en, de-DE")};EditorUi.prototype.loadUrl=function(d,g,n,q,t,v,B,F){EditorUi.logEvent("SHOULD NOT BE CALLED: loadUrl");return this.editor.loadUrl(d,g,n,q,t,v,B,F)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.originalQuadTo.apply(this.canvas,arguments):(this.addOp(this.quadOp,W,V,Q,X),this.lastX=Q,this.lastY=X)};m.prototype.curveTo=function(W,V,Q,X,Z,Y){this.passThrough?this.originalCurveTo.apply(this.canvas,arguments):(this.addOp(this.curveOp,W,V,Q,X,Z,Y),this.lastX=Z,this.lastY=Y)};m.prototype.arcTo=function(W,V,Q,X,Z,Y,aa){if(this.passThrough)this.originalArcTo.apply(this.canvas,arguments);else{var ca=mxUtils.arcToCurves(this.lastX,this.lastY,W,V,Q,X,Z,Y,aa);if(null!=ca)for(var da=0;da<ca.length;da+= 6)this.curveTo(ca[da],ca[da+1],ca[da+2],ca[da+3],ca[da+4],ca[da+5]);this.lastX=Y;this.lastY=aa}};m.prototype.rect=function(W,V,Q,X){this.passThrough?this.originalRect.apply(this.canvas,arguments):(this.path=[],this.nextShape=this.rc.generator.rectangle(W,V,Q,X,this.getStyle(!0,!0)))};m.prototype.ellipse=function(W,V,Q,X){this.passThrough?this.originalEllipse.apply(this.canvas,arguments):(this.path=[],this.nextShape=this.rc.generator.ellipse(W+Q/2,V+X/2,Q,X,this.getStyle(!0,!0)))};m.prototype.roundrect=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
OneDriveClient.prototype.extension=".drawio";OneDriveClient.prototype.baseUrl="https://graph.microsoft.com/v1.0";OneDriveClient.prototype.authUrl="https://login.microsoftonline.com/"+(window.DRAWIO_MSGRAPH_TENANT_ID||"common");OneDriveClient.prototype.emptyFn=function(){};OneDriveClient.prototype.invalidFilenameRegExs=[/[~"#%\*:<>\?\/\\{\|}]/,/^\.lock$/i,/^CON$/i,/^PRN$/i,/^AUX$/i,/^NUL$/i,/^COM\d$/i,/^LPT\d$/i,/^desktop\.ini$/i,/_vti_/i];OneDriveClient.prototype.isValidFilename=function(e){if(null== e||""===e)return!1;for(var f=0;f<this.invalidFilenameRegExs.length;f++)if(this.invalidFilenameRegExs[f].test(e))return!1;return!0};OneDriveClient.prototype.get=function(e,f,c){e=new mxXmlRequest(e,null,"GET");e.setRequestHeaders=mxUtils.bind(this,function(k,l){k.setRequestHeader("Authorization","Bearer "+b)});e.send(f,c);return e};OneDriveClient.prototype.updateUser=function(e,f,c){var k=!0,l=window.setTimeout(mxUtils.bind(this,function(){k=!1;f({code:App.ERROR_TIMEOUT})}),this.ui.timeout);this.get(this.baseUrl+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
App.prototype.start=function(){try{var b=this;null!=this.bg&&null!=this.bg.parentNode&&this.bg.parentNode.removeChild(this.bg);this.restoreLibraries();this.spinner.stop();window.onerror=function(u,x,E,D,A){"ResizeObserver loop limit exceeded"!=u&&(EditorUi.logError("Uncaught: "+(null!=u?u:""),x,E,D,A,null,!0),b.handleError({message:u},mxResources.get("unknownError"),null,null,null,null,!0))};if("1"!=urlParams.client&&"1"!=urlParams.embed){try{isLocalStorage&&window.addEventListener("storage",mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.endpointHint=this.defEndpointHint;var l=JSON.parse(this.getPersistentToken(!0));null!=l&&(l.endpointHint=this.endpointHint,this.setPersistentToken(JSON.stringify(l),!l.remember));e();return}}catch(u){}f({message:mxResources.get("unknownError")+" (Code: "+c.getStatus()+")"})}),f)};OneDriveClient.prototype.executeRequest=function(e,f,c){var k=mxUtils.bind(this,function(l){var u=!0,x=window.setTimeout(mxUtils.bind(this,function(){u=!1;c({code:App.ERROR_TIMEOUT,retry:k})}),this.ui.timeout);this.get(e, mxUtils.bind(this,function(E){window.clearTimeout(x);u&&(200<=E.getStatus()&&299>=E.getStatus()||404==E.getStatus()?(null==this.user&&this.updateUser(this.emptyFn,this.emptyFn,!0),f(E)):l||401!==E.getStatus()&&400!==E.getStatus()?c(this.parseRequestText(E)):this.authenticate(function(){k(!0)},c,l))}),mxUtils.bind(this,function(E){window.clearTimeout(x);u&&c(E)}))});null==b||6E4>this.tokenExpiresOn-Date.now()?this.authenticate(function(){k(!0)},c):k(!1)};OneDriveClient.prototype.checkToken=function(e,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var CommentsWindow=function(b,e,f,c,k,l){function u(){for(var N=v.getElementsByTagName("div"),P=0,R=0;R<N.length;R++)"none"!=N[R].style.display&&N[R].parentNode==v&&P++;B.style.display=0==P?"block":"none"}function x(N,P,R,M){function p(){P.removeChild(L);P.removeChild(m);C.style.display="block";y.style.display="block"}n={div:P,comment:N,saveCallback:R,deleteOnCancel:M};var y=P.querySelector(".geCommentTxt"),C=P.querySelector(".geCommentActionsList"),L=document.createElement("textarea");L.className= "geCommentEditTxtArea";L.style.minHeight=y.offsetHeight+"px";L.value=N.content;P.insertBefore(L,y);var m=document.createElement("div");m.className="geCommentEditBtns";var z=mxUtils.button(mxResources.get("cancel"),function(){M?(P.parentNode.removeChild(P),u()):p();n=null});z.className="geCommentEditBtn";m.appendChild(z);var J=mxUtils.button(mxResources.get("save"),function(){y.innerText="";N.content=L.value;mxUtils.write(y,N.content);p();R(N);n=null});mxEvent.addListener(L,"keydown",mxUtils.bind(this, function(O){mxEvent.isConsumed(O)||((mxEvent.isControlDown(O)||mxClient.IS_MAC&&mxEvent.isMetaDown(O))&&13==O.keyCode?(J.click(),mxEvent.consume(O)):27==O.keyCode&&(z.click(),mxEvent.consume(O)))}));J.focus();J.className="geCommentEditBtn gePrimaryBtn";m.appendChild(J);P.insertBefore(m,y);C.style.display="none";y.style.display="none";L.focus()}function E(N,P){P.innerText="";N=new Date(N.modifiedDate);var R=b.timeSince(N);null==R&&(R=mxResources.get("lessThanAMinute"));mxUtils.write(P,mxResources.get("timeAgo",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f.appendChild(k);e.appendChild(f);this.container=e},ConnectionPointsDialog=function(b,e){function f(){null!=k&&k.destroy()}var c=document.createElement("div");c.style.userSelect="none";var k=null;this.init=function(){function l(R,M,p){R=new mxCell("",new mxGeometry(R,M,6,6),"shape=mxgraph.basic.x;fillColor=#29b6f2;strokeColor=#29b6f2;points=[];rotatable=0;resizable=0;connectable=0;editable=0;");R.vertex=!0;R.cp=!0;R.constObj=p;return K.addCell(R)}function u(R){R=K.getSelectionCells();K.deleteCells(R)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
return O==p||0==J.length?A(M,p):T==W?D(M):E(M,p!=mxConstants.DIRECTION_NORTH&&p!=mxConstants.DIRECTION_WEST)}return S.apply(this,arguments)};g.getSubtree=function(M){var p=[M];!k(M)&&!c(M)||u(M)||g.traverse(M,!0,function(y,C){var L=null!=C&&g.isTreeEdge(C);L&&0>mxUtils.indexOf(p,C)&&p.push(C);(null==C||L)&&0>mxUtils.indexOf(p,y)&&p.push(y);return null==C||L});return p};var U=mxVertexHandler.prototype.init;mxVertexHandler.prototype.init=function(){U.apply(this,arguments);(k(this.state.cell)||c(this.state.cell))&& !u(this.state.cell)&&0<this.graph.getOutgoingTreeEdges(this.state.cell).length&&(this.moveHandle=mxUtils.createImage(Editor.moveImage),this.moveHandle.setAttribute("title","Move Subtree"),this.moveHandle.style.position="absolute",this.moveHandle.style.cursor="pointer",this.moveHandle.style.width="24px",this.moveHandle.style.height="24px",this.graph.container.appendChild(this.moveHandle),mxEvent.addGestureListeners(this.moveHandle,mxUtils.bind(this,function(M){this.graph.graphHandler.start(this.state.cell, mxEvent.getClientX(M),mxEvent.getClientY(M),this.graph.getSubtree(this.state.cell));this.graph.graphHandler.cellWasClicked=!0;this.graph.isMouseTrigger=mxEvent.isMouseEvent(M);this.graph.isMouseDown=!0;d.hoverIcons.reset();mxEvent.consume(M)})))};var N=mxVertexHandler.prototype.redrawHandles;mxVertexHandler.prototype.redrawHandles=function(){N.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.style.left=this.state.x+this.state.width+(40>this.state.width?10:0)+2+"px",this.moveHandle.style.top=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d+(null!=n?"&mime="+n:"")+(null!=t?"&format="+t:"")+(null!=v?"&base64="+v:"")+(null!=g?"&filename="+encodeURIComponent(g):"")+(q?"&binary=1":""))};EditorUi.prototype.base64ToBlob=function(d,g){g=g||"";d=atob(d);for(var n=d.length,q=Math.ceil(n/1024),t=Array(q),v=0;v<q;++v){for(var B=1024*v,F=Math.min(B+1024,n),I=Array(F-B),G=0;B<F;++G,++B)I[G]=d[B].charCodeAt(0);t[v]=new Uint8Array(I)}return new Blob(t,{type:g})};EditorUi.prototype.saveLocalFile=function(d,g,n,q,t,v,B,F){v=null!=v?v:!1;B=null!=B?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
{type:"separator"},{name:"resizeLastRow",dispName:"Resize Last Row",type:"bool",getDefaultValue:function(m,z){m=z.editorUi.editor.graph.getCellStyle(1==m.vertices.length&&0==m.edges.length?m.vertices[0]:null);return"1"==mxUtils.getValue(m,"resizeLastRow","0")},isVisible:function(m,z){z=z.editorUi.editor.graph;return 1==m.vertices.length&&0==m.edges.length&&z.isTable(m.vertices[0])}},{name:"resizeLast",dispName:"Resize Last Column",type:"bool",getDefaultValue:function(m,z){m=z.editorUi.editor.graph.getCellStyle(1==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k.setAttribute("src","data:"+d+";base64,"+I);k.style.position="absolute";k.style.top="70px";k.style.right="100px";k.style.maxWidth="120px";k.style.maxHeight="80px";mxUtils.setPrefixedStyle(k.style,"transform","translate(50%,-50%)");l.appendChild(k);mxClient.IS_FF||"image/png"!=d||null==navigator.clipboard||"function"!==typeof window.ClipboardItem||(n=mxUtils.button(mxResources.get("copy"),function(N){N=b.base64ToBlob(I,"image/png");N=new ClipboardItem({"image/png":N,"text/html":new Blob(['<img src="data:'+ d+";base64,"+I+'">'],{type:"text/html"})});navigator.clipboard.write([N]).then(mxUtils.bind(this,function(){b.alert(mxResources.get("copiedToClipboard"))}))["catch"](mxUtils.bind(this,function(P){b.handleError(P)}))}),n.style.marginTop="6px",n.className="geBtn");E&&Editor.popupsAllowed&&(k.style.cursor="pointer",mxEvent.addGestureListeners(k,null,null,function(N){mxEvent.isPopupTrigger(N)||v("_blank")}))}mxUtils.br(l);var G=document.createElement("div");G.style.textAlign="center";var S=0;G.style.marginTop=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
if(isNaN(S)||isNaN(U))try{var N=G[0].getAttribute("viewBox").split(/\s+/);S=parseFloat(N[2]);U=parseFloat(N[3])}catch(P){S=S||100,U=U||100}n(this.convertDataUri(Editor.createSvgDataUri(I)),S,U)}else null!=t?t():q({message:mxResources.get("invalidInput")})}catch(P){q(P)}});mermaid.mermaidAPI.initialize(g);mermaid.mermaidAPI.render("geMermaidOutput-"+(new Date).getTime(),d).then(function(I){F(I.svg)}).catch(function(I){null!=t?t(I):q(I)})}catch(I){q(I)}});"undefined"!==typeof mermaid||this.loadingMermaid||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
va,La.width*va,La.height*va))}return Aa};var Ja=ka.getGlobalVariable;ka.getGlobalVariable=function(Aa){return"page"==Aa?ja.getName():"pagenumber"==Aa?ia+1:"pagecount"==Aa?null!=m.pages?m.pages.length:1:Ja.apply(this,arguments)};document.body.appendChild(ka.container);m.updatePageRoot(ja);ka.model.setRoot(ja.root)}na=Ha(ka,na,ia!=ma,ja.getId());ka!=T&&ka.container.parentNode.removeChild(ka.container)}}else na=Ha(T);null==na||null==na.wnd?m.handleError({message:mxResources.get("errorUpdatingPreview")}):
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
L){var m,z=-1;return function(){clearTimeout(m);var J=this,O=arguments,T=function(){m=null;z=Date.now();C.apply(J,O)};Date.now()-z>L?T():m=setTimeout(T,L)}}(function(C,L){k(L)},300),mouseUp:function(C,L){k(L)}};A.addMouseListener(this.mouseListeners);this.shareCursorPositionListener=function(){b.isShareCursorPosition()||c("cursor",{hide:!0})};b.addListener("shareCursorPositionChanged",this.shareCursorPositionListener);this.selectionChangeListener=function(C,L){C=function(J){return null!=J?J.id:null};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
c,H,l,u),D&&!A?H.y=n.y:A&&!D&&(H.x=n.x),n.y!=H.y&&null!=this.guideY&&null!=this.guideY.node&&(this.guideY.node.style.visibility="hidden"),n.x!=H.x&&null!=this.guideX&&null!=this.guideX.node&&(this.guideX.node.style.visibility="hidden"),H;S(!0,!0);return b.apply(this,arguments)};var e=mxGuide.prototype.setVisible;mxGuide.prototype.setVisible=function(c){e.call(this,c);var k=this.guidesArrVer,l=this.guidesArrHor;if(null!=k)for(var u=0;u<k.length;u++)k[u].node.style.visibility=c?"visible":"hidden";if(null!= l)for(u=0;u<l.length;u++)l[u].node.style.visibility=c?"visible":"hidden"};var f=mxGuide.prototype.destroy;mxGuide.prototype.destroy=function(){f.call(this);var c=this.guidesArrVer,k=this.guidesArrHor;if(null!=c){for(var l=0;l<c.length;l++)c[l].destroy();this.guidesArrVer=null}if(null!=k){for(l=0;l<k.length;l++)k[l].destroy();this.guidesArrHor=null}}})();function mxRuler(b,e,f,c){function k(){var B=b.diagramContainer;K.style.top=B.offsetTop-E+"px";K.style.left=B.offsetLeft-E+"px";K.style.width=(f?0:B.offsetWidth)+E+"px";K.style.height=(f?B.offsetHeight:0)+E+"px"}function l(B,F,I){if(null!=u)return B;var G;return function(){var S=this,U=arguments,N=I&&!G;clearTimeout(G);G=setTimeout(function(){G=null;I||B.apply(S,U)},F);N&&B.apply(S,U)}}var u=window.requestAnimationFrame||window.mozRequestAnimationFrame||window.webkitRequestAnimationFrame||window.msRequestAnimationFrame,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.isRevisionHistoryEnabled=function(){var d=this.getCurrentFile();return null!=d&&(d.constructor==DriveFile&&d.isEditable()||d.constructor==DropboxFile)};EditorUi.prototype.getServiceName=function(){return"draw.io"};EditorUi.prototype.addRemoteServiceSecurityCheck=function(d){d.setRequestHeader("Content-Language","da, mi, en, de-DE")};EditorUi.prototype.loadUrl=function(d,g,n,q,t,v,B,F){EditorUi.logEvent("SHOULD NOT BE CALLED: loadUrl");return this.editor.loadUrl(d,g,n,q,t,v,B,F)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
TrelloClient.prototype.insertFile=function(b,e,f,c,k,l){k=null!=k?k:!1;var u=mxUtils.bind(this,function(){var x=mxUtils.bind(this,function(E){this.writeFile(b,E,l,mxUtils.bind(this,function(D){k?f(new TrelloLibrary(this.ui,e,D)):f(new TrelloFile(this.ui,e,D))}),c)});this.ui.useCanvasForExport&&/(\.png)$/i.test(b)?this.ui.getEmbeddedPng(mxUtils.bind(this,function(E){x(this.ui.base64ToBlob(E,"image/png"))}),c,e):x(e)});this.authenticate(u,c)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){E=!1;c({code:App.ERROR_TIMEOUT})}),this.ui.timeout),A=this.client.filesGetMetadata({path:"/"+e.path.substring(1),include_deleted:!1});A.then(mxUtils.bind(this,function(K){}));A["catch"](function(K){window.clearTimeout(D);E&&null!=K&&409==K.status&&(E=!1,c({message:mxResources.get("fileNotFound")}))});A=this.client.filesDownload(e);A.then(mxUtils.bind(this,function(K){window.clearTimeout(D);if(E){E=!1;try{var H=new FileReader;H.onload=mxUtils.bind(this,function(d){f(H.result,K)});k?H.readAsDataURL(K.fileBlob):
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.isDiagramEmpty()&&this.currentPage.getName()==mxResources.get("pageWithNumber",[1])};EditorUi.prototype.confirmImageResize=function(d,g){g=null!=g?g:!1;var n=null!=this.spinner&&null!=this.spinner.pause?this.spinner.pause():function(){},q=isLocalStorage||mxClient.IS_CHROMEAPP?mxSettings.getResizeImages():null,t=function(v,B){if(v||g)mxSettings.setResizeImages(v?B:null),mxSettings.save();n();d(B)};null==q||g?this.showDialog((new ConfirmDialog(this,mxResources.get("resizeLargeImages"),function(v){t(v, !0)},function(v){t(v,!1)},mxResources.get("resize"),mxResources.get("actualSize"),'<img style="margin-top:8px;" src="'+Editor.loResImage+'"/>','<img style="margin-top:8px;" src="'+Editor.hiResImage+'"/>',isLocalStorage||mxClient.IS_CHROMEAPP)).container,340,isLocalStorage||mxClient.IS_CHROMEAPP?220:200,!0,!0):t(!1,q)};EditorUi.prototype.parseFile=function(d,g,n){n=null!=n?n:d.name;var q=new FileReader;q.onload=mxUtils.bind(this,function(){this.parseFileData(q.result,g,n)});q.readAsText(d)};EditorUi.prototype.parseFileData=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.chromelessWindowResize=function(){};var D=Menus.prototype.init;Menus.prototype.init=function(){D.apply(this,arguments);var H=this.editorUi;EditorUi.enablePlantUml&&!H.isOffline()&&H.actions.put("plantUml",new Action(mxResources.get("plantUml")+"...",function(){var n=new ParseDialog(H,mxResources.get("plantUml")+"...","plantUml");H.showDialog(n.container,620,420,!0,!1);n.init()}));H.actions.put("mermaid",new Action(mxResources.get("mermaid")+"...",function(){var n=new ParseDialog(H, mxResources.get("mermaid")+"...","mermaid");H.showDialog(n.container,620,420,!0,!1);n.init()}));var d="horizontalFlow verticalFlow - horizontalTree verticalTree radialTree - organic circle".split(" "),g=function(n,q,t,v){n.addItem(t,null,mxUtils.bind(this,function(){var B=new CreateGraphDialog(H,t,v);H.showDialog(B.container,620,420,!0,!1);B.init()}),q)};this.put("insertLayout",new Menu(mxUtils.bind(this,function(n,q){for(var t=0;t<d.length;t++)"-"==d[t]?n.addSeparator(q):g(n,q,mxResources.get(d[t])+ "...",d[t])})))};EditorUi.prototype.installFormatToolbar=function(H){var d=this.editor.graph,g=document.createElement("div");g.style.cssText="position:absolute;top:10px;z-index:1;border-radius:4px;box-shadow:0px 0px 3px 1px #d1d1d1;padding:6px;white-space:nowrap;background-color:#fff;transform:translate(-50%, 0);left:50%;";d.getSelectionModel().addListener(mxEvent.CHANGE,mxUtils.bind(this,function(n,q){0<d.getSelectionCount()?(H.appendChild(g),g.innerHTML="Selected: "+d.getSelectionCount()):null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
retry:k})}),mxUtils.bind(this,function(){l&&(window.onGitLabCallback=null,l=!1,c({message:mxResources.get("accessDenied"),retry:k}))}))});k()}else c({code:App.ERROR_BUSY})};GitLabClient.prototype.executeRequest=function(e,f,c,k){var l=mxUtils.bind(this,function(x){var E=!0,D=window.setTimeout(mxUtils.bind(this,function(){E=!1;c({code:App.ERROR_TIMEOUT,message:mxResources.get("timeout")})}),this.ui.timeout),A=this.authToken+" "+b;e.setRequestHeaders=function(K,H){K.setRequestHeader("Authorization", A);K.setRequestHeader("PRIVATE_TOKEN",A);K.setRequestHeader("Content-Type","application/json")};e.send(mxUtils.bind(this,function(){window.clearTimeout(D);if(E)if(200<=e.getStatus()&&299>=e.getStatus()||k&&404==e.getStatus())f(e);else if(401===e.getStatus())x?c({message:mxResources.get("accessDenied"),retry:mxUtils.bind(this,function(){this.authenticate(function(){u(!0)},c)})}):this.authenticate(function(){l(!0)},c);else if(403===e.getStatus()){var K=!1;try{var H=JSON.parse(e.getText());null!=H&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
StorageFile.prototype.rename=function(b,e,f){var c=this.getTitle();c!=b?StorageFile.getFileInfo(this.ui,b,mxUtils.bind(this,function(k){var l=mxUtils.bind(this,function(){this.title=b;this.hasSameExtension(c,b)||this.setData(this.ui.getFileData());this.saveFile(b,!1,mxUtils.bind(this,function(){this.ui.removeLocalData(c,e)}),f)});null!=k?this.ui.confirm(mxResources.get("replaceIt",[b]),l,f):l()}),f):e()};StorageFile.prototype.open=function(){DrawioFile.prototype.open.apply(this,arguments);this.saveFile(this.getTitle())};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m.ownerSVGElement.parentNode.insertBefore(this.webKitForceRepaintNode,m.ownerSVGElement))}};var N=Graph.prototype.refresh;Graph.prototype.refresh=function(){N.apply(this,arguments);this.refreshBackgroundImage()};Graph.prototype.refreshBackgroundImage=function(){null!=this.backgroundImage&&null!=this.backgroundImage.originalSrc&&(this.setBackgroundImage(this.backgroundImage),this.view.validateBackgroundImage())};var P=Graph.prototype.loadStylesheet;Graph.prototype.loadStylesheet=function(){P.apply(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g.getCurrentCellStyle(M).treeMoving);return p}function l(M){var p=!1;null!=M&&(M=n.getParent(M),p=g.view.getState(M),p="tree"==(null!=p?p.style:g.getCellStyle(M)).containerType);return p}function u(M){var p=!1;null!=M&&(M=n.getParent(M),p=g.view.getState(M),g.view.getState(M),p=null!=(null!=p?p.style:g.getCellStyle(M)).childLayout);return p}function x(M){M=g.view.getState(M);if(null!=M){var p=g.getIncomingTreeEdges(M.cell);if(0<p.length&&(p=g.view.getState(p[0]),null!=p&&(p=p.absolutePoints,null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
t,mxResources.get("ok"),function(F){null!=F?t=F:v.value="blank"},mxResources.get("url"),null,null,null,null,function(){v.value="blank"});this.showDialog(B.container,300,80,!0,!1);B.init()}}));mxEvent.addListener(n,"change",mxUtils.bind(this,function(){n.checked&&(null==g||g.checked)?v.removeAttribute("disabled"):v.setAttribute("disabled","disabled")}));mxUtils.br(d);return{getLink:function(){return n.checked?"blank"===v.value?"_blank":t:null},getEditInput:function(){return n},getEditSelect:function(){return v}}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.adoptTheirPages=function(b,e,f){var c={};if(null!=e[EditorUi.DIFF_INSERT])for(var k=0;k<e[EditorUi.DIFF_INSERT].length;k++)c[e[EditorUi.DIFF_INSERT][k].id]=e[EditorUi.DIFF_INSERT][k];for(var l in b[EditorUi.DIFF_UPDATE])null!=c[l]&&(null==f[EditorUi.DIFF_INSERT]&&(f[EditorUi.DIFF_INSERT]=[]),null==f[EditorUi.DIFF_UPDATE]&&(f[EditorUi.DIFF_UPDATE]={}),f[EditorUi.DIFF_INSERT].push(c[l]),f[EditorUi.DIFF_UPDATE][l]=b[EditorUi.DIFF_UPDATE][l],delete b[EditorUi.DIFF_UPDATE][l])};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
va,La.width*va,La.height*va))}return Aa};var Ja=ka.getGlobalVariable;ka.getGlobalVariable=function(Aa){return"page"==Aa?ja.getName():"pagenumber"==Aa?ia+1:"pagecount"==Aa?null!=m.pages?m.pages.length:1:Ja.apply(this,arguments)};document.body.appendChild(ka.container);m.updatePageRoot(ja);ka.model.setRoot(ja.root)}na=Ha(ka,na,ia!=ma,ja.getId());ka!=T&&ka.container.parentNode.removeChild(ka.container)}}else na=Ha(T);null==na||null==na.wnd?m.handleError({message:mxResources.get("errorUpdatingPreview")}): (na.mathEnabled&&(ma=na.wnd.document,Qa&&(na.wnd.IMMEDIATE_PRINT=!0),ma.writeln('<script type="text/javascript" src="'+DRAWIO_BASE_URL+'/js/math-print.js">\x3c/script>')),na.closeDocument(),Graph.rewritePageLinks(na.wnd.document),!na.mathEnabled&&Qa&&PrintDialog.printPreview(na));null!=Ia&&(T.shapeForegroundColor=Va,T.shapeBackgroundColor=Ua,T.stylesheet=Ia,T.refresh())}}var T=m.editor.graph,W=document.createElement("div"),V=document.createElement("h3");V.style.width="100%";V.style.textAlign="center";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d?d:"",extras:JSON.stringify(t),scale:B,border:F,w:U&&isFinite(U)?U:null,h:N&&isFinite(N)?N:null}};EditorUi.prototype.setMode=function(d,g){this.mode=d};EditorUi.prototype.getDiagramId=function(){var d=window.location.hash;null!=d&&0<d.length&&(d=d.substring(1));if(null!=d&&1<d.length){var g=d.indexOf("#");0<=g&&(d=d.substring(0,g))}return d};EditorUi.prototype.getHashObject=function(){var d=window.location.hash,g={};if(null!=d&&0<d.length){var n=d.lastIndexOf("#");if(0<n){d=decodeURIComponent(d.substring(n+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.settingsKey=".sketch-config")};EditorUi.initTheme();EditorUi.prototype.showImageDialog=function(d,g,n,q,t,v,B){d=new ImageDialog(this,d,g,n,q,t,v,B);this.showDialog(d.container,Graph.fileSupport?480:360,Graph.fileSupport?200:90,!0,!0);d.init()};EditorUi.prototype.showLocalStorageDialog=function(d,g,n,q,t,v){var B=localStorage.getItem(g);d=new TextareaDialog(this,d,null!=B?JSON.stringify(JSON.parse(B),null,2):"",mxUtils.bind(this,function(F){if(null!=F)try{if(null!=v&&v(F),F==B)this.hideDialog();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxJsCanvas.prototype.setGradient=function(b,e,f,c,k,l,u,x,E){f=this.ctx.createLinearGradient(0,c,0,c+l);c=this.state;c.fillColor=b;c.fillAlpha=null!=x?x:1;c.gradientColor=e;c.gradientAlpha=null!=E?E:1;c.gradientDirection=u;b=this.hexToRgb(b);e=this.hexToRgb(e);null!=b&&f.addColorStop(0,"rgba("+b.r+","+b.g+","+b.b+","+c.fillAlpha+")");null!=e&&f.addColorStop(1,"rgba("+e.r+","+e.g+","+e.b+","+c.gradientAlpha+")");this.ctx.fillStyle=f};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
delete t.cells[v]}}),g(EditorUi.DIFF_INSERT),g(EditorUi.DIFF_UPDATE),mxUtils.isEmptyObject(t.cells)&&delete t.cells);mxUtils.isEmptyObject(t)&&delete d[EditorUi.DIFF_UPDATE][q]}mxUtils.isEmptyObject(d[EditorUi.DIFF_UPDATE])&&delete d[EditorUi.DIFF_UPDATE]}return d};EditorUi.prototype.anonymizeAttributes=function(d,g){if(null!=d.attributes)for(var n=0;n<d.attributes.length;n++)"as"!=d.attributes[n].name&&d.setAttribute(d.attributes[n].name,this.anonymizeString(d.attributes[n].value,g));if(null!=d.childNodes)for(n= 0;n<d.childNodes.length;n++)this.anonymizeAttributes(d.childNodes[n],g)};EditorUi.prototype.anonymizeNode=function(d,g){g=d.getElementsByTagName("mxCell");for(var n=0;n<g.length;n++)null!=g[n].getAttribute("value")&&g[n].setAttribute("value","["+g[n].getAttribute("value").length+"]"),null!=g[n].getAttribute("xmlValue")&&g[n].setAttribute("xmlValue","["+g[n].getAttribute("xmlValue").length+"]"),null!=g[n].getAttribute("style")&&g[n].setAttribute("style","["+g[n].getAttribute("style").length+"]"),null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
window.console&&console.error(J,C,L)}}function k(C){if(b.shareCursorPosition&&!A.isMouseDown){var L=mxUtils.getOffset(A.container),m=A.view.translate,z=A.view.scale,J=null!=b.currentPage?b.currentPage.getId():null;c("cursor",{pageId:J,x:Math.round((C.getX()-L.x+A.container.scrollLeft)/z-m.x),y:Math.round((C.getY()-L.y+A.container.scrollTop)/z-m.y)})}}function l(C,L){var m=null!=b.currentPage?b.currentPage.getId():null;if(null!=C&&null!=C.cursor&&null!=C.lastCursor)if(null!=C.lastCursor.hide||!b.isShowRemoteCursors()|| null!=C.lastCursor.pageId&&C.lastCursor.pageId!=m)C.cursor.style.display="none";else{m=function(){var V=Math.max(A.container.scrollLeft,Math.min(A.container.scrollLeft+A.container.clientWidth-C.cursor.clientWidth,O)),Q=Math.max(A.container.scrollTop-22,Math.min(A.container.scrollTop+A.container.clientHeight-C.cursor.clientHeight,T));W.style.opacity=V!=O||Q!=T?0:1;C.cursor.style.left=V+"px";C.cursor.style.top=Q+"px";C.cursor.style.display=""};var z=A.view.translate,J=A.view.scale,O=(z.x+C.lastCursor.x)* J+8,T=(z.y+C.lastCursor.y)*J-12,W=C.cursor.getElementsByTagName("img")[0];L?(mxUtils.setPrefixedStyle(C.cursor.style,"transition","all 900ms ease-out"),mxUtils.setPrefixedStyle(W.style,"transition","all 900ms ease-out"),window.setTimeout(m,0)):(mxUtils.setPrefixedStyle(C.cursor.style,"transition",null),mxUtils.setPrefixedStyle(W.style,"transition",null),m())}}function u(C,L){try{var m=function(){if(null==g[J]){var Y=B[J];null==Y&&(Y=K%d.length,B[J]=Y,K++);var aa=d[Y];Y=11<Y?"black":"white";g[J]={cursor:document.createElement("div"),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var T=null;null!=O&&0<O.length&&(T=O[0].getAttribute("href"));for(var W=1;W<J.length;W++)if(O=J[W].indexOf(")"),0<O){var V=Editor.trimCssUrl(J[W].substring(0,O));this.graph.isRelativeUrl(V)&&(V=null!=T?T+V:window.location.protocol+"//"+window.location.hostname+("/"==V.charAt(0)?"":m)+V);z.push('url("'+V+'"'+J[W].substring(O))}else z.push(J[W])}else z=[m]}return null!=z?z.join(""):null};Editor.prototype.mapFontUrl=function(m,z,J){/^https?:\/\//.test(z)&&!this.isCorsEnabledForUrl(z)&&(z=PROXY_URL+"?url="+ encodeURIComponent(z));J(m,z)};Editor.prototype.embedCssFonts=function(m,z){var J=m.split("url("),O=0;null==this.cachedFonts&&(this.cachedFonts={});var T=mxUtils.bind(this,function(){if(0==O){for(var X=[J[0]],Z=1;Z<J.length;Z++){var Y=J[Z].indexOf(")");X.push('url("');X.push(this.cachedFonts[Editor.trimCssUrl(J[Z].substring(0,Y))]);X.push('"'+J[Z].substring(Y))}z(X.join(""))}});if(0<J.length){for(m=1;m<J.length;m++){var W=J[m].indexOf(")"),V=null,Q=J[m].indexOf("format(",W);0<Q&&(V=Editor.trimCssUrl(J[m].substring(Q+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.editor.graph;Graph.touchStyle&&(g.panningHandler.isPanningTrigger=function(C){var L=C.getEvent();return null==C.getState()&&!mxEvent.isMouseEvent(L)&&!g.freehand.isDrawing()||mxEvent.isPopupTrigger(L)&&(null==C.getState()||mxEvent.isControlDown(L)||mxEvent.isShiftDown(L))});g.cellEditor.editPlantUmlData=function(C,L,m){var z=JSON.parse(m);L=new TextareaDialog(d,mxResources.get("plantUml")+":",z.data,function(J){null!=J&&d.spinner.spin(document.body,mxResources.get("inserting"))&&d.generatePlantUmlImage(J,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFileSync.prototype.fileChanged=function(b,e,f,c,k){var l=window.setTimeout(mxUtils.bind(this,function(){null!=f&&f()||(EditorUi.debug("DrawioFileSync.fileChanged",[this],"lazy",c,"immediate",k,"remoteFileChanged",this.remoteFileChanged,"valid",this.isValidState()),this.isValidState()?(this.remoteFileChanged=!1,this.file.loadPatchDescriptor(mxUtils.bind(this,function(u){null!=f&&f()||(this.isValidState()?this.catchup(u,b,e,f,k):null!=e&&e())}),e)):null!=e&&e())}),c?this.cacheReadyDelay:0);return this.notifyThread= l};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
AspectDialog.prototype.createPageItem=function(b,e,f){var c=document.createElement("div");c.className="geAspectDlgListItem";c.setAttribute("data-page-id",b);c.innerHTML='<div style="max-width: 100%; max-height: 100%;"></div><div class="geAspectDlgListItemText">'+mxUtils.htmlEntities(e)+"</div>";this.pagesContainer.appendChild(c);var k=this.createViewer(c.childNodes[0],f);e=mxUtils.bind(this,function(){null!=this.selectedItem&&(this.selectedItem.className="geAspectDlgListItem");this.selectedItem=c; this.selectedPage=b;c.className+=" geAspectDlgListItemSelected";this.layersContainer.innerText="";this.selectedLayers={};this.okBtn.setAttribute("disabled","disabled");var l=k.model;l=l.getChildCells(l.getRoot());for(var u=0;u<l.length;u++)this.createLayerItem(l[u],b,k,f)});mxEvent.addListener(c,"click",e);this.aspect.pageId==b&&e()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"0"!=urlParams.pv;Graph.prototype.shadowId="dropShadow";Graph.prototype.svgShadowColor="#3D4574";Graph.prototype.svgShadowOpacity="0.4";Graph.prototype.svgShadowBlur="1.7";Graph.prototype.svgShadowSize="3";Graph.prototype.hiddenTags=[];Graph.prototype.defaultMathEnabled=!1;var g=Graph.prototype.init;Graph.prototype.init=function(){function m(T){z=T}g.apply(this,arguments);this.hiddenTags=[];window.mxFreehand&&(this.freehand=new mxFreehand(this));var z=null;mxEvent.addListener(this.container,"mouseenter", m);mxEvent.addListener(this.container,"mousemove",m);mxEvent.addListener(this.container,"mouseleave",function(T){z=null});this.isMouseInsertPoint=function(){return null!=z};var J=this.getInsertPoint;this.getInsertPoint=function(){return null!=z?this.getPointForEvent(z):J.apply(this,arguments)};var O=this.layoutManager.getLayout;this.layoutManager.getLayout=function(T){var W=this.graph.getCellStyle(T);if(null!=W&&"rack"==W.childLayout){var V=new mxStackLayout(this.graph,!1);V.gridSize=null!=W.rackUnitSize? parseFloat(W.rackUnitSize):"undefined"!==typeof mxRackContainer?mxRackContainer.unitSize:20;V.marginLeft=W.marginLeft||0;V.marginRight=W.marginRight||0;V.marginTop=W.marginTop||0;V.marginBottom=W.marginBottom||0;V.allowGaps=W.allowGaps||0;V.horizontal="1"==mxUtils.getValue(W,"horizontalRack","0");V.resizeParent=!1;V.fill=!0;return V}return O.apply(this,arguments)};this.updateGlobalUrlVariables()};var n=Graph.prototype.postProcessCellStyle;Graph.prototype.postProcessCellStyle=function(m,z){return Graph.processFontStyle(n.apply(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxEvent.getClientX(P),mxEvent.getClientY(P))},U=function(P){for(d.push(P);d.length>f;)d.shift()},N=function(P){var R=d.length;if(1===R%2||R>=f){var M=0,p=0,y,C=0;for(y=P;y<R;y++)C++,P=d[y],M+=P.x,p+=P.y;return{x:M/C,y:p/C}}return null}}}mxFreehand.prototype.NO_SMOOTHING=1;mxFreehand.prototype.MILD_SMOOTHING=4;mxFreehand.prototype.NORMAL_SMOOTHING=8;mxFreehand.prototype.VERY_SMOOTH_SMOOTHING=12;mxFreehand.prototype.SUPER_SMOOTH_SMOOTHING=16;mxFreehand.prototype.HYPER_SMOOTH_SMOOTHING=20;function P2PCollab(b,e,f){function c(C,L){try{if(!N){var m=e.file.getCurrentUser();if(U&&null!=m&&null!=m.displayName){var z={from:F,id:n,type:C,sessionId:e.clientId,userId:m.id,username:m.displayName,data:L,protocol:DrawioFileSync.PROTOCOL,editor:EditorUi.VERSION};z={bytes:e.objectToString(z),data:"aes"};z=JSON.stringify(z);P&&"cursor"!=C&&EditorUi.debug("P2PCollab: sending to socket server",[z]);n++;m=!P&&("cursor"==C||"selectionChange"==C);S&&!m&&y("message",z);if(m)for(p2pId in G)G[p2pId].send(z)}}}catch(J){null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments);this.currentStyle="default-style2"};Graph.prototype.handleCustomLink=function(m){"data:action/json,"==m.substring(0,17)&&(m=JSON.parse(m.substring(17)),null!=m.actions&&this.executeCustomActions(m.actions))};Graph.prototype.executeCustomActions=function(m,z){if(this.executingCustomActions)this.stoppingCustomActions=!0,null!=this.pendingWaitThread&&window.clearTimeout(this.pendingWaitThread),null!=this.pendingExecuteNextAction&&this.pendingExecuteNextAction(),this.fireEvent(new mxEventObject("stopExecutingCustomActions"));
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
na[Xa],0<ka.length&&(oa=document.createElement("div"),oa.className="geTempDlgImportCat",oa.innerText=mxResources.get(Xa,null,Xa),ba.appendChild(oa),G(ka,fa,ma,null,!0))}function S(ka,fa){qa.innerText="";B();var ma=Math.floor(qa.offsetWidth/150)-1;fa=!fa&&ka.length>ma?ma:ka.length;for(var na=0;na<fa;na++){var oa=ka[na];oa.isCategory=!0;var ia=document.createElement("div"),ja=mxResources.get(oa.title);null==ja&&(ja=oa.title.substring(0,1).toUpperCase()+oa.title.substring(1));ia.className="geTempDlgNewDiagramCatItem"; ia.setAttribute("title",ja);ja=mxUtils.htmlEntities(ja);15<ja.length&&(ja=ja.substring(0,15)+"&hellip;");null==O&&(I(!0),B(ia,"geTempDlgNewDiagramCatItemActive",oa));var wa=document.createElement("div");wa.className="geTempDlgNewDiagramCatItemImg";var xa=document.createElement("img");xa.src=NEW_DIAGRAM_CATS_PATH+"/"+oa.img;wa.appendChild(xa);ia.appendChild(wa);wa=document.createElement("div");wa.className="geTempDlgNewDiagramCatItemLbl";wa.innerHTML=ja;ia.appendChild(wa);qa.appendChild(ia);(function(Ka, Ja){mxEvent.addListener(ia,"click",function(){O!=Ja&&(I(!0),B(Ja,"geTempDlgNewDiagramCatItemActive",Ka))});mxEvent.addListener(ia,"dblclick",F)})(oa,ia)}ia=document.createElement("div");ia.className="geTempDlgNewDiagramCatItem";ja=mxResources.get("showAllTemps");ia.setAttribute("title",ja);wa=document.createElement("div");wa.className="geTempDlgNewDiagramCatItemImg";wa.innerText="...";wa.style.fontSize="32px";ia.appendChild(wa);wa=document.createElement("div");wa.className="geTempDlgNewDiagramCatItemLbl"; wa.innerText=ja;ia.appendChild(wa);qa.appendChild(ia);mxEvent.addListener(ia,"click",function(){function Ka(){var Aa=Ja.querySelector(".geTemplateDrawioCatLink");null!=Aa?Aa.click():setTimeout(Ka,200)}ca=!0;var Ja=C.querySelector(".geTemplatesList");Ja.style.display="block";Ba.style.width="";Ca.style.display="";Ca.value="";Y=null;Ka()});da.style.display=ka.length<=ma?"none":""}function U(ka,fa,ma){function na(Oa,Xa){Oa=mxResources.get(Oa,null,Oa.substring(0,1).toUpperCase()+Oa.substring(1));var Sa=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
n)});F()};GitHubClient.prototype.logout=function(){this.clearPersistentToken();this.setUser(null);b=null}})();TrelloFile=function(b,e,f){DrawioFile.call(this,b,e);this.meta=f;this.saveNeededCounter=0};mxUtils.extend(TrelloFile,DrawioFile);TrelloFile.prototype.getHash=function(){return"T"+encodeURIComponent(this.meta.compoundId)};TrelloFile.prototype.getMode=function(){return App.MODE_TRELLO};TrelloFile.prototype.isAutosave=function(){return!0};TrelloFile.prototype.getTitle=function(){return this.meta.name};TrelloFile.prototype.isRenamable=function(){return!1};TrelloFile.prototype.getSize=function(){return this.meta.bytes};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d?d:"",extras:JSON.stringify(t),scale:B,border:F,w:U&&isFinite(U)?U:null,h:N&&isFinite(N)?N:null}};EditorUi.prototype.setMode=function(d,g){this.mode=d};EditorUi.prototype.getDiagramId=function(){var d=window.location.hash;null!=d&&0<d.length&&(d=d.substring(1));if(null!=d&&1<d.length){var g=d.indexOf("#");0<=g&&(d=d.substring(0,g))}return d};EditorUi.prototype.getHashObject=function(){var d=window.location.hash,g={};if(null!=d&&0<d.length){var n=d.lastIndexOf("#");if(0<n){d=decodeURIComponent(d.substring(n+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(D){return this.isTreeEdge(D)}))};Graph.prototype.getIncomingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function c(M){return n.isVertex(M)&&l(M)}function k(M){var p=!1;null!=M&&(p="1"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable