code stringlengths 14 2.05k | label int64 0 1 | programming_language stringclasses 7 values | cwe_id stringlengths 6 14 | cwe_name stringlengths 5 98 ⌀ | description stringlengths 36 379 ⌀ | url stringlengths 36 48 ⌀ | label_name stringclasses 2 values |
|---|---|---|---|---|---|---|---|
EditorUi.prototype.addLinkSection=function(d,g){function n(){var F=document.createElement("div");F.style.width="100%";F.style.height="100%";F.style.boxSizing="border-box";null!=v&&v!=mxConstants.NONE?(F.style.border="1px solid black",F.style.backgroundColor=v):(F.style.backgroundPosition="center center",F.style.backgroundRepeat="no-repeat",F.style.backgroundImage="url('"+Dialog.prototype.closeImage+"')");B.innerText="";B.appendChild(F)}mxUtils.write(d,mxResources.get("links")+":");var q=document.createElement("select");
q.style.width="100px";q.style.padding="0px";q.style.marginLeft="8px";q.style.marginRight="10px";q.className="geBtn";var t=document.createElement("option");t.setAttribute("value","auto");mxUtils.write(t,mxResources.get("automatic"));q.appendChild(t);t=document.createElement("option");t.setAttribute("value","blank");mxUtils.write(t,mxResources.get("openInNewWindow"));q.appendChild(t);t=document.createElement("option");t.setAttribute("value","self");mxUtils.write(t,mxResources.get("openInThisWindow"));
q.appendChild(t);g&&(g=document.createElement("option"),g.setAttribute("value","frame"),mxUtils.write(g,mxResources.get("openInThisWindow")+" ("+mxResources.get("iframe")+")"),q.appendChild(g));d.appendChild(q);mxUtils.write(d,mxResources.get("borderColor")+":");var v="#0000ff",B=null;B=mxUtils.button("",mxUtils.bind(this,function(F){this.pickColor(v||"none",function(I){v=I;n()});mxEvent.consume(F)}));n();B.style.padding=mxClient.IS_FF?"4px 2px 4px 2px":"4px";B.style.marginLeft="4px";B.style.height=
"22px";B.style.width="22px";B.style.position="relative";B.style.top=mxClient.IS_IE||mxClient.IS_IE11||mxClient.IS_EDGE?"6px":"1px";B.className="geColorBtn";d.appendChild(B);mxUtils.br(d);return{getColor:function(){return v},getTarget:function(){return q.value},focus:function(){q.focus()}}};EditorUi.prototype.createUrlParameters=function(d,g,n,q,t,v,B){B=null!=B?B:[];q&&("https://viewer.diagrams.net"==EditorUi.lightboxHost&&"1"!=urlParams.dev||B.push("lightbox=1"),"auto"!=d&&B.push("target="+d),null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.originalQuadTo.apply(this.canvas,arguments):(this.addOp(this.quadOp,W,V,Q,X),this.lastX=Q,this.lastY=X)};m.prototype.curveTo=function(W,V,Q,X,Z,Y){this.passThrough?this.originalCurveTo.apply(this.canvas,arguments):(this.addOp(this.curveOp,W,V,Q,X,Z,Y),this.lastX=Z,this.lastY=Y)};m.prototype.arcTo=function(W,V,Q,X,Z,Y,aa){if(this.passThrough)this.originalArcTo.apply(this.canvas,arguments);else{var ca=mxUtils.arcToCurves(this.lastX,this.lastY,W,V,Q,X,Z,Y,aa);if(null!=ca)for(var da=0;da<ca.length;da+= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(ja?"geTempDlgRadioBtnLarge":"geTempDlgRadioBtnSmall");C.querySelector("."+fa).src="/images/"+ma+"-sel.svg";C.querySelector("."+oa).src="/images/"+ia+".svg";return!0}function v(ka,fa,ma,na){function oa(xa,Ka){null==ja?(xa=/^https?:\/\//.test(xa)&&!b.editor.isCorsEnabledForUrl(xa)?PROXY_URL+"?url="+encodeURIComponent(xa):TEMPLATE_PATH+"/"+xa,mxUtils.get(xa,mxUtils.bind(this,function(Ja){200<=Ja.getStatus()&&299>=Ja.getStatus()&&(ja=Ja.getText());Ka(ja)}))):Ka(ja)}function ia(xa,Ka,Ja){if(null!=xa&&
mxUtils.isAncestorNode(document.body,fa)&&(xa=mxUtils.parseXml(xa),xa=Editor.extractGraphModel(xa.documentElement,!0),null!=xa)){"mxfile"==xa.nodeName&&(xa=Editor.parseDiagramNode(xa.getElementsByTagName("diagram")[0]));var Aa=new mxCodec(xa.ownerDocument),La=new mxGraphModel;Aa.decode(xa,La);xa=La.root.getChildAt(0).children||[];b.sidebar.createTooltip(fa,xa,Math.min((window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth)-80,1E3),Math.min((window.innerHeight||document.documentElement.clientHeight||
document.body.clientHeight)-80,800),null!=ka.title?mxResources.get(ka.title,null,ka.title):null,!0,new mxPoint(Ka,Ja),!0,null,!0);var Da=document.createElement("div");Da.className="geTempDlgDialogMask";C.appendChild(Da);var va=b.sidebar.hideTooltip;b.sidebar.hideTooltip=function(){Da&&(C.removeChild(Da),Da=null,va.apply(this,arguments),b.sidebar.hideTooltip=va)};mxEvent.addListener(Da,"click",function(){b.sidebar.hideTooltip()})}}var ja=null;if(pa||b.sidebar.currentElt==fa)b.sidebar.hideTooltip();
else{var wa=function(xa){pa&&b.sidebar.currentElt==fa&&ia(xa,mxEvent.getClientX(na),mxEvent.getClientY(na));pa=!1;ma.src="/images/icon-search.svg"};b.sidebar.hideTooltip();b.sidebar.currentElt=fa;pa=!0;ma.src="/images/aui-wait.gif";ka.isExt?E(ka,wa,function(){n(mxResources.get("cantLoadPrev"));pa=!1;ma.src="/images/icon-search.svg"}):oa(ka.url,wa)}}function B(ka,fa,ma){if(null!=O){for(var na=O.className.split(" "),oa=0;oa<na.length;oa++)if(-1<na[oa].indexOf("Active")){na.splice(oa,1);break}O.className= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return S}),G=!0);return G};var B=t.stop;t.stop=function(){B.call(this);this.active=!1;null!=t.status&&null!=t.status.parentNode&&t.status.parentNode.removeChild(t.status);t.status=null};t.pause=function(){return function(){}};return t};EditorUi.prototype.isCompatibleString=function(d){try{var g=mxUtils.parseXml(d),n=this.editor.extractGraphModel(g.documentElement,!0);return null!=n&&0==n.getElementsByTagName("parsererror").length}catch(q){}return!1};EditorUi.prototype.isVisioData=function(d){return 8< | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
y.init()}else{var C=function(L){return{id:L.id,isExt:!0,url:L.downloadUrl,title:L.title,imgUrl:L.thumbnailLink,changedBy:L.lastModifyingUserName,lastModifiedOn:L.modifiedDate}};p=new TemplatesDialog(c,function(L,m,z){var J=z.libs,O=z.clibs;c.pickFolder(c.mode,function(T){c.createFile(m,L,null!=J&&0<J.length?J:null,null,function(){c.hideDialog()},null,T,null,null!=O&&0<O.length?O:null)},null==c.stateArg||null==c.stateArg.folderId)},null,null,null,"user",function(L,m,z){var J=new Date;J.setDate(J.getDate()- | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
d;else if("mxfile"==d.nodeName){var q=d.getElementsByTagName("diagram");if(0<q.length){n=q[0];var t=g.getGlobalVariable;g.getGlobalVariable=function(v){return"page"==v?n.getAttribute("name")||mxResources.get("pageWithNumber",[1]):"pagenumber"==v?1:t.apply(this,arguments)}}}null!=n&&(d=Editor.parseDiagramNode(n))}q=this.editor.graph;try{this.editor.graph=g,this.editor.setGraphXml(d)}catch(v){}finally{this.editor.graph=q}return d};EditorUi.prototype.getSvgFileProperties=function(d){return this.getPngFileProperties(d)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(e,f,c){this.ui.confirm(mxResources.get("note")+": "+mxResources.get("fileWillBeSavedInAppFolder",[e.name]),mxUtils.bind(this,function(){this.ui.editor.loadUrl(e.link,mxUtils.bind(this,function(k){this.insertFile(e.name,k,mxUtils.bind(this,function(l){try{this.ui.spinner.stop(),f(l.getHash().substring(1),l)}catch(u){c(u)}}),c,!0)}),c)}),mxUtils.bind(this,function(){this.ui.spinner.stop()}))};DropboxClient.prototype.pickFile=function(e,f){null!=Dropbox.choose?(e=null!=e?e:mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"ellipsis";M.setAttribute("title",R.title+" ("+R.id+")");var p=document.createElement("input");p.setAttribute("type","checkbox");p.checked=b.sidebar.isEntryVisible(R.id);p.defaultChecked=p.checked;M.appendChild(p);mxUtils.write(M," "+R.title);A.appendChild(M);var y=function(C){if(null==C||"INPUT"!=mxEvent.getSource(C).nodeName){K.style.textAlign="center";K.style.padding="0px";K.style.color="";K.innerText="";if(null!=R.desc){var L=document.createElement("pre");L.style.boxSizing="border-box";L.style.fontFamily=
"inherit";L.style.margin="20px";L.style.right="0px";L.style.textAlign="left";mxUtils.write(L,R.desc);K.appendChild(L)}null!=R.imageCallback?R.imageCallback(K):null!=R.image?K.innerHTML+='<img border="0" style="max-width:100%;" src="'+R.image+'"/>':null==R.desc&&(K.style.padding="20px",K.style.color="rgb(179, 179, 179)",mxUtils.write(K,mxResources.get("noPreview")));null!=H&&(H.style.backgroundColor="");H=M;H.style.backgroundColor=Editor.isDarkMode()?"#000000":"#ebf2f9";null!=C&&mxEvent.consume(C)}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Ga;var Ea=aa.gridSize*ra.gridSteps*Q,Qa=aa.getGraphBounds(),Ha=ra.translate.x*ua,Ra=ra.translate.y*ua,Ia=Ha+(Qa.x-Ha)/ua-ca,Va=Ra+(Qa.y-Ra)/ua-ca,Ua=new Image;Ua.onload=function(){try{for(var ka=-Math.round(Ea-mxUtils.mod((Ha-Ia)*Q,Ea)),fa=-Math.round(Ea-mxUtils.mod((Ra-Va)*Q,Ea));ka<ta;ka+=Ea)for(var ma=fa;ma<Fa;ma+=Ea)pa.drawImage(Ua,ka/Q,ma/Q);ya()}catch(na){null!=T&&T(na)}};Ua.onerror=function(ka){null!=T&&T(ka)};Ua.src=Ga}else ya()}catch(ka){null!=T&&T(ka)}});qa.onerror=function(ya){null!=T&&
T(ya)};Z&&this.graph.addSvgShadow(ha);this.graph.mathEnabled&&this.addMathCss(ha);var la=mxUtils.bind(this,function(){try{null!=this.resolvedFontCss&&this.addFontCss(ha,this.resolvedFontCss),qa.src=Editor.createSvgDataUri(mxUtils.getXml(ha))}catch(ya){null!=T&&T(ya)}});this.embedExtFonts(mxUtils.bind(this,function(ya){try{null!=ya&&this.addFontCss(ha,ya),this.loadFonts(la)}catch(Ca){null!=T&&T(Ca)}}))}catch(ya){null!=T&&T(ya)}}),J,Y)}catch(ha){null!=T&&T(ha)}};Editor.crcTable=[];for(var k=0;256>k;k++)for(var l= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l)for(u=0;u<l.length;u++)l[u].node.style.visibility=c?"visible":"hidden"};var f=mxGuide.prototype.destroy;mxGuide.prototype.destroy=function(){f.call(this);var c=this.guidesArrVer,k=this.guidesArrHor;if(null!=c){for(var l=0;l<c.length;l++)c[l].destroy();this.guidesArrVer=null}if(null!=k){for(l=0;l<k.length;l++)k[l].destroy();this.guidesArrHor=null}}})();function mxRuler(b,e,f,c){function k(){var B=b.diagramContainer;K.style.top=B.offsetTop-E+"px";K.style.left=B.offsetLeft-E+"px";K.style.width=(f?0:B.offsetWidth)+E+"px";K.style.height=(f?B.offsetHeight:0)+E+"px"}function l(B,F,I){if(null!=u)return B;var G;return function(){var S=this,U=arguments,N=I&&!G;clearTimeout(G);G=setTimeout(function(){G=null;I||B.apply(S,U)},F);N&&B.apply(S,U)}}var u=window.requestAnimationFrame||window.mozRequestAnimationFrame||window.webkitRequestAnimationFrame||window.msRequestAnimationFrame, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"120px",A.style.backgroundImage="url('"+IMAGE_PATH+"/droptarget.png')",A.style.backgroundPosition="center 65%",A.style.backgroundRepeat="no-repeat",u=document.createElement("div"),u.style.position="absolute",u.style.width="420px",u.style.top="58%",u.style.textAlign="center",u.style.fontSize="18px",u.style.color="#a0c3ff",mxUtils.write(u,mxResources.get("dragImagesHere")),A.appendChild(u));A.appendChild(x);this.container=A},LinkDialog=function(b,e,f,c,k,l,u){function x(B,F,I){I=mxUtils.button("",I);
I.className="geBtn";I.setAttribute("title",F);F=document.createElement("img");F.style.height="26px";F.style.width="26px";F.setAttribute("src",B);I.style.minWidth="42px";I.style.verticalAlign="middle";I.appendChild(F);v.appendChild(I)}var E=document.createElement("div");E.style.height="100%";mxUtils.write(E,mxResources.get("editLink")+":");var D=document.createElement("div");D.className="geTitle";D.style.backgroundColor="transparent";D.style.borderColor="transparent";D.style.whiteSpace="nowrap";D.style.textOverflow= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
StorageFile.prototype.saveFile=function(b,e,f,c){if(this.isEditable()){var k=mxUtils.bind(this,function(){this.isRenamable()&&(this.title=b);try{var l=mxUtils.bind(this,function(){this.setModified(this.getShadowModified());this.contentChanged();null!=f&&f()});this.setShadowModified(!1);var u=this.getData();this.ui.setDatabaseItem(null,[{title:this.title,size:u.length,lastModified:Date.now(),type:this.type},{title:this.title,data:u}],l,mxUtils.bind(this,function(){if(null==this.ui.database)try{this.ui.setLocalData(this.title,
u,l)}catch(x){null!=c&&c(x)}else null!=c&&c()}),["filesInfo","files"])}catch(x){null!=c&&c(x)}});this.isRenamable()&&"."==b.charAt(0)&&null!=c?c({message:mxResources.get("invalidName")}):StorageFile.getFileInfo(this.ui,b,mxUtils.bind(this,function(l){this.isRenamable()&&this.getTitle()!=b&&null!=l?this.ui.confirm(mxResources.get("replaceIt",[b]),k,c):k()}),c)}else null!=f&&f()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!0)},function(v){t(v,!1)},mxResources.get("resize"),mxResources.get("actualSize"),'<img style="margin-top:8px;" src="'+Editor.loResImage+'"/>','<img style="margin-top:8px;" src="'+Editor.hiResImage+'"/>',isLocalStorage||mxClient.IS_CHROMEAPP)).container,340,isLocalStorage||mxClient.IS_CHROMEAPP?220:200,!0,!0):t(!1,q)};EditorUi.prototype.parseFile=function(d,g,n){n=null!=n?n:d.name;var q=new FileReader;q.onload=mxUtils.bind(this,function(){this.parseFileData(q.result,g,n)});q.readAsText(d)};EditorUi.prototype.parseFileData= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
p);var X=mxUtils.bind(this,function(Z,Y,aa){Q.innerText="";mxUtils.write(Q,Math.round(100*v.editor.graph.view.scale*(null!=aa?aa:1))+"%")});v.editor.graph.view.addListener(mxEvent.EVENT_SCALE,X);v.editor.addListener("resetGraphView",X);v.editor.addListener("pageSelected",X);v.editor.graph.addListener("zoomPreview",mxUtils.bind(this,function(Z,Y){X(Z,Y,Y.getProperty("factor"))}))})(W);var V=v.setGraphEnabled;v.setGraphEnabled=function(){V.apply(this,arguments);null!=this.tabContainer&&(W.style.visibility=
this.tabContainer.style.visibility,this.diagramContainer.style.bottom="0"!=urlParams.pages&&"hidden"!=this.tabContainer.style.visibility?this.tabContainerHeight+"px":"0px")}}t.appendChild(F);t.appendChild(v.diagramContainer);q.appendChild(t);v.updateTabContainer();!EditorUi.windowed&&1E3<=c&&b(this,!0);t.appendChild(v.tabContainer);n();mxEvent.addListener(window,"resize",function(){n();null!=v.sidebarWindow&&v.sidebarWindow.window.fit();null!=v.formatWindow&&v.formatWindow.window.fit();null!=v.actions.outlineWindow&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Q.fillStyle=V;return Q};m.prototype.begin=function(){this.passThrough?this.originalBegin.apply(this.canvas,arguments):this.path=[]};m.prototype.end=function(){this.passThrough&&this.originalEnd.apply(this.canvas,arguments)};m.prototype.addOp=function(){if(null!=this.path&&(this.path.push(arguments[0]),2<arguments.length))for(var W=2;W<arguments.length;W+=2)this.lastX=arguments[W-1],this.lastY=arguments[W],this.path.push(this.canvas.format(this.lastX)),this.path.push(this.canvas.format(this.lastY))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxConstants.STYLE_STROKECOLOR,mxUtils.getValue(P,mxConstants.STYLE_STROKECOLOR,"#000"));"default"==P&&(P=b.shapeForegroundColor);return P};this.createStyle=function(P){var R=";fillColor=none;";v&&(R=";lineShape=1;");return mxConstants.STYLE_SHAPE+"="+P+R};this.stopDrawing=function(){if(0<k.length){if(v){for(var P=[],R=0;R<u.length;R++)null!=u[R]&&P.push([u[R].x,u[R].y]);P=PerfectFreehand.getStroke(P,t);u=[];for(R=0;R<P.length;R++)u.push({x:P[R][0],y:P[R][1]});u.push(null)}P=u[0].x;var M=u[0].x,p= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return S}),G=!0);return G};var B=t.stop;t.stop=function(){B.call(this);this.active=!1;null!=t.status&&null!=t.status.parentNode&&t.status.parentNode.removeChild(t.status);t.status=null};t.pause=function(){return function(){}};return t};EditorUi.prototype.isCompatibleString=function(d){try{var g=mxUtils.parseXml(d),n=this.editor.extractGraphModel(g.documentElement,!0);return null!=n&&0==n.getElementsByTagName("parsererror").length}catch(q){}return!1};EditorUi.prototype.isVisioData=function(d){return 8< | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
J.substring(0,17)&&this.setLinkForCell(z,this.updateCustomLink(m,J));if(this.isHtmlLabel(z)){var O=document.createElement("div");O.innerHTML=Graph.sanitizeHtml(this.getLabel(z));for(var T=O.getElementsByTagName("a"),W=!1,V=0;V<T.length;V++)J=T[V].getAttribute("href"),null!=J&&"data:action/json,"==J.substring(0,17)&&(T[V].setAttribute("href",this.updateCustomLink(m,J)),W=!0);W&&this.labelChanged(z,O.innerHTML)}};Graph.prototype.updateCustomLink=function(m,z){if("data:action/json,"==z.substring(0,17))try{var J=
JSON.parse(z.substring(17));null!=J.actions&&(this.updateCustomLinkActions(m,J.actions),z="data:action/json,"+JSON.stringify(J))}catch(O){}return z};Graph.prototype.updateCustomLinkActions=function(m,z){for(var J=0;J<z.length;J++){var O=z[J],T;for(T in O)this.updateCustomLinkAction(m,O[T],"cells"),this.updateCustomLinkAction(m,O[T],"excludeCells")}};Graph.prototype.updateCustomLinkAction=function(m,z,J){if(null!=z&&null!=z[J]){for(var O=[],T=0;T<z[J].length;T++)if("*"==z[J][T])O.push(z[J][T]);else{var W= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.synchronizeFile=function(b,e){if(this.savingFile)null!=e&&e({message:mxResources.get("busy")});else{var f=!0,c=window.setTimeout(mxUtils.bind(this,function(){f=!1;null!=e&&e({code:App.ERROR_TIMEOUT,message:mxResources.get("timeout"),retry:mxUtils.bind(this,function(){this.synchronizeFile(b,e)})})}),this.ui.timeout),k=mxUtils.bind(this,function(u){f&&(window.clearTimeout(c),null!=e&&e(u))}),l=mxUtils.bind(this,function(){return!f});null!=this.sync?this.sync.fileChanged(mxUtils.bind(this,
function(u){f&&(window.clearTimeout(c),this.sync.cleanup(b,e,u))}),k,l):this.updateFile(mxUtils.bind(this,function(){f&&(window.clearTimeout(c),null!=b&&b())}),k,l)}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
JSON.stringify(c)+"\r\n---------314159265358979323846\r\nContent-Type: application/octect-stream\r\nContent-Transfer-Encoding: base64\r\n\r\n"+(null!=k?u?k:!window.btoa||mxClient.IS_IE||mxClient.IS_IE11?Base64.encode(k):Graph.base64EncodeUnicode(k):"")+"\r\n---------314159265358979323846--"};l||(f.fullUrl+="&newRevision=false");E&&(f.fullUrl+="&pinned=true");return f};DriveClient.prototype.createLinkPicker=function(){var f=e.linkPicker;if(null==f||e.linkPickerToken!=b){e.linkPickerToken=b;f=(new google.picker.DocsView(google.picker.ViewId.FOLDERS)).setParent("root").setIncludeFolders(!0).setSelectFolderEnabled(!0); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(d,g,n){var q=new XMLHttpRequest;q.open("POST",OPEN_URL);q.setRequestHeader("Content-Type","application/x-www-form-urlencoded");q.onreadystatechange=function(){g(q)};q.send("format=xml&filename="+encodeURIComponent(n)+"&data="+encodeURIComponent(d));try{EditorUi.logEvent({category:"GLIFFY-IMPORT-FILE",action:"size_"+file.size})}catch(t){}};EditorUi.prototype.isResampleImageSize=function(d,g){g=null!=g?g:this.resampleThreshold;return d>g};EditorUi.prototype.resizeImage=function(d,g,n,q,t,v, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxAsyncCanvas.prototype.image=function(b,e,f,c,k,l,u,x){k=this.rewriteImageSource(k);b=this.htmlCanvas.images[k];null==b&&(b=new Image,b.onload=mxUtils.bind(this,function(){this.decWaitCounter()}),b.onerror=mxUtils.bind(this,function(){this.decWaitCounter()}),this.incWaitCounter(),this.htmlCanvas.images[k]=b,b.src=k)};mxAsyncCanvas.prototype.fill=function(){};mxAsyncCanvas.prototype.stroke=function(){};mxAsyncCanvas.prototype.fillAndStroke=function(){}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"https://app.diagrams.net/";var B=d.editor.getEditBlankUrl;this.editor.getEditBlankUrl=function(C){C=null!=C?C:"";"1"==urlParams.dev&&(C+=(0<C.length?"&":"?")+"dev=1");return B.apply(this,arguments)};var F=g.addClickHandler;g.addClickHandler=function(C,L,m){var z=L;L=function(J,O){if(null==O){var T=mxEvent.getSource(J);"a"==T.nodeName.toLowerCase()&&(O=T.getAttribute("href"))}null!=O&&g.isCustomLink(O)&&(mxEvent.isTouchEvent(J)||!mxEvent.isPopupTrigger(J))&&g.customLinkClicked(O)&&mxEvent.consume(J); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
2});var t=null,v=null,B=null,F=null,I=null,G=null,S=null;c.actions.addAction("testPerformance",mxUtils.bind(this,function(){null!=t?(k.view.revalidate=t,t=null):(t=k.view.revalidate,k.view.revalidate=function(){var p=Date.now(),y=t.apply(this,arguments);EditorUi.debug("[Performance] mxGraphView.revalidate",[this],"time",Date.now()-p+" ms","args",arguments);return y});null!=v?(c.selectPage=v,v=null):(v=c.selectPage,c.selectPage=function(){var p=Date.now(),y=v.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.selectPage", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
19)&&localStorage.removeItem("odpickerv7cache")}window.open(this.authUrl+"/oauth2/v2.0/logout","logout","width=525,height=525,status=no,resizable=yes,toolbar=no,menubar=no,scrollbars=yes");this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken();this.setUser(null);b=null}})();GitHubFile=function(b,e,f){DrawioFile.call(this,b,e);this.meta=f;this.peer=this.ui.gitHub};mxUtils.extend(GitHubFile,DrawioFile);GitHubFile.prototype.share=function(){this.ui.editor.graph.openLink("https://github.com/"+encodeURIComponent(this.meta.org)+"/"+encodeURIComponent(this.meta.repo)+"/settings/access")}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
z=/\.png$/i.test(m)||/\.pdf$/i.test(m)||z;var J="t="+(new Date).getTime();m=PROXY_URL+"?url="+encodeURIComponent(m)+"&"+J+(z?"&base64=1":"")}return m};Editor.prototype.isCorsEnabledForUrl=function(m){if(mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||m.substring(0,window.location.origin.length)==window.location.origin)return!0;null!=urlParams.cors&&null==this.corsRegExp&&(this.corsRegExp=new RegExp(decodeURIComponent(urlParams.cors)));return null!=this.corsRegExp&&this.corsRegExp.test(m)||"https://raw.githubusercontent.com/"===
m.substring(0,34)||"https://fonts.googleapis.com/"===m.substring(0,29)||"https://fonts.gstatic.com/"===m.substring(0,26)};Editor.prototype.createImageUrlConverter=function(){var m=new mxUrlConverter;m.updateBaseUrl();var z=m.convert,J=this;m.convert=function(O){if(null!=O){var T="http://"==O.substring(0,7)||"https://"==O.substring(0,8);T&&!navigator.onLine?O=Editor.svgBrokenImage.src:!T||O.substring(0,m.baseUrl.length)==m.baseUrl||J.crossOriginImages&&J.isCorsEnabledForUrl(O)?"chrome-extension://"== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
document.body.clientHeight)-80,800),null!=ka.title?mxResources.get(ka.title,null,ka.title):null,!0,new mxPoint(Ka,Ja),!0,null,!0);var Da=document.createElement("div");Da.className="geTempDlgDialogMask";C.appendChild(Da);var va=b.sidebar.hideTooltip;b.sidebar.hideTooltip=function(){Da&&(C.removeChild(Da),Da=null,va.apply(this,arguments),b.sidebar.hideTooltip=va)};mxEvent.addListener(Da,"click",function(){b.sidebar.hideTooltip()})}}var ja=null;if(pa||b.sidebar.currentElt==fa)b.sidebar.hideTooltip(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"checked"),I.defaultChecked=!0);q&&I.setAttribute("disabled","disabled");v&&(d.appendChild(I),n=document.createElement("label"),mxUtils.write(n,g),n.setAttribute("for",B),d.appendChild(n),t||mxUtils.br(d));return I};EditorUi.prototype.addEditButton=function(d,g){var n=this.addCheckbox(d,mxResources.get("edit")+":",!0,null,!0);n.style.marginLeft="24px";var q=this.getCurrentFile(),t="";null!=q&&q.getMode()!=App.MODE_DEVICE&&q.getMode()!=App.MODE_BROWSER&&(t=window.location.href);var v=document.createElement("select");
v.style.maxWidth="200px";v.style.width="auto";v.style.marginLeft="8px";v.style.marginRight="10px";v.className="geBtn";q=document.createElement("option");q.setAttribute("value","blank");mxUtils.write(q,mxResources.get("makeCopy"));v.appendChild(q);q=document.createElement("option");q.setAttribute("value","custom");mxUtils.write(q,mxResources.get("custom")+"...");v.appendChild(q);d.appendChild(v);mxEvent.addListener(v,"change",mxUtils.bind(this,function(){if("custom"==v.value){var B=new FilenameDialog(this,
t,mxResources.get("ok"),function(F){null!=F?t=F:v.value="blank"},mxResources.get("url"),null,null,null,null,function(){v.value="blank"});this.showDialog(B.container,300,80,!0,!1);B.init()}}));mxEvent.addListener(n,"change",mxUtils.bind(this,function(){n.checked&&(null==g||g.checked)?v.removeAttribute("disabled"):v.setAttribute("disabled","disabled")}));mxUtils.br(d);return{getLink:function(){return n.checked?"blank"===v.value?"_blank":t:null},getEditInput:function(){return n},getEditSelect:function(){return v}}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxJsCanvas.prototype.image=function(b,e,f,c,k,l,u,x){k=this.rewriteImageSource(k);k=this.images[k];if(null!=k&&0<k.height&&0<k.width){var E=this.ctx;E.save();if(l){l=k.width;var D=k.height,A=Math.min(f/l,c/D);b+=(f-l*A)/2;e+=(c-D*A)/2;f=l*A;c=D*A}u&&(E.translate(2*b+f,0),E.scale(-1,1));x&&(E.translate(0,2*e+c),E.scale(1,-1));E.drawImage(k,b,e,f,c);E.restore()}};mxJsCanvas.prototype.begin=function(){this.ctx.beginPath()};mxJsCanvas.prototype.close=function(){this.ctx.closePath()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.tokenRefreshThread=null);0<e&&(this.tokenRefreshInterval=1E3*e,this.tokenRefreshThread=window.setTimeout(mxUtils.bind(this,function(){this.authenticate(this.emptyFn,this.emptyFn,!0)}),900*e))};OneDriveClient.prototype.authenticate=function(e,f,c){if(this.isExtAuth)window.parent.oneDriveAuth(mxUtils.bind(this,function(k){this.updateAuthInfo(k,!0,null==this.endpointHint,e,f)}),f,null!=window.urlParams&&"1"==urlParams.odAuthCancellable);else(new mxXmlRequest(this.redirectUri+"?getState=1",null,
"GET")).send(mxUtils.bind(this,function(k){200<=k.getStatus()&&299>=k.getStatus()?this.authenticateStep2(k.getText(),e,f,c):null!=f&&f(k)}),f)};OneDriveClient.prototype.updateAuthInfo=function(e,f,c,k,l){c&&this.setUser(null);b=e.access_token;delete e.access_token;e.expiresOn=Date.now()+1E3*e.expires_in;this.tokenExpiresOn=e.expiresOn;e.remember=f;this.setPersistentToken(JSON.stringify(e),!f);this.resetTokenRefresh(e.expires_in);c?this.getAccountTypeAndEndpoint(mxUtils.bind(this,function(){k()}), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
libs:ka.getAttribute("libs"),clibs:ka.getAttribute("clibs"),title:ka.getAttribute("title")}),ka=ka.nextSibling;S(Ha)}});var Va=function(ka,fa,ma){za.style.display="";Fa.stop();L=!1;if(m)m=!1;else if(fa)ba.innerText=fa;else{ma=ma||{};fa=0;for(var na in ma)fa+=ma[na].length;0==ka.length&&0==fa?ba.innerText=mxResources.get("noDiagrams"):G(ka,!1,Q,0==fa?null:ma)}};P(V);var Ua=null;mxEvent.addListener(Ca,"keyup",p);mxEvent.addListener(Ca,"search",p);mxEvent.addListener(Ca,"input",p);mxEvent.addListener(la, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"4px");null!=Y&&da.setAttribute("title",Y);null!=aa&&(Q=function(){aa.isEnabled()?(da.removeAttribute("disabled"),da.style.cursor="pointer"):(da.setAttribute("disabled","disabled"),da.style.cursor="default")},aa.addListener("stateChanged",Q),B.addListener("enabledChanged",Q),Q());return da}function g(Q,X,Z){Z=document.createElement("div");Z.className="geMenuItem";Z.style.display="inline-block";Z.style.verticalAlign="top";Z.style.marginRight="6px";Z.style.padding="0 4px 0 4px";Z.style.height="30px"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.extractGraphModelFromXref(W));null!=J&&(J=decodeURIComponent(J.replace(/\\\(/g,"(").replace(/\\\)/g,")")));return J};Editor.extractGraphModelFromXref=function(m){var z=m.trailer,J=null;null!=z&&(z=/.* \/Info (\d+) (\d+) R/g.exec(z.join("\n")),null!=z&&0<z.length&&(z=m[z[1]],null!=z&&(z=/.* \/Subject (\d+) (\d+) R/g.exec(z.join("\n")),null!=z&&0<z.length&&(m=m[z[1]],null!=m&&(m=m.join("\n"),J=m.substring(1,m.length-1))))));return J};Editor.extractParserError=function(m,z){var J=null;m=null!=
m?m.getElementsByTagName("parsererror"):null;null!=m&&0<m.length&&(J=z||mxResources.get("invalidChars"),z=m[0].getElementsByTagName("div"),0<z.length&&(J=mxUtils.getTextContent(z[0])));return null!=J?mxUtils.trim(J):J};Editor.addRetryToError=function(m,z){null!=m&&(m=null!=m.error?m.error:m,null==m.retry&&(m.retry=z))};Editor.mermaidToDrawio=function(m,z,J){if("function"===typeof mxMermaidToDrawio)return mxMermaidToDrawio(m,z,J)};Editor.configure=function(m){if(null!=m){Editor.config=m;Editor.configVersion= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
k,u=0;8>u;u++)l=1==(l&1)?3988292384^l>>>1:l>>>1,Editor.crcTable[k]=l;Editor.updateCRC=function(m,z,J,O){for(var T=0;T<O;T++)m=Editor.crcTable[(m^z.charCodeAt(J+T))&255]^m>>>8;return m};Editor.crc32=function(m){for(var z=-1,J=0;J<m.length;J++)z=z>>>8^Editor.crcTable[(z^m.charCodeAt(J))&255];return(z^-1)>>>0};Editor.writeGraphModelToPng=function(m,z,J,O,T){function W(Y,aa){var ca=X;X+=aa;return Y.substring(ca,X)}function V(Y){Y=W(Y,4);return Y.charCodeAt(3)+(Y.charCodeAt(2)<<8)+(Y.charCodeAt(1)<<16)+
(Y.charCodeAt(0)<<24)}function Q(Y){return String.fromCharCode(Y>>24&255,Y>>16&255,Y>>8&255,Y&255)}m=m.substring(m.indexOf(",")+1);m=window.atob?atob(m):Base64.decode(m,!0);var X=0;if(W(m,8)!=String.fromCharCode(137)+"PNG"+String.fromCharCode(13,10,26,10))null!=T&&T();else if(W(m,4),"IHDR"!=W(m,4))null!=T&&T();else{W(m,17);T=m.substring(0,X);do{var Z=V(m);if("IDAT"==W(m,4)){T=m.substring(0,X-8);"pHYs"==z&&"dpi"==J?(J=Math.round(O/.0254),J=Q(J)+Q(J)+String.fromCharCode(1)):J=J+String.fromCharCode(0)+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null!=z&&z(J,O)};F.call(this,C,L,m)};l.apply(this,arguments);mxClient.IS_SVG&&this.editor.graph.addSvgShadow(g.view.canvas.ownerSVGElement,null,!0);if(null!=this.menus){var I=Menus.prototype.addPopupMenuItems;this.menus.addPopupMenuItems=function(C,L,m){g.isSelectionEmpty()&&"simple"==Editor.currentTheme&&this.addMenuItems(C,["zoomIn","zoomOut","-"],null,m);I.apply(this,arguments);g.isSelectionEmpty()||null==d.addSelectionToScratchpad||this.addMenuItems(C,["-","addToScratchpad"],null,m);g.isSelectionEmpty()&&
"simple"==Editor.currentTheme&&this.addMenuItems(C,["-","exitGroup","home"],null,m)};var G=Menus.prototype.addPopupMenuEditItems;this.menus.addPopupMenuEditItems=function(C,L,m){if(d.editor.graph.isSelectionEmpty())G.apply(this,arguments),d.menus.addMenuItems(C,["copyAsImage"],null,m);else if(this.isShowCellEditItems()?this.addPopupDeleteItem(C,L,m):this.addPopupMenuArrangeItems(C,L,m),this.addMenuItems(C,"- cut copy copyAsImage duplicate -".split(" "),null,m),this.isShowCellEditItems()||this.addPopupDeleteItem(C, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Ga;var Ea=aa.gridSize*ra.gridSteps*Q,Qa=aa.getGraphBounds(),Ha=ra.translate.x*ua,Ra=ra.translate.y*ua,Ia=Ha+(Qa.x-Ha)/ua-ca,Va=Ra+(Qa.y-Ra)/ua-ca,Ua=new Image;Ua.onload=function(){try{for(var ka=-Math.round(Ea-mxUtils.mod((Ha-Ia)*Q,Ea)),fa=-Math.round(Ea-mxUtils.mod((Ra-Va)*Q,Ea));ka<ta;ka+=Ea)for(var ma=fa;ma<Fa;ma+=Ea)pa.drawImage(Ua,ka/Q,ma/Q);ya()}catch(na){null!=T&&T(na)}};Ua.onerror=function(ka){null!=T&&T(ka)};Ua.src=Ga}else ya()}catch(ka){null!=T&&T(ka)}});qa.onerror=function(ya){null!=T&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
G[C].destroyed?(G[C]=m,v[C]=!0,EditorUi.debug("P2PCollab: p2p socket connected",C)):(m.noP2PMapDel=!0,m.destroy(),EditorUi.debug("P2PCollab: p2p socket duplicate",C))});m.on("close",function(){m.noP2PMapDel||(EditorUi.debug("P2PCollab: p2p socket closed",C),D(t[C]),delete G[C])});m.on("data",u);return I[C]=m}}function E(C,L){D(L||t[C]);null!=C&&(delete t[C],v[C]=!1)}function D(C){var L=g[C];if(null!=L){var m=L.selection,z;for(z in m)null!=m[z]&&m[z].destroy();null!=L.cursor&&null!=L.cursor.parentNode&&
L.cursor.parentNode.removeChild(L.cursor);clearTimeout(L.inactiveTO);delete g[C]}}var A=b.editor.graph,K=0,H=null,d="#e6194b #3cb44b #4363d8 #f58231 #911eb4 #f032e6 #469990 #9A6324 #800000 #808000 #000075 #a9a9a9 #ffe119 #42d4f4 #bfef45 #fabed4 #dcbeff #fffac8 #aaffc3 #ffd8b1".split(" "),g={},n=1,q={},t={},v={},B={},F,I={},G={},S=!0,U=!1,N=!1,P="0"!=urlParams["no-p2p"],R=!1,M=0,p=null,y=mxUtils.bind(this,function(C,L){if(!N)try{null!=H?(H.send(JSON.stringify({action:C,msg:L})),P||EditorUi.debug("P2PCollab: sending to socket server", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0;W<V.length;W++)V[W].parentNode.removeChild(V[W]);K(m);m.style.opacity="0.5"}else{V=C(N).replies;for(W=0;W<V.length;W++)v.removeChild(V[W]);for(W=0;W<P.length;W++)if(P[W]==N){P.splice(W,1);break}B.style.display=0==v.getElementsByTagName("div").length?"block":"none"}},function(W){A(m);b.handleError(W,null,null,null,mxUtils.htmlEntities(mxResources.get("objectNotFound")))})})},N.isResolved));d||N.isLocked||0!=M||y(N.isResolved?mxResources.get("reopen"):mxResources.get("resolve"),function(W){function V(){var Q=
W.target;Q.innerText="";N.isResolved=!N.isResolved;mxUtils.write(Q,N.isResolved?mxResources.get("reopen"):mxResources.get("resolve"));for(var X=N.isResolved?"none":"",Z=C(N).replies,Y=Editor.isDarkMode()?"transparent":N.isResolved?"ghostWhite":"white",aa=0;aa<Z.length;aa++){Z[aa].style.backgroundColor=Y;for(var ca=Z[aa].querySelectorAll(".geCommentAction"),da=0;da<ca.length;da++)ca[da]!=Q.parentNode&&(ca[da].style.display=X);G||(Z[aa].style.display="none")}u()}N.isResolved?L(mxResources.get("reOpened")+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
[R],"{1} ago"));P.setAttribute("title",N.toLocaleDateString()+" "+N.toLocaleTimeString())}function D(N){var P=document.createElement("img");P.className="geCommentBusyImg";P.src=IMAGE_PATH+"/spin.gif";N.appendChild(P);N.busyImg=P}function A(N){N.style.border="1px solid red";N.removeChild(N.busyImg)}function K(N){N.style.border="";N.removeChild(N.busyImg)}function H(N,P,R,M,p){function y(W,V,Q){var X=document.createElement("li");X.className="geCommentAction";var Z=document.createElement("a");Z.className= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.patchPage=function(b,e,f,c){var k=b==this.currentPage?this.editor.graph.model:new mxGraphModel(b.root),l=this.createParentLookup(k,e);k.beginUpdate();try{var u=k.updateEdgeParent,x=new mxDictionary,E=[];k.updateEdgeParent=function(q,t){!x.get(q)&&c&&(x.put(q,!0),E.push(q))};var D=l[""],A=null!=D&&null!=D.inserted?D.inserted[""]:null,K=null;null!=A&&(K=this.getCellForJson(A));if(null==K){var H=null!=D&&null!=D.moved?D.moved[""]:null;null!=H&&(K=k.getCell(H))}null!=K&&(k.setRoot(K), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(null==R.getCell()||R.getCell()==H)};K.panningHandler.isForcePanningEvent=function(R){return 2==R.evt.button};var d=K.isCellSelectable;K.isCellSelectable=function(R){return R==H?!1:d.apply(this,arguments)};K.getLinkForCell=function(){return null};var g=K.view.getState(H);A=K.getAllConnectionConstraints(g);for(var n=0;null!=A&&n<A.length;n++){var q=K.getConnectionPoint(g,A[n]);l(q.x-3,q.y-3,A[n])}K.fit(8);K.center();n=b.createToolbarButton(Editor.zoomInImage,mxResources.get("zoomIn"),function(){K.zoomIn()}, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
method:"PUT",contentType:"application/json; charset=UTF-8",params:c}};DriveClient.prototype.getLibrary=function(f,c,k){return this.getFile(f,c,k,!0,!0)};DriveClient.prototype.loadDescriptor=function(f,c,k,l){this.executeRequest({url:"/files/"+f+"?supportsAllDrives=true&fields="+(null!=l?l:this.allFields)},c,k)};DriveClient.prototype.listFiles=function(f,c,k,l,u){this.executeRequest({url:"/files?supportsAllDrives=true&includeItemsFromAllDrives=true&q="+encodeURIComponent("(mimeType contains '"+this.xmlMimeType+
"') "+(f?" and (title contains '"+f+"')":"")+(c?" and (modifiedDate > '"+c.toISOString()+"')":"")+(k?" and ('me' in owners)":""))+"&orderBy=modifiedDate desc,title"},l,u)};DriveClient.prototype.getCustomProperty=function(f,c){f=f.properties;var k=null;if(null!=f)for(var l=0;l<f.length;l++)if(f[l].key==c){k=f[l].value;break}return k};DriveClient.prototype.getFile=function(f,c,k,l,u){l=null!=l?l:!1;u=null!=u?u:!1;null!=urlParams.rev?this.executeRequest({url:"/files/"+f+"/revisions/"+urlParams.rev+"?supportsAllDrives=true"}, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
App.loadScripts=function(b,e,f){for(var c=b.length,k=!1,l=0;l<b.length;l++)mxscript(b[l],function(){0!=--c||k||null==e||e()},null,null,null,function(u){k=!0;null!=f&&f(Error(u))})}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
App.prototype.showAuthDialog=function(b,e,f,c){var k=this.spinner.pause();this.showDialog((new AuthDialog(this,b,e,mxUtils.bind(this,function(l){try{null!=f&&f(l,mxUtils.bind(this,function(){this.hideDialog();k()}))}catch(u){this.editor.setStatus(mxUtils.htmlEntities(u.message))}}))).container,300,e?180:140,!0,!0,mxUtils.bind(this,function(l){null!=c&&c(l);l&&null==this.getCurrentFile()&&null==this.dialog&&this.showSplash()}))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0<Object.getOwnPropertyNames(z).length&&this.container.appendChild(this.addProperties(this.createPanel(),z,m))}};var d=StyleFormatPanel.prototype.addStyleOps;StyleFormatPanel.prototype.addStyleOps=function(m){var z=this.editorUi.getSelectionState();1==z.cells.length?this.addActions(m,["copyStyle","pasteStyle"]):1<=z.cells.length&&this.addActions(m,["pasteStyle","pasteData"]);return d.apply(this,arguments)};EditorUi.prototype.propertiesCollapsed=!0;StyleFormatPanel.prototype.addProperties=function(m, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(q<<5)-q+this.hashValue(d.childNodes[t],g,n)<<0}else if(null!=d&&"function"!==typeof d){d=String(d);g=0;null!=n&&(n.byteCount+=d.length);for(t=0;t<d.length;t++)g=(g<<5)-g+d.charCodeAt(t)<<0;q^=g}return q};EditorUi.prototype.descriptorChanged=function(){};EditorUi.prototype.restoreLibraries=function(){};EditorUi.prototype.saveLibrary=function(d,g,n,q,t,v,B){};EditorUi.prototype.isScratchpadEnabled=function(){return isLocalStorage||mxClient.IS_CHROMEAPP};EditorUi.prototype.toggleScratchpad=function(){this.isScratchpadEnabled()&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
N.value;N.parentNode.removeChild(N);P.parentNode.removeChild(P)}catch(R){b.handleError(R)}v.innerHTML='<div style="padding-top:10px;text-align:center;"><img src="'+IMAGE_PATH+'/spin.gif" valign="middle"> '+mxUtils.htmlEntities(mxResources.get("loading"))+"...</div>";g=b.canReplyToReplies();b.commentsSupported()?b.getComments(function(R){function M(p){if(null!=p){p.sort(function(C,L){return new Date(C.modifiedDate)-new Date(L.modifiedDate)});for(var y=0;y<p.length;y++)M(p[y].replies)}}R.sort(function(p, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
var X=this.fill,Z=this.stroke;this.stroke=this.fill=null;var Y=this.configurePointerEvents,aa=W.setStrokeColor;W.setStrokeColor=function(){};var ca=W.setFillColor;W.setFillColor=function(){};Q||null==X||(this.configurePointerEvents=function(){});W.handJiggle.passThrough=!0;O.apply(this,arguments);W.handJiggle.passThrough=!1;W.setFillColor=ca;W.setStrokeColor=aa;this.configurePointerEvents=Y;this.stroke=Z;this.fill=X;W.restore();Q&&null!=X&&(W.addTolerance=function(){})}O.apply(this,arguments);W.addTolerance= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c)}}}catch(x){}}))}};App.prototype.handleLicense=function(b,e){};App.prototype.getEditBlankXml=function(){var b=this.getCurrentFile();return null!=b&&this.editor.isChromelessView()&&this.editor.graph.isLightboxView()?b.getData():this.getFileData(!0)};App.prototype.updateActionStates=function(){EditorUi.prototype.updateActionStates.apply(this,arguments);this.actions.get("revisionHistory").setEnabled(this.isRevisionHistoryEnabled())}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"simple"==Editor.currentTheme&&this.addMenuItems(C,["-","exitGroup","home"],null,m)};var G=Menus.prototype.addPopupMenuEditItems;this.menus.addPopupMenuEditItems=function(C,L,m){if(d.editor.graph.isSelectionEmpty())G.apply(this,arguments),d.menus.addMenuItems(C,["copyAsImage"],null,m);else if(this.isShowCellEditItems()?this.addPopupDeleteItem(C,L,m):this.addPopupMenuArrangeItems(C,L,m),this.addMenuItems(C,"- cut copy copyAsImage duplicate -".split(" "),null,m),this.isShowCellEditItems()||this.addPopupDeleteItem(C,
L,m),this.addMenuItems(C,["lockUnlock","-"],null,m),!this.isShowStyleItems()){if(1==g.getSelectionCount()&&!g.isCellLocked(L)&&g.isCellEditable(L)&&(this.addSubmenu("editCell",C,null,mxResources.get("edit")),C.addSeparator(),g.getModel().isEdge(L))){this.addSubmenu("line",C);var z=g.getModel().getGeometry(L);null!=z&&null!=z.points&&0<z.points.length&&this.addMenuItems(C,["clearWaypoints"],null,m)}1==g.getSelectionCount()&&this.addMenuItems(C,["enterGroup"],null,m);z=d.getSelectionState();null!=z.mergeCell?
this.addMenuItem(C,"mergeCells"):(1<z.style.colspan||1<z.style.rowspan)&&this.addMenuItem(C,"unmergeCells")}};this.menus.isShowStyleItems=function(){return"simple"!=Editor.currentTheme&&"sketch"!=Editor.currentTheme&&"min"!=Editor.currentTheme};this.menus.isShowHistoryItems=function(){return"simple"!=Editor.currentTheme};this.menus.isShowArrangeItems=this.menus.isShowStyleItems;this.menus.isShowCellEditItems=this.menus.isShowStyleItems}d.actions.get("print").funct=function(){d.showDialog((new PrintDialog(d)).container, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
m.substring(0,34)||"https://fonts.googleapis.com/"===m.substring(0,29)||"https://fonts.gstatic.com/"===m.substring(0,26)};Editor.prototype.createImageUrlConverter=function(){var m=new mxUrlConverter;m.updateBaseUrl();var z=m.convert,J=this;m.convert=function(O){if(null!=O){var T="http://"==O.substring(0,7)||"https://"==O.substring(0,8);T&&!navigator.onLine?O=Editor.svgBrokenImage.src:!T||O.substring(0,m.baseUrl.length)==m.baseUrl||J.crossOriginImages&&J.isCorsEnabledForUrl(O)?"chrome-extension://"==
O.substring(0,19)||mxClient.IS_CHROMEAPP||(O=z.apply(this,arguments)):O=PROXY_URL+"?url="+encodeURIComponent(O)}return O};return m};Editor.createSvgDataUri=function(m){return"data:image/svg+xml;base64,"+btoa(unescape(encodeURIComponent(m)))};Editor.prototype.convertImageToDataUri=function(m,z){try{var J=!0,O=window.setTimeout(mxUtils.bind(this,function(){J=!1;z(Editor.svgBrokenImage.src)}),this.timeout);if(/(\.svg)$/i.test(m))mxUtils.get(m,mxUtils.bind(this,function(W){window.clearTimeout(O);J&&z(Editor.createSvgDataUri(W.getText()))}), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.bind(this,function(E){window.clearTimeout(x);u&&(200<=E.getStatus()&&299>=E.getStatus()||404==E.getStatus()?(null==this.user&&this.updateUser(this.emptyFn,this.emptyFn,!0),f(E)):l||401!==E.getStatus()&&400!==E.getStatus()?c(this.parseRequestText(E)):this.authenticate(function(){k(!0)},c,l))}),mxUtils.bind(this,function(E){window.clearTimeout(x);u&&c(E)}))});null==b||6E4>this.tokenExpiresOn-Date.now()?this.authenticate(function(){k(!0)},c):k(!1)};OneDriveClient.prototype.checkToken=function(e,
f){null==b||null==this.tokenRefreshThread||6E4>this.tokenExpiresOn-Date.now()?this.authenticate(e,null!=f?f:this.emptyFn):e()};OneDriveClient.prototype.getItemRef=function(e){var f=e.split("/");return 1<f.length?{driveId:f[0],id:f[1]}:{id:e}};OneDriveClient.prototype.getItemURL=function(e,f){var c=e.split("/");return 1<c.length?(e=c[1],(f?"":this.baseUrl)+"/drives/"+c[0]+("root"==e?"/root":"/items/"+e)):(f?"":this.baseUrl)+"/me/drive/items/"+e};OneDriveClient.prototype.getLibrary=function(e,f,c){this.getFile(e, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(this.editor.graph.isEditing()&&null!=this.editor.graph.cellEditor.textarea?this.editor.graph.cellEditor.textarea.focus():(mxUtils.clearSelection(),this.editor.graph.container.focus()))}),0)))};EditorUi.prototype.ctrlEnter=function(){var a=this.editor.graph;if(a.isEnabled())try{for(var b=a.getSelectionCells(),e=new mxDictionary,f=[],g=0;g<b.length;g++){var d=a.isTableCell(b[g])?a.model.getParent(b[g]):b[g];null==d||e.get(d)||(e.put(d,!0),f.push(d))}a.setSelectionCells(a.duplicateCells(f,!1))}catch(h){this.handleError(h)}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(n,q,t){mxCellRenderer.prototype.installCellOverlayListeners.apply(this,arguments);mxEvent.addListener(t.node,mxClient.IS_POINTER?"pointerdown":"mousedown",function(v){q.fireEvent(new mxEventObject("pointerdown","event",v,"state",n))});!mxClient.IS_POINTER&&mxClient.IS_TOUCH&&mxEvent.addListener(t.node,"touchstart",function(v){q.fireEvent(new mxEventObject("pointerdown","event",v,"state",n))})};l.getAllConnectionConstraints=function(){return null};l.connectionHandler.marker.highlight.keepOnTop= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
T.setAttribute("crossorigin","");z.parentNode.insertBefore(T,z)}}}};Editor.trimCssUrl=function(m){return m.replace(RegExp("^[\\s\"']+","g"),"").replace(RegExp("[\\s\"']+$","g"),"")};Editor.GOOGLE_FONTS="https://fonts.googleapis.com/css?family=";Editor.GUID_ALPHABET="0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ-_";Editor.GUID_LENGTH=20;Editor.guid=function(m){m=null!=m?m:Editor.GUID_LENGTH;for(var z=[],J=0;J<m;J++)z.push(Editor.GUID_ALPHABET.charAt(Math.floor(Math.random()*Editor.GUID_ALPHABET.length)));
return z.join("")};Editor.updateStatusInterval=1E4;Editor.prototype.appName="draw.io";Editor.prototype.diagramFileTypes=[{description:"diagramXmlDesc",extension:"drawio",mimeType:"text/xml"},{description:"diagramPngDesc",extension:"png",mimeType:"image/png"},{description:"diagramSvgDesc",extension:"svg",mimeType:"image/svg"},{description:"diagramHtmlDesc",extension:"html",mimeType:"text/html"},{description:"diagramXmlDesc",extension:"xml",mimeType:"text/xml"}];Editor.prototype.libraryFileTypes=[{description:"Library (.drawiolib, .xml)", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
t=-1,v=function(){null!=u?(null!=x&&x(t),t=u(q)):q()};this.drawRuler=v;this.sizeListener=e=l(function(){var B=g.container;f?(B=B.offsetHeight+E,H.height!=B&&(H.height=B,K.style.height=B+"px",v())):(B=B.offsetWidth+E,H.width!=B&&(H.width=B,K.style.width=B+"px",v()))},10);this.pageListener=function(){v()};this.scrollListener=c=l(function(){var B=f?g.container.scrollTop:g.container.scrollLeft;D.lastScroll!=B&&(D.lastScroll=B,v())},10);this.unitListener=function(B,F){D.setUnit(F.getProperty("unit"))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxResources.get("loading"))&&c.getPublicUrl(c.getCurrentFile(),function(y){c.spinner.stop();null!=y?(y=new EmbedDialog(c,'<img src="'+(p.constructor!=DriveFile?y:"https://drive.google.com/uc?id="+p.getId())+'"/>'),c.showDialog(y.container,450,240,!0,!0),y.init()):c.handleError({message:mxResources.get("invalidPublicUrl")})})}));c.actions.put("embedImage",new Action(mxResources.get("image")+"...",function(){c.showEmbedImageDialog(function(p,y,C,L,m,z){c.spinner.spin(document.body,mxResources.get("loading"))&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(D){return this.isTreeEdge(D)}))};Graph.prototype.getIncomingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function c(M){return n.isVertex(M)&&l(M)}function k(M){var p=!1;null!=M&&(p="1"==
g.getCurrentCellStyle(M).treeMoving);return p}function l(M){var p=!1;null!=M&&(M=n.getParent(M),p=g.view.getState(M),p="tree"==(null!=p?p.style:g.getCellStyle(M)).containerType);return p}function u(M){var p=!1;null!=M&&(M=n.getParent(M),p=g.view.getState(M),g.view.getState(M),p=null!=(null!=p?p.style:g.getCellStyle(M)).childLayout);return p}function x(M){M=g.view.getState(M);if(null!=M){var p=g.getIncomingTreeEdges(M.cell);if(0<p.length&&(p=g.view.getState(p[0]),null!=p&&(p=p.absolutePoints,null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxSettings.save())));this.addListener("formatWidthChanged",function(){mxSettings.setFormatWidth(this.formatWidth);mxSettings.save()})}};EditorUi.prototype.copyImage=function(d,g,n){try{null!=navigator.clipboard&&"function"===typeof window.ClipboardItem&&this.spinner.spin(document.body,mxResources.get("exporting"))&&this.editor.exportToCanvas(mxUtils.bind(this,function(q,t){try{this.spinner.stop();var v=this.createImageDataUri(q,g,"png"),B=parseInt(t.getAttribute("width")),F=parseInt(t.getAttribute("height"));
this.writeImageToClipboard(v,B,F,mxUtils.bind(this,function(I){this.handleError(I)}))}catch(I){this.handleError(I)}}),null,null,null,mxUtils.bind(this,function(q){this.spinner.stop();this.handleError(q)}),null,null,null!=n?n:4,null==this.editor.graph.background||this.editor.graph.background==mxConstants.NONE,null,null,null,10,null,null,!1,null,0<d.length?d:null)}catch(q){this.handleError(q)}};EditorUi.prototype.writeImageToClipboard=function(d,g,n,q){var t=this.base64ToBlob(d.substring(d.indexOf(",")+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
v.getGlobalVariable=function(S){return"page"==S?G.getName():"pagenumber"==S?1:I.apply(this,arguments)};document.body.appendChild(v.container);v.model.setRoot(G.root)}this.editor.exportToCanvas(mxUtils.bind(this,function(S){try{null==F&&(F=this.getFileData(!0,null,null,null,null,null,null,null,null,!1));var U=S.toDataURL("image/png");U=Editor.writeGraphModelToPng(U,"tEXt","mxfile",encodeURIComponent(F));d(U.substring(U.lastIndexOf(",")+1));v!=this.editor.graph&&v.container.parentNode.removeChild(v.container)}catch(N){null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"&redirect="+this.sameWinRedirectUrl:""));this.sameWinAuthMode?(window.location.assign(D),x=null):null==x?x=this.createAuthWin(D):x.location=D;null!=x?(window.onGoogleDriveCallback=mxUtils.bind(this,function(A,K){window.onGoogleDriveCallback=null;try{null==A?null!=l&&l({message:mxResources.get("accessDenied")}):this.updateAuthInfo(A,u,!0,k,l)}catch(H){null!=l&&l(H)}finally{null!=K&&K.close()}}),x.focus()):null!=l&&l({message:mxResources.get("allowPopups")})}}catch(A){if(null!=l)l(A);else throw A;
}};DriveClient.prototype.resetTokenRefresh=function(f){null!=this.tokenRefreshThread&&(window.clearTimeout(this.tokenRefreshThread),this.tokenRefreshThread=null);null!=f&&null==f.error&&0<f.expires_in&&(this.tokenRefreshInterval=1E3*parseInt(f.expires_in),this.lastTokenRefresh=(new Date).getTime(),this.tokenRefreshThread=window.setTimeout(mxUtils.bind(this,function(){this.authorize(!0,mxUtils.bind(this,function(){}),mxUtils.bind(this,function(){}))}),900*f.expires_in))};DriveClient.prototype.checkToken= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.div.style.left=Math.max(0,parseInt(this.div.style.left)-d+140)+"px");this.fit()};mxEvent.addListener(this.formatWindow.window.title,"dblclick",mxUtils.bind(this,function(g){mxEvent.getSource(g)==this.formatWindow.window.title&&this.formatWindow.window.toggleMinimized()}))}};var K=EditorUi.prototype.init;EditorUi.prototype.init=function(){function H(Q,X,Z){var Y=v.menus.get(Q),aa=G.addMenu(mxResources.get(Q),mxUtils.bind(this,function(){Y.funct.apply(this,arguments)}),I);aa.className="geMenuItem";
aa.style.display="inline-block";aa.style.boxSizing="border-box";aa.style.top="6px";aa.style.marginRight="6px";aa.style.height="30px";aa.style.paddingTop="6px";aa.style.paddingBottom="6px";aa.style.cursor="pointer";aa.setAttribute("title",mxResources.get(Q));v.menus.menuCreated(Y,aa,"geMenuItem");null!=Z?(aa.style.backgroundImage="url("+Z+")",aa.style.backgroundPosition="center center",aa.style.backgroundRepeat="no-repeat",aa.style.backgroundSize="24px 24px",aa.style.width="34px",aa.innerText=""):
X||(aa.style.backgroundImage="url("+mxWindow.prototype.normalizeImage+")",aa.style.backgroundPosition="right 6px center",aa.style.backgroundRepeat="no-repeat",aa.style.paddingRight="22px");return aa}function d(Q,X,Z,Y,aa,ca){var da=document.createElement("a");da.className="geMenuItem";da.style.display="inline-block";da.style.boxSizing="border-box";da.style.height="30px";da.style.padding="6px";da.style.position="relative";da.style.verticalAlign="top";da.style.top="0px";null!=v.statusContainer?F.insertBefore(da, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
q;for(v=0;v<t.length;v++)B.objectStore(t[v]).put(null!=d&&null!=d[v]?{key:d[v],data:g[v]}:g[v])}catch(F){null!=q&&q(F)}}),q)};EditorUi.prototype.removeDatabaseItem=function(d,g,n,q){this.openDatabase(mxUtils.bind(this,function(t){q=q||"objects";Array.isArray(q)||(q=[q],d=[d]);t=t.transaction(q,"readwrite");t.oncomplete=g;t.onerror=n;for(var v=0;v<q.length;v++)t.objectStore(q[v]).delete(d[v])}),n)};EditorUi.prototype.getDatabaseItem=function(d,g,n,q){this.openDatabase(mxUtils.bind(this,function(t){try{q=
q||"objects";var v=t.transaction([q],"readonly").objectStore(q).get(d);v.onsuccess=function(){g(v.result)};v.onerror=n}catch(B){null!=n&&n(B)}}),n)};EditorUi.prototype.getDatabaseItems=function(d,g,n){this.openDatabase(mxUtils.bind(this,function(q){try{n=n||"objects";var t=q.transaction([n],"readonly").objectStore(n).openCursor(IDBKeyRange.lowerBound(0)),v=[];t.onsuccess=function(B){null==B.target.result?d(v):(v.push(B.target.result.value),B.target.result.continue())};t.onerror=g}catch(B){null!=g&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxJsCanvas.prototype.arcTo=function(b,e,f,c,k,l,u){b=mxUtils.arcToCurves(this.lastMoveX,this.lastMoveY,b,e,f,c,k,l,u);if(null!=b)for(e=0;e<b.length;e+=6)this.curveTo(b[e],b[e+1],b[e+2],b[e+3],b[e+4],b[e+5])};mxJsCanvas.prototype.curveTo=function(b,e,f,c,k,l){this.ctx.bezierCurveTo(b,e,f,c,k,l);this.lastMoveX=k;this.lastMoveY=l};mxJsCanvas.prototype.rect=function(b,e,f,c){this.begin();this.moveTo(b,e);this.lineTo(b+f,e);this.lineTo(b+f,e+c);this.lineTo(b,e+c);this.close()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
b.container.style.cursor=P?"crosshair":"";b.fireEvent(new mxEventObject("freehandStateChanged"))};this.startDrawing=function(){B(!0)};this.isDrawing=function(){return g};var F=mxUtils.bind(this,function(P){if(c){var R=x.length,M=n&&0<u.length&&null!=x&&2>x.length;M||u.push.apply(u,x);x=[];u.push(null);k.push(c);c=null;(M||A)&&this.stopDrawing();A&&(!M||2<=R)&&this.startDrawing();mxEvent.consume(P)}}),I=new mxCell;I.edge=!0;var G=function(){var P=b.getCurrentCellStyle(I);P=mxUtils.getValue(b.currentVertexStyle, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxJsCanvas.prototype.arcTo=function(b,e,f,c,k,l,u){b=mxUtils.arcToCurves(this.lastMoveX,this.lastMoveY,b,e,f,c,k,l,u);if(null!=b)for(e=0;e<b.length;e+=6)this.curveTo(b[e],b[e+1],b[e+2],b[e+3],b[e+4],b[e+5])};mxJsCanvas.prototype.curveTo=function(b,e,f,c,k,l){this.ctx.bezierCurveTo(b,e,f,c,k,l);this.lastMoveX=k;this.lastMoveY=l};mxJsCanvas.prototype.rect=function(b,e,f,c){this.begin();this.moveTo(b,e);this.lineTo(b+f,e);this.lineTo(b+f,e+c);this.lineTo(b,e+c);this.close()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.updateUser(function(){l(!0)},c,u):k(u)});null==b?this.authenticate(function(){l(!0)},c):l(!1)};DropboxClient.prototype.getLibrary=function(e,f,c){this.getFile(e,f,c,!0)};DropboxClient.prototype.getFile=function(e,f,c,k){k=null!=k?k:!1;var l=/\.png$/i.test(e);if(/^https:\/\//i.test(e)||/\.v(dx|sdx?)$/i.test(e)||/\.gliffy$/i.test(e)||/\.pdf$/i.test(e)||!this.ui.useCanvasForExport&&l){var u=mxUtils.bind(this,function(){var x=e.split("/");this.ui.convertFile(e,0<x.length?x[x.length-1]:e,null,this.extension,
f,c)});null!=b?u():this.authenticate(u,c)}else u={path:"/"+e},null!=urlParams.rev&&(u.rev=urlParams.rev),this.readFile(u,mxUtils.bind(this,function(x,E){var D=null;if(0<(l?x.lastIndexOf(","):-1)){var A=this.ui.extractGraphModelFromPng(x);null!=A&&0<A.length?x=A:D=new LocalFile(this,x,e,!0)}f(null!=D?D:k?new DropboxLibrary(this.ui,x,E):new DropboxFile(this.ui,x,E))}),c,l)};DropboxClient.prototype.readFile=function(e,f,c,k){var l=mxUtils.bind(this,function(x){var E=!0,D=window.setTimeout(mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
""))}}catch(G){console.log(G)}this.editor.isChromelessView()?this.editor.graph.isLightboxView()&&this.lightboxFit():this.showLayersDialog();this.chromelessResize&&this.chromelessResize();this.editor.undoManager.clear();this.editor.modified=null!=q?q:!1;this.updateUi();window.self!==window.top&&window.focus();null!=this.format&&this.format.refresh()}))}};EditorUi.prototype.showLayersDialog=function(){1<this.editor.graph.getModel().getChildCount(this.editor.graph.getModel().getRoot())&&(null==this.actions.layersWindow?
this.actions.get("layers").funct():this.actions.layersWindow.window.setVisible(!0))};EditorUi.prototype.getPublicUrl=function(d,g){null!=d?d.getPublicUrl(g):g(null)};EditorUi.prototype.createLoadMessage=function(d){var g=this.editor.graph;return{event:d,pageVisible:g.pageVisible,translate:g.view.translate,bounds:g.getGraphBounds(),currentPage:this.getSelectedPageIndex(),scale:g.view.scale,page:g.view.getBackgroundPageBounds()}};EditorUi.prototype.sendEmbeddedSvgExport=function(d){try{var g=this.editor.graph; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
new mxRectangle(m.x+m.width-4*J,m.y+4*J,0,0):mxRectangle.fromPoint(m.view.getPoint(m));z.bounds.equals(m)&&z.value==O&&z.scale==J||(z.bounds=m,z.value=O,z.scale=J,z.redraw())}};var U=mxGraphView.prototype.validateBackgroundPage;mxGraphView.prototype.validateBackgroundPage=function(){U.apply(this,arguments);if(mxClient.IS_GC&&null!=this.getDrawPane()){var m=this.getDrawPane().parentNode;!this.graph.mathEnabled||mxClient.NO_FO||null!=this.webKitForceRepaintNode&&null!=this.webKitForceRepaintNode.parentNode||
"svg"!=this.graph.container.firstChild.nodeName?null==this.webKitForceRepaintNode||this.graph.mathEnabled&&("svg"==this.graph.container.firstChild.nodeName||this.graph.container.firstChild==this.webKitForceRepaintNode)||(null!=this.webKitForceRepaintNode.parentNode&&this.webKitForceRepaintNode.parentNode.removeChild(this.webKitForceRepaintNode),this.webKitForceRepaintNode=null):(this.webKitForceRepaintNode=document.createElement("div"),this.webKitForceRepaintNode.style.cssText="position:absolute;",
m.ownerSVGElement.parentNode.insertBefore(this.webKitForceRepaintNode,m.ownerSVGElement))}};var N=Graph.prototype.refresh;Graph.prototype.refresh=function(){N.apply(this,arguments);this.refreshBackgroundImage()};Graph.prototype.refreshBackgroundImage=function(){null!=this.backgroundImage&&null!=this.backgroundImage.originalSrc&&(this.setBackgroundImage(this.backgroundImage),this.view.validateBackgroundImage())};var P=Graph.prototype.loadStylesheet;Graph.prototype.loadStylesheet=function(){P.apply(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.diffViewState=function(b,e){var f=b.viewState,c=e.viewState,k={};b==this.currentPage&&(f=this.editor.graph.getViewState());e==this.currentPage&&(c=this.editor.graph.getViewState());if(null!=f&&null!=c)for(var l in this.viewStateProperties)this.diffViewStateProperty(f,c,l,k);return k};EditorUi.prototype.diffViewStateProperty=function(b,e,f,c){b=JSON.stringify(this.getViewStateProperty(b,f));e=JSON.stringify(this.getViewStateProperty(e,f));b!=e&&(c[f]=e)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.globalVars;if(null!=urlParams.vars)try{this.globalVars=null!=this.globalVars?mxUtils.clone(this.globalVars):{};var m=JSON.parse(decodeURIComponent(urlParams.vars));if(null!=m)for(var z in m)this.globalVars[z]=m[z]}catch(J){null!=window.console&&console.log("Error in vars URL parameter: "+J)}};Graph.prototype.getExportVariables=function(){return null!=this.globalVars?mxUtils.clone(this.globalVars):{}};var B=Graph.prototype.getGlobalVariable;Graph.prototype.getGlobalVariable=function(m){var z= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
m);mxEvent.addListener(this.container,"mousemove",m);mxEvent.addListener(this.container,"mouseleave",function(T){z=null});this.isMouseInsertPoint=function(){return null!=z};var J=this.getInsertPoint;this.getInsertPoint=function(){return null!=z?this.getPointForEvent(z):J.apply(this,arguments)};var O=this.layoutManager.getLayout;this.layoutManager.getLayout=function(T){var W=this.graph.getCellStyle(T);if(null!=W&&"rack"==W.childLayout){var V=new mxStackLayout(this.graph,!1);V.gridSize=null!=W.rackUnitSize? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
P()},mxEvent.addListener(A,"scroll",t))}),n)}}))});b?this.user?F():this.updateUser(function(){F()},n,!0):this.authenticate(mxUtils.bind(this,function(){this.updateUser(function(){F()},n,!0)}),n)};GitLabClient.prototype.logout=function(){this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken();this.setUser(null);b=null;this.setToken(null)}})();DrawioComment=function(b,e,f,c,k,l,u){this.file=b;this.id=e;this.content=f;this.modifiedDate=c;this.createdDate=k;this.isResolved=l;this.user=u;this.replies=[]};DrawioComment.prototype.addReplyDirect=function(b){null!=b&&this.replies.push(b)};DrawioComment.prototype.addReply=function(b,e,f,c,k){e()};DrawioComment.prototype.editComment=function(b,e,f){e()};DrawioComment.prototype.deleteComment=function(b,e){b()};DriveComment=function(b,e,f,c,k,l,u,x){DrawioComment.call(this,b,e,f,c,k,l,u);this.pCommentId=x};mxUtils.extend(DriveComment,DrawioComment);DriveComment.prototype.addReply=function(b,e,f,c,k){b={content:b.content};c?b.verb="resolve":k&&(b.verb="reopen");this.file.ui.drive.executeRequest({url:"/files/"+this.file.getId()+"/comments/"+this.id+"/replies",params:b,method:"POST"},mxUtils.bind(this,function(l){e(l.replyId)}),f)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxAsyncCanvas.prototype.setFontFamily=function(b){this.state.fontFamily=b};mxAsyncCanvas.prototype.setFontStyle=function(b){this.state.fontStyle=b};mxAsyncCanvas.prototype.rect=function(b,e,f,c){};mxAsyncCanvas.prototype.roundrect=function(b,e,f,c,k,l){};mxAsyncCanvas.prototype.ellipse=function(b,e,f,c){};mxAsyncCanvas.prototype.rewriteImageSource=function(b){if("http://"==b.substring(0,7)||"https://"==b.substring(0,8))b="/proxy?url="+encodeURIComponent(b);return b}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFileSync.prototype.receiveRemoteChanges=function(b){this.file.ignorePatches(b.c)||(null==this.receivedData?(this.receivedData=[b],window.setTimeout(mxUtils.bind(this,function(){if(this.ui.getCurrentFile()==this.file)if(1==this.receivedData.length)this.doReceiveRemoteChanges(this.receivedData[0].c);else{this.receivedData.sort(function(k,l){return k.id<l.id?-1:k.id>l.id?1:0});for(var e=null,f=0;f<this.receivedData.length;f++){var c=JSON.stringify(this.receivedData[f].c);c!=e&&this.doReceiveRemoteChanges(this.receivedData[f].c);
e=c}}this.receivedData=null}),this.syncReceiveMessageDelay)):this.receivedData.push(b))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
t,n.pasteCounter=0);d.focus();document.execCommand("selectAll",!1,null)}};EditorUi.prototype.copyXml=function(){var d=null;if(Editor.enableNativeCipboard){var g=this.editor.graph;g.isSelectionEmpty()||(d=mxUtils.sortCells(g.getExportableCells(g.model.getTopmostCells(g.getSelectionCells()))),g=mxUtils.getXml(g.encodeCells(d)),navigator.clipboard.writeText(g))}return d};EditorUi.prototype.pasteXml=function(d,g,n,q){var t=this.editor.graph,v=null;t.lastPasteXml==d?t.pasteCounter++:(t.lastPasteXml=d, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
6)this.curveTo(ca[da],ca[da+1],ca[da+2],ca[da+3],ca[da+4],ca[da+5]);this.lastX=Y;this.lastY=aa}};m.prototype.rect=function(W,V,Q,X){this.passThrough?this.originalRect.apply(this.canvas,arguments):(this.path=[],this.nextShape=this.rc.generator.rectangle(W,V,Q,X,this.getStyle(!0,!0)))};m.prototype.ellipse=function(W,V,Q,X){this.passThrough?this.originalEllipse.apply(this.canvas,arguments):(this.path=[],this.nextShape=this.rc.generator.ellipse(W+Q/2,V+X/2,Q,X,this.getStyle(!0,!0)))};m.prototype.roundrect= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return this.editor.embedExtFonts(d)};EditorUi.prototype.exportToCanvas=function(d,g,n,q,t,v,B,F,I,G,S,U,N,P,R,M){EditorUi.logEvent("SHOULD NOT BE CALLED: exportToCanvas");return this.editor.exportToCanvas(d,g,n,q,t,v,B,F,I,G,S,U,N,P,R,M)};EditorUi.prototype.createImageUrlConverter=function(){EditorUi.logEvent("SHOULD NOT BE CALLED: createImageUrlConverter");return this.editor.createImageUrlConverter()};EditorUi.prototype.convertImages=function(d,g,n,q){EditorUi.logEvent("SHOULD NOT BE CALLED: convertImages"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null,B,mxResources.get("cancel"),mxResources.get("discardChanges")):(window.openFile=new OpenFile(function(){window.openFile=null}),window.openFile.setData(d,g),window.openWindow(this.getUrl(),null,mxUtils.bind(this,function(){null!=v&&v.isModified()?this.confirm(mxResources.get("allChangesLost"),null,B,mxResources.get("cancel"),mxResources.get("discardChanges")):B()})));else throw Error(mxResources.get("notADiagramFile"));};EditorUi.prototype.getBasenames=function(){var d={};if(null!=this.pages)for(var g=
0;g<this.pages.length;g++)this.updatePageRoot(this.pages[g]),this.addBasenamesForCell(this.pages[g].root,d);else this.addBasenamesForCell(this.editor.graph.model.getRoot(),d);g=[];for(var n in d)g.push(n);return g};EditorUi.prototype.addBasenamesForCell=function(d,g){function n(B){if(null!=B){var F=B.lastIndexOf(".");0<F&&(B=B.substring(F+1,B.length));null==g[B]&&(g[B]=!0)}}var q=this.editor.graph,t=q.getCellStyle(d);n(mxStencilRegistry.getBasenameForStencil(t[mxConstants.STYLE_SHAPE]));q.model.isEdge(d)&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null,E,k)}else k()}))):k({message:this.invalidFilenameRegExs[0].test(e)?mxResources.get("oneDriveCharsNotAllowed"):mxResources.get("oneDriveInvalidDeviceName")})};OneDriveClient.prototype.checkExists=function(e,f,c,k){var l="/me/drive/root";null!=e&&(l=this.getItemURL(e,!0));this.executeRequest(this.baseUrl+l+"/children/"+encodeURIComponent(f),mxUtils.bind(this,function(u){404==u.getStatus()?k(!0):c?(this.ui.spinner.stop(),this.ui.confirm(mxResources.get("replaceIt",[f]),function(){k(!0)},function(){k(!1)})):
(this.ui.spinner.stop(),this.ui.showError(mxResources.get("error"),mxResources.get("fileExists"),mxResources.get("ok"),function(){k(!1)}))}),function(u){k(!1)},!0)};OneDriveClient.prototype.saveFile=function(e,f,c,k){try{var l=e.getData(),u=mxUtils.bind(this,function(E){var D=mxUtils.bind(this,function(K){f(K,l)}),A=this.getItemURL(e.getId());4E6<=E.length?this.writeLargeFile(A,E,D,c,k):this.writeFile(A+"/content/",E,"PUT",null,D,c,k)});if(this.ui.useCanvasForExport&&/(\.png)$/i.test(e.meta.name)){var x= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
y.width+", "+y.height+", 'The Title', '"+Graph.compress(mxUtils.getXml(k.encodeCells(p)))+"'),")}}));c.actions.addAction("showBoundingBox",mxUtils.bind(this,function(){function p(J){return null==J||null==J.boundingBox||!isNaN(J.boundingBox.x)&&!isNaN(J.boundingBox.y)&&!isNaN(J.boundingBox.width)&&!isNaN(J.boundingBox.height)}var y=k.getGraphBounds(),C=k.view.translate,L=k.view.scale;k.insertVertex(k.getDefaultParent(),null,"",y.x/L-C.x,y.y/L-C.y,y.width/L,y.height/L,"fillColor=none;strokeColor=red;"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"metaEdit","0")?d.showDataDialog(C):n.apply(this,arguments)}}catch(J){d.handleError(J)}};g.getLinkTitle=function(C){return d.getLinkTitle(C)};g.customLinkClicked=function(C){var L=!1;try{d.handleCustomLink(C),L=!0}catch(m){d.handleError(m)}return L};var q=g.parseBackgroundImage;g.parseBackgroundImage=function(C){var L=q.apply(this,arguments);null!=L&&null!=L.src&&Graph.isPageLink(L.src)&&(L={originalSrc:L.src});return L};var t=g.setBackgroundImage;g.setBackgroundImage=function(C){null!=C&&null!=C.originalSrc&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
P()},mxEvent.addListener(A,"scroll",t))}),n)}}))});b?this.user?F():this.updateUser(function(){F()},n,!0):this.authenticate(mxUtils.bind(this,function(){this.updateUser(function(){F()},n,!0)}),n)};GitLabClient.prototype.logout=function(){this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken();this.setUser(null);b=null;this.setToken(null)}})();DrawioComment=function(b,e,f,c,k,l,u){this.file=b;this.id=e;this.content=f;this.modifiedDate=c;this.createdDate=k;this.isResolved=l;this.user=u;this.replies=[]};DrawioComment.prototype.addReplyDirect=function(b){null!=b&&this.replies.push(b)};DrawioComment.prototype.addReply=function(b,e,f,c,k){e()};DrawioComment.prototype.editComment=function(b,e,f){e()};DrawioComment.prototype.deleteComment=function(b,e){b()};DriveComment=function(b,e,f,c,k,l,u,x){DrawioComment.call(this,b,e,f,c,k,l,u);this.pCommentId=x};mxUtils.extend(DriveComment,DrawioComment);DriveComment.prototype.addReply=function(b,e,f,c,k){b={content:b.content};c?b.verb="resolve":k&&(b.verb="reopen");this.file.ui.drive.executeRequest({url:"/files/"+this.file.getId()+"/comments/"+this.id+"/replies",params:b,method:"POST"},mxUtils.bind(this,function(l){e(l.replyId)}),f)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxResources.get("reconnecting"))?window.location.search=this.getSearch(["url"]):null!=q?this.fileLoaded(q)||v():v()});g?d():this.handleError(F,mxResources.get("errorLoadingFile"),d,!0,null,null,!0)}else v();return t};EditorUi.prototype.getHashValueForPages=function(d,g){var n=0,q=new mxGraphModel,t=new mxCodec;null!=g&&(g.byteCount=0,g.attrCount=0,g.eltCount=0,g.nodeCount=0);for(var v=0;v<d.length;v++){this.updatePageRoot(d[v]);var B=d[v].node.cloneNode(!1);B.removeAttribute("name");q.root=d[v].root;
var F=t.encode(q);this.editor.graph.saveViewState(d[v].viewState,F,!0);F.removeAttribute("pageWidth");F.removeAttribute("pageHeight");B.appendChild(F);null!=g&&(g.eltCount+=B.getElementsByTagName("*").length,g.nodeCount+=B.getElementsByTagName("mxCell").length);n=(n<<5)-n+this.hashValue(B,function(I,G,S,U){return!U||"mxGeometry"!=I.nodeName&&"mxPoint"!=I.nodeName||"x"!=G&&"y"!=G&&"width"!=G&&"height"!=G?U&&"mxCell"==I.nodeName&&"previous"==G?null:S:Math.round(S)},g)<<0}return n};EditorUi.prototype.hashValue= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0;ja<xa.length;ja++)oa=xa[ja],0==ia==(null==ma[oa.url])&&(Ja[oa.url]=!0,Ka.push(oa));ma=Ja;ia++}0==Ka.length?sa.innerText=mxResources.get("noResultsFor",[ka]):G(Ka,!0)}}function M(ka){if(Y!=ka||V!=aa)q(),Ba.scrollTop=0,ba.innerText="",sa.innerText=mxResources.get("searchResults")+' "'+ka+'"',Ua=null,ca?R(ka):x&&(ka?(Fa.spin(ba),m=!1,L=!0,x(ka,Va,function(){n(mxResources.get("searchFailed"));Va([])},V?null:l)):P(V)),Y=ka,aa=V}function p(ka){null!=Ua&&clearTimeout(Ua);13==ka.keyCode?M(Ca.value):Ua=
setTimeout(function(){M(Ca.value)},1E3)}var y='<div class="geTempDlgHeader"><img src="/images/draw.io-logo.svg" class="geTempDlgHeaderLogo"><input type="search" class="geTempDlgSearchBox" '+(x?"":'style="display: none"')+' placeholder="'+mxResources.get("search")+'"></div><div class="geTemplatesList" style="display: none"><div class="geTempDlgBack">< '+mxResources.get("back")+'</div><div class="geTempDlgHLine"></div><div class="geTemplatesLbl">'+mxResources.get("templates")+'</div></div><div class="geTempDlgContent" style="width: 100%"><div class="geTempDlgNewDiagramCat"><div class="geTempDlgNewDiagramCatLbl">'+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l))}catch(t){k(t)}}),k)}),k)):c(new GitHubFile(this.ui,f,{org:E,repo:D,ref:A,name:e,path:K,sha:d,isNew:!0})):k()}))};GitHubClient.prototype.showCommitDialog=function(e,f,c,k){var l=this.ui.spinner.pause();e=new FilenameDialog(this.ui,mxResources.get(f?"addedFile":"updateFile",[e]),mxResources.get("ok"),mxUtils.bind(this,function(u){l();c(u)}),mxResources.get("commitMessage"),null,null,null,null,mxUtils.bind(this,function(){k()}),null,280);this.ui.showDialog(e.container,400,80,!0,!1);e.init()};GitHubClient.prototype.writeFile= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
m);z[0].parentNode.appendChild(W)}}};Editor.prototype.csvToArray=function(m){if(0<m.length){var z="",J=[""],O=0,T=!0,W;m=$jscomp.makeIterator(m);for(W=m.next();!W.done;W=m.next())W=W.value,'"'===W?(T&&W===z&&(J[O]+=W),T=!T):","===W&&T?W=J[++O]="":J[O]+=W,z=W;return J}return[]};Editor.prototype.getProxiedUrl=function(m){if((/test\.draw\.io$/.test(window.location.hostname)||/app\.diagrams\.net$/.test(window.location.hostname))&&!this.isCorsEnabledForUrl(m)){var z=/(\.v(dx|sdx?))($|\?)/i.test(m)||/(\.vs(x|sx?))($|\?)/i.test(m); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
TEMPLATE_PATH+"/"+Oa,mxUtils.get(Oa,mxUtils.bind(this,function(Wa){200<=Wa.getStatus()&&299>=Wa.getStatus()&&(Ma=Wa.getText());Ya(Ma,Oa)}))):Ya(Ma,Oa)}function Da(Na,Ya){if(null==fa||z||b.sidebar.currentElt==va)b.sidebar.hideTooltip();else if(b.sidebar.hideTooltip(),null!=J){var Wa="<mxfile><diagram>"+Graph.compress('<mxGraphModel><root><mxCell id="0"/><mxCell id="1" parent="0"/><mxCell id="2" value="" style="shape=image;image='+J.src+';imageAspect=1;" parent="1" vertex="1"><mxGeometry width="'+J.naturalWidth+
'" height="'+J.naturalHeight+'" as="geometry" /></mxCell></root></mxGraphModel>')+"</diagram></mxfile>";B(Wa,mxEvent.getClientX(Na),mxEvent.getClientY(Na),na,fa)}else b.sidebar.currentElt=va,z=!0,La(fa,function(ab){z&&b.sidebar.currentElt==va&&B(ab,mxEvent.getClientX(Na),mxEvent.getClientY(Na),va,Ya);z=!1})}var va=document.createElement("div");va.className="geTemplate geAdaptiveAsset";va.style.position="relative";va.style.height=Fa+"px";va.style.width=pa+"px";va.style.border="1px solid transparent"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
z?null:{from:Math.max(0,Math.min(m-1,da-1)),to:Math.max(0,Math.min(m-1,ba-1))}}c.downloadFile("pdf",null,null,!X.checked,p?!0:!O.checked&&null==da,!Z.checked,null!=aa&&aa.checked,null,null,Y.checked,null!=ca&&ca.checked,da)}),null,mxResources.get("export"));c.showDialog(y.container,300,C,!0,!0)}else c.showDialog((new PrintDialog(c,mxResources.get("formatPdf"))).container,360,null!=c.pages&&1<c.pages.length&&(c.editor.editable||"1"!=urlParams["hide-pages"])?470:390,!0,!0)}));c.actions.addAction("open...", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null,"Templates"),function(){ta.style.display="";qa.style.display="";ha.style.left="160px";X(0);ha.scrollTop=0;ha.innerText="";y=0;W!=Ia&&(Ia=W,ra=V,Ea=Q,ta.innerText="",U(),W=null)});T.push(N);n.appendChild(N);var Z=function(fa){ta.style.display="none";qa.style.display="none";ha.style.left="30px";X(fa?-1:1);null==W&&(W=Ia);ha.scrollTop=0;ha.innerText="";C.spin(ha);var ma=function(na,oa,ia){y=0;C.stop();Ia=na;ia=ia||{};var ja=0,wa;for(wa in ia)ja+=ia[wa].length;if(oa)ha.innerText=oa;else if(0==na.length&&
0==ja)ha.innerText=mxResources.get("noDiagrams",null,"No Diagrams Found");else if(ha.innerText="",0<ja){ta.style.display="";ha.style.left="160px";ta.innerText="";Ea=0;ra={"draw.io":na};for(wa in ia)ra[wa]=ia[wa];U()}else v(!0)};fa?H(Y.value,ma):K(ma)};K&&(N=mxUtils.button(mxResources.get("Recent",null,"Recent"),function(){Z()}),n.appendChild(N),T.push(N));if(H){N=document.createElement("span");N.style.marginLeft="10px";N.innerText=mxResources.get("search")+":";n.appendChild(N);var Y=document.createElement("input"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.addLinkSection=function(d,g){function n(){var F=document.createElement("div");F.style.width="100%";F.style.height="100%";F.style.boxSizing="border-box";null!=v&&v!=mxConstants.NONE?(F.style.border="1px solid black",F.style.backgroundColor=v):(F.style.backgroundPosition="center center",F.style.backgroundRepeat="no-repeat",F.style.backgroundImage="url('"+Dialog.prototype.closeImage+"')");B.innerText="";B.appendChild(F)}mxUtils.write(d,mxResources.get("links")+":");var q=document.createElement("select"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"cells",[R])),b.fireEvent(new mxEventObject("freehandInserted","cell",R))}finally{b.model.endUpdate()}q&&b.setSelectionCells([R])}}for(R=0;R<k.length;R++)k[R].parentNode.removeChild(k[R]);c=null;k=[];u=[]}B(!1)};b.addListener(mxEvent.FIRE_MOUSE_EVENT,mxUtils.bind(this,function(P,R){P=R.getProperty("eventName");R=R.getProperty("event");P==mxEvent.MOUSE_MOVE&&g&&(null!=R.sourceState&&R.sourceState.setCursor("crosshair"),R.consume())}));b.addMouseListener({mouseDown:mxUtils.bind(this,function(P,R){if(b.isEnabled()&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxJsCanvas.prototype.arcTo=function(b,e,f,c,k,l,u){b=mxUtils.arcToCurves(this.lastMoveX,this.lastMoveY,b,e,f,c,k,l,u);if(null!=b)for(e=0;e<b.length;e+=6)this.curveTo(b[e],b[e+1],b[e+2],b[e+3],b[e+4],b[e+5])};mxJsCanvas.prototype.curveTo=function(b,e,f,c,k,l){this.ctx.bezierCurveTo(b,e,f,c,k,l);this.lastMoveX=k;this.lastMoveY=l};mxJsCanvas.prototype.rect=function(b,e,f,c){this.begin();this.moveTo(b,e);this.lineTo(b+f,e);this.lineTo(b+f,e+c);this.lineTo(b,e+c);this.close()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"-rev_"+this.ui.hashValue(x):"")+(null!=t?"-latest_"+t:"")+(null!=n?"-latestRev_"+this.ui.hashValue(n.getCurrentRevisionId()):""));EditorUi.logEvent({category:"CHECKSUM-ERROR-SYNC-FILE-"+H,action:k,label:"user_"+K+(null!=this.sync?"-client_"+this.sync.clientId:"-nosync")+"-bytes_"+d+"-patches_"+e.length+"-size_"+this.getSize()})}catch(v){}}),b)}}catch(n){}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
var BackgroundImageDialog=function(b,e,f,c,k){function l(){null==P||P==mxConstants.NONE?(N.style.display="none",S.checked=!1):(N.style.backgroundColor=P,N.style.display="",S.checked=!0)}var u=b.editor.graph,x=document.createElement("div");x.style.whiteSpace="nowrap";var E=document.createElement("h2");mxUtils.write(E,mxResources.get("background"));E.style.marginTop="0px";x.appendChild(E);var D=null!=f&&null!=f.originalSrc;E=!1;var A=document.createElement("input");A.style.cssText="margin-right:8px;margin-bottom:8px;"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.prototype.resetGraph=function(){editorResetGraph.apply(this,arguments);null==this.graph.defaultPageFormat&&(this.graph.pageFormat=mxSettings.getPageFormat())};(function(){var b=mxPopupMenu.prototype.showMenu;mxPopupMenu.prototype.showMenu=function(){this.div.style.overflowY="auto";this.div.style.overflowX="hidden";this.div.style.maxHeight=Math.max(document.body.clientHeight,document.documentElement.clientHeight)-(EditorUi.isElectronApp?50:10)+"px";b.apply(this,arguments)};Menus.prototype.createHelpLink=function(f){var c=document.createElement("span");c.setAttribute("title",mxResources.get("help"));c.style.cssText="color:blue;text-decoration:underline;margin-left:8px;cursor:help;";
var k=document.createElement("img");mxUtils.setOpacity(k,50);k.style.height="16px";k.style.width="16px";k.setAttribute("border","0");k.setAttribute("valign","bottom");k.setAttribute("src",Editor.helpImage);c.appendChild(k);mxEvent.addGestureListeners(c,mxUtils.bind(this,function(l){this.editorUi.hideCurrentMenu();this.editorUi.openLink(f);mxEvent.consume(l)}));return c};Menus.prototype.addLinkToItem=function(f,c){null!=f&&f.firstChild.nextSibling.appendChild(this.createHelpLink(c))};var e=Menus.prototype.init; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.adoptTheirCellsFromPage=function(b,e,f,c){var k=null!=e[EditorUi.DIFF_UPDATE]?e[EditorUi.DIFF_UPDATE][f]:null;if(null!=k&&null!=k.cells&&null!=k.cells[EditorUi.DIFF_INSERT]){e=k.cells[EditorUi.DIFF_UPDATE];for(var l={},u=0;u<k.cells[EditorUi.DIFF_INSERT].length;u++){var x=k.cells[EditorUi.DIFF_INSERT][u];l[x.id]=x}k={cells:{}};k.cells[EditorUi.DIFF_INSERT]=[];k.cells[EditorUi.DIFF_UPDATE]={};k.inserted={};this.resolveOwnInsertedCells(b.cells[EditorUi.DIFF_INSERT],l,k);this.resolveOwnUpdatedCells(b.cells[EditorUi.DIFF_UPDATE],
l,e,k);null==c[EditorUi.DIFF_UPDATE]&&(c[EditorUi.DIFF_UPDATE]={});delete k.inserted;c[EditorUi.DIFF_UPDATE][f]=k}};EditorUi.prototype.resolveOwnInsertedCells=function(b,e,f){if(null!=b)for(var c=0;c<b.length;c++){var k=b[c];null!=k&&(this.adoptParentCell(k.id,null,e,f),this.adoptTerminalCell(k.id,k,e,!0,f),this.adoptTerminalCell(k.id,k,e,!1,f))}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.