code stringlengths 14 2.05k | label int64 0 1 | programming_language stringclasses 7 values | cwe_id stringlengths 6 14 | cwe_name stringlengths 5 98 ⌀ | description stringlengths 36 379 ⌀ | url stringlengths 36 48 ⌀ | label_name stringclasses 2 values |
|---|---|---|---|---|---|---|---|
function(P){A=P};this.setAutoScroll=function(P){K=P};this.setOpenFill=function(P){H=P};this.setStopClickEnabled=function(P){n=P};this.setSelectInserted=function(P){q=P};this.setSmoothing=function(P){f=P};this.setPerfectFreehandMode=function(P){v=P};this.isPerfectFreehandMode=function(){return v};this.setBrushSize=function(P){t.size=P};this.getBrushSize=function(){return t.size};var B=function(P){g=P;b.getRubberband().setEnabled(!P);b.graphHandler.setSelectEnabled(!P);b.graphHandler.setMoveEnabled(!P); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0;za<this.customFonts.length;za++)if(this.customFonts[za].name==da){sa=!1;break}sa&&(this.customFonts.push({name:da,url:ba}),this.editorUi.fireEvent(new mxEventObject("customFontsChanged","customFonts",this.customFonts)))}finally{Q.getModel().endUpdate()}}}));this.editorUi.showDialog(Z.container,380,Editor.enableWebFonts?250:180,!0,!0);Z.init()}),y,null,!0)})))}})();function DiagramPage(b,e){this.node=b;null!=e?this.node.setAttribute("id",e):null==this.getId()&&this.node.setAttribute("id",Editor.guid())}DiagramPage.prototype.node=null;DiagramPage.prototype.root=null;DiagramPage.prototype.viewState=null;DiagramPage.prototype.getId=function(){return this.node.getAttribute("id")};DiagramPage.prototype.getName=function(){return this.node.getAttribute("name")}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
H.formatElt.style.width)}function e(H,d){function g(t,v){var B=H.menus.get(t);t=n.addMenu(v,mxUtils.bind(this,function(){B.funct.apply(this,arguments)}));t.style.cssText="position:absolute;border-width:1px;cusor:pointer;border-style:none;height:24px;bottom:0px;text-align:center;padding:8px 6px 0 6px;border-top-style:solid;width:50%;height:32px;box-sizing:border-box;font-size:11px;";t.className="geTitle";d.appendChild(t);return t}var n=new Menubar(H,d);if(Editor.enableCustomLibraries&&("1"!=urlParams.embed|| | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxEvent.getClientX(P),mxEvent.getClientY(P))},U=function(P){for(d.push(P);d.length>f;)d.shift()},N=function(P){var R=d.length;if(1===R%2||R>=f){var M=0,p=0,y,C=0;for(y=P;y<R;y++)C++,P=d[y],M+=P.x,p+=P.y;return{x:M/C,y:p/C}}return null}}}mxFreehand.prototype.NO_SMOOTHING=1;mxFreehand.prototype.MILD_SMOOTHING=4;mxFreehand.prototype.NORMAL_SMOOTHING=8;mxFreehand.prototype.VERY_SMOOTH_SMOOTHING=12;mxFreehand.prototype.SUPER_SMOOTH_SMOOTHING=16;mxFreehand.prototype.HYPER_SMOOTH_SMOOTHING=20;function P2PCollab(b,e,f){function c(C,L){try{if(!N){var m=e.file.getCurrentUser();if(U&&null!=m&&null!=m.displayName){var z={from:F,id:n,type:C,sessionId:e.clientId,userId:m.id,username:m.displayName,data:L,protocol:DrawioFileSync.PROTOCOL,editor:EditorUi.VERSION};z={bytes:e.objectToString(z),data:"aes"};z=JSON.stringify(z);P&&"cursor"!=C&&EditorUi.debug("P2PCollab: sending to socket server",[z]);n++;m=!P&&("cursor"==C||"selectionChange"==C);S&&!m&&y("message",z);if(m)for(p2pId in G)G[p2pId].send(z)}}}catch(J){null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0;ja<xa.length;ja++)oa=xa[ja],0==ia==(null==ma[oa.url])&&(Ja[oa.url]=!0,Ka.push(oa));ma=Ja;ia++}0==Ka.length?sa.innerText=mxResources.get("noResultsFor",[ka]):G(Ka,!0)}}function M(ka){if(Y!=ka||V!=aa)q(),Ba.scrollTop=0,ba.innerText="",sa.innerText=mxResources.get("searchResults")+' "'+ka+'"',Ua=null,ca?R(ka):x&&(ka?(Fa.spin(ba),m=!1,L=!0,x(ka,Va,function(){n(mxResources.get("searchFailed"));Va([])},V?null:l)):P(V)),Y=ka,aa=V}function p(ka){null!=Ua&&clearTimeout(Ua);13==ka.keyCode?M(Ca.value):Ua= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null!=ba&&(this.shapeBackgroundColor=za,this.shapeForegroundColor=sa,this.stylesheet=ba,this.refresh());return Ba};var I=mxCellRenderer.prototype.destroy;mxCellRenderer.prototype.destroy=function(m){I.apply(this,arguments);null!=m.secondLabel&&(m.secondLabel.destroy(),m.secondLabel=null)};mxCellRenderer.prototype.getShapesForState=function(m){return[m.shape,m.text,m.secondLabel,m.control]};var G=mxGraphView.prototype.resetValidationState;mxGraphView.prototype.resetValidationState=function(){G.apply(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(m,z,J,O,T,W,V,Q,X,Z){if(null!=J&&null==mxMarker.markers[J]){var Y=this.getPackageForType(J);null!=Y&&mxStencilRegistry.getStencil(Y)}return M.apply(this,arguments)};var p=mxStencil.prototype.drawShape;mxStencil.prototype.drawShape=function(m,z,J,O,T,W){"1"==mxUtils.getValue(z.style,"lineShape",null)&&m.setFillColor(mxUtils.getValue(z.style,mxConstants.STYLE_STROKECOLOR,this.stroke));return p.apply(this,arguments)};PrintDialog.prototype.create=function(m,z){function J(){ca.value=Math.max(1, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
e+"?ref="+D;var A={Authorization:"token "+b};u=e.split("/");this.ui.convertFile(l,0<u.length?u[u.length-1]:e,null,this.extension,f,c,null,A)}else c({message:mxResources.get("accessDenied")});else u="&t="+(new Date).getTime(),e=new mxXmlRequest(this.baseUrl+"/repos/"+x+"/"+E+"/contents/"+e+"?ref="+D+u,null,"GET"),this.executeRequest(e,mxUtils.bind(this,function(K){try{f(this.createGitHubFile(x,E,D,JSON.parse(K.getText()),k))}catch(H){c(H)}}),c)};GitHubClient.prototype.createGitHubFile=function(e,f,
c,k,l){e={org:e,repo:f,ref:c,name:k.name,path:k.path,sha:k.sha,html_url:k.html_url,download_url:k.download_url};f=k.content;"base64"===k.encoding&&(/\.jpe?g$/i.test(k.name)?f="data:image/jpeg;base64,"+f:/\.gif$/i.test(k.name)?f="data:image/gif;base64,"+f:/\.png$/i.test(k.name)?(k=this.ui.extractGraphModelFromPng(f),f=null!=k&&0<k.length?k:"data:image/png;base64,"+f):f=Base64.decode(f));return l?new GitHubLibrary(this.ui,f,e):new GitHubFile(this.ui,f,e)};GitHubClient.prototype.insertLibrary=function(e, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
e.appendChild(l);this.pagesContainer=f;this.layersContainer=l;this.ui=b;f=document.createElement("div");f.style.marginTop="16px";f.style.textAlign="center";l=mxUtils.button(mxResources.get("cancel"),function(){b.hideDialog();null!=k&&k()});l.className="geBtn";b.editor.cancelFirst&&f.appendChild(l);var u=mxUtils.button(mxResources.get("ok"),mxUtils.bind(this,function(){b.hideDialog();c({pageId:this.selectedPage,layerIds:Object.keys(this.selectedLayers)})}));f.appendChild(u);u.className="geBtn gePrimaryBtn"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(f){var c=0<this.lastTokenRefresh;(new Date).getTime()-this.lastTokenRefresh>this.tokenRefreshInterval||null==this.tokenRefreshThread?this.execute(mxUtils.bind(this,function(){f();c&&this.fireEvent(new mxEventObject("disconnected"))})):f()};DriveClient.prototype.updateUser=function(f,c){try{var k={Authorization:"Bearer "+b};this.ui.editor.loadUrl("https://www.googleapis.com/oauth2/v2/userinfo?alt=json",mxUtils.bind(this,function(l){var u=JSON.parse(l);this.executeRequest({url:"/about"},mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
t.value);t.geometry.width+=I.gridSize;t.geometry.height+=I.gridSize}finally{I.getModel().endUpdate()}return[t]}}return[]};EditorUi.prototype.formatFileSize=function(d){var g=-1;do d/=1024,g++;while(1024<d);return Math.max(d,.1).toFixed(1)+" kB; MB; GB; TB;PB;EB;ZB;YB".split(";")[g]};EditorUi.prototype.convertDataUri=function(d){if("data:"==d.substring(0,5)){var g=d.indexOf(";");0<g&&(d=d.substring(0,g)+d.substring(d.indexOf(",",g+1)))}return d};EditorUi.prototype.isRemoteFileFormat=function(d,g){return/("contentType":\s*"application\/gliffy\+json")/.test(d)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.addMenuItem(C,"mergeCells"):(1<z.style.colspan||1<z.style.rowspan)&&this.addMenuItem(C,"unmergeCells")}};this.menus.isShowStyleItems=function(){return"simple"!=Editor.currentTheme&&"sketch"!=Editor.currentTheme&&"min"!=Editor.currentTheme};this.menus.isShowHistoryItems=function(){return"simple"!=Editor.currentTheme};this.menus.isShowArrangeItems=this.menus.isShowStyleItems;this.menus.isShowCellEditItems=this.menus.isShowStyleItems}d.actions.get("print").funct=function(){d.showDialog((new PrintDialog(d)).container,
360,null!=d.pages&&1<d.pages.length?470:390,!0,!0)};this.defaultFilename=mxResources.get("untitledDiagram");var S=g.getExportVariables;g.getExportVariables=function(){var C=S.apply(this,arguments),L=d.getCurrentFile();null!=L&&(C.filename=L.getTitle());C.pagecount=null!=d.pages?d.pages.length:1;C.page=null!=d.currentPage?d.currentPage.getName():"";C.pagenumber=null!=d.pages&&null!=d.currentPage?mxUtils.indexOf(d.pages,d.currentPage)+1:1;return C};var U=g.getGlobalVariable;g.getGlobalVariable=function(C){var L= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
}finally{g.getModel().endUpdate()}v&&(g.setSelectionCell(n),g.scrollCellToVisible(n))}};f=mxUtils.button(mxResources.get("preview"),function(){d(A,K,!1)});f.className="geBtn";E.appendChild(f);f=mxUtils.button(mxResources.get("apply"),function(){d(b.editor.graph,e,!0)});f.className="geBtn gePrimaryBtn";E.appendChild(f);b.editor.cancelFirst||E.appendChild(k);x.appendChild(E);u.appendChild(x);l.appendChild(u);this.container=l},CustomDialog=function(b,e,f,c,k,l,u,x,E,D,A,K){var H=document.createElement("div"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.customFontElements={};Graph.recentCustomFonts={};Graph.isGoogleFontUrl=function(m){return m.substring(0,Editor.GOOGLE_FONTS.length)==Editor.GOOGLE_FONTS};Graph.isCssFontUrl=function(m){return Graph.isGoogleFontUrl(m)};Graph.createFontElement=function(m,z){var J=Graph.fontMapping[z];null==J&&Graph.isCssFontUrl(z)?(m=document.createElement("link"),m.setAttribute("rel","stylesheet"),m.setAttribute("type","text/css"),m.setAttribute("charset","UTF-8"),m.setAttribute("href",z)):(null==J&&(J='@font-face {\nfont-family: "'+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
T.setAttribute("crossorigin","");z.parentNode.insertBefore(T,z)}}}};Editor.trimCssUrl=function(m){return m.replace(RegExp("^[\\s\"']+","g"),"").replace(RegExp("[\\s\"']+$","g"),"")};Editor.GOOGLE_FONTS="https://fonts.googleapis.com/css?family=";Editor.GUID_ALPHABET="0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ-_";Editor.GUID_LENGTH=20;Editor.guid=function(m){m=null!=m?m:Editor.GUID_LENGTH;for(var z=[],J=0;J<m;J++)z.push(Editor.GUID_ALPHABET.charAt(Math.floor(Math.random()*Editor.GUID_ALPHABET.length))); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFileSync.prototype.testChecksum=function(){var b=this.ui.getHashValueForPages(this.ui.pages),e=this.file.getCurrentRevisionId();this.file.getLatestVersion(mxUtils.bind(this,function(f){if(!document.hidden){var c=this.ui.getHashValueForPages(f.getShadowPages()),k=f.getDescriptorChecksum(f.getDescriptor()),l=f.getCurrentRevisionId();EditorUi.debug("DrawioFileSync.testChecksum","local",[this.file],"modified",this.file.isModified(),"inConflictState",this.file.inConflictState,"autosaveThread",this.file.autosaveThread,
"savingFile",this.file.savingFile,"localFileWasChanged",this.localFileWasChanged,"remoteFileChanged",this.remoteFileChanged,"cleanup",this.cleanupThread,"checksum",b);EditorUi.debug("DrawioFileSync.testChecksum","remote",[f],"rev",l==e,"desc",k==c,"checksum",c);c!=b?(EditorUi.debug("DrawioFileSync.testChecksum",[this],"checksums do not match"),this.ui.alert("Checksums do not match")):EditorUi.debug("DrawioFileSync.testChecksum",[this],"checksums match")}}),mxUtils.bind(this,function(f){EditorUi.debug("DrawioFileSync.testChecksum",
[this],"checksum test error",f)}))};DrawioFileSync.prototype.extractLocal=function(b){return mxUtils.isEmptyObject(b)?{}:this.ui.diffPages(this.file.theirPages,this.ui.patchPages(this.ui.clonePages(this.file.theirPages),b))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
else{var wa=function(xa){pa&&b.sidebar.currentElt==fa&&ia(xa,mxEvent.getClientX(na),mxEvent.getClientY(na));pa=!1;ma.src="/images/icon-search.svg"};b.sidebar.hideTooltip();b.sidebar.currentElt=fa;pa=!0;ma.src="/images/aui-wait.gif";ka.isExt?E(ka,wa,function(){n(mxResources.get("cantLoadPrev"));pa=!1;ma.src="/images/icon-search.svg"}):oa(ka.url,wa)}}function B(ka,fa,ma){if(null!=O){for(var na=O.className.split(" "),oa=0;oa<na.length;oa++)if(-1<na[oa].indexOf("Active")){na.splice(oa,1);break}O.className= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
if("["==ba.charAt(0)){var oa=Z;I.view.validate();this.executeLayouts(I.createLayouts(JSON.parse(ba)),function(){na();oa()});Z=null}else if("circle"==ba){var ia=new mxCircleLayout(I);ia.disableEdgeStyle=!1;ia.resetEdges=!1;var ja=ia.isVertexIgnored;ia.isVertexIgnored=function(Da){return ja.apply(this,arguments)||0>mxUtils.indexOf(v,Da)};this.executeLayout(function(){ia.execute(I.getDefaultParent());na()},!0,Z);Z=null}else if("horizontaltree"==ba||"verticaltree"==ba||"auto"==ba&&Ua.length==2*v.length- | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(U){return"page"==U&&null!=I&&null!=I[F]?I[F].getAttribute("name"):"pagenumber"==U?F+1:"pagecount"==U?null!=I?I.length:1:G.apply(this,arguments)};t.getLinkForCell=function(){return null};f=b.createToolbarButton(Editor.zoomInImage,mxResources.get("zoomIn"),function(){t.zoomIn()},20);A=b.createToolbarButton(Editor.zoomInImage,mxResources.get("zoomOut"),function(){t.zoomOut()},20);e=b.createToolbarButton(Editor.zoomFitImage,mxResources.get("fit"),function(){1==t.view.scale?(t.maxFitScale=8,t.fit(8)): | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
TrelloFile.prototype.saveFile=function(b,e,f,c){this.isEditable()?this.savingFile?null!=c&&(this.saveNeededCounter++,c({code:App.ERROR_BUSY})):(this.savingFileTime=new Date,this.setShadowModified(!1),this.savingFile=!0,this.getTitle()==b?this.ui.trello.saveFile(this,mxUtils.bind(this,function(k){this.setModified(this.getShadowModified());this.savingFile=!1;this.meta=k;this.contentChanged();null!=f&&f();0<this.saveNeededCounter&&(this.saveNeededCounter--,this.saveFile(b,e,f,c))}),mxUtils.bind(this,
function(k){this.savingFile=!1;null!=c&&c(k)})):this.ui.pickFolder(App.MODE_TRELLO,mxUtils.bind(this,function(k){this.ui.trello.insertFile(b,this.getData(),mxUtils.bind(this,function(l){this.savingFile=!1;null!=f&&f();this.ui.fileLoaded(l);0<this.saveNeededCounter&&(this.saveNeededCounter--,this.saveFile(b,e,f,c))}),mxUtils.bind(this,function(){this.savingFile=!1;null!=c&&c()}),!1,k)}))):null!=f&&f()};TrelloLibrary=function(b,e,f){TrelloFile.call(this,b,e,f)};mxUtils.extend(TrelloLibrary,TrelloFile);TrelloLibrary.prototype.doSave=function(b,e,f){this.saveFile(b,!1,e,f)};TrelloLibrary.prototype.open=function(){};TrelloClient=function(b){DrawioClient.call(this,b,"tauth");Trello.setKey(this.key)};mxUtils.extend(TrelloClient,DrawioClient);TrelloClient.prototype.key="e89d109082298ce91f6576f82f458551";TrelloClient.prototype.baseUrl="https://api.trello.com/1/";TrelloClient.prototype.SEPARATOR="|$|";TrelloClient.prototype.maxFileSize=1E7;TrelloClient.prototype.extension=".xml"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return this.editor.embedExtFonts(d)};EditorUi.prototype.exportToCanvas=function(d,g,n,q,t,v,B,F,I,G,S,U,N,P,R,M){EditorUi.logEvent("SHOULD NOT BE CALLED: exportToCanvas");return this.editor.exportToCanvas(d,g,n,q,t,v,B,F,I,G,S,U,N,P,R,M)};EditorUi.prototype.createImageUrlConverter=function(){EditorUi.logEvent("SHOULD NOT BE CALLED: createImageUrlConverter");return this.editor.createImageUrlConverter()};EditorUi.prototype.convertImages=function(d,g,n,q){EditorUi.logEvent("SHOULD NOT BE CALLED: convertImages");
return this.editor.convertImages(d,g,n,q)};EditorUi.prototype.convertImageToDataUri=function(d,g){EditorUi.logEvent("SHOULD NOT BE CALLED: convertImageToDataUri");return this.editor.convertImageToDataUri(d,g)};EditorUi.prototype.base64Encode=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: base64Encode");return Editor.base64Encode(d)};EditorUi.prototype.updateCRC=function(d,g,n,q){EditorUi.logEvent("SHOULD NOT BE CALLED: updateCRC");return Editor.updateCRC(d,g,n,q)};EditorUi.prototype.crc32=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: crc32"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
L){var m,z=-1;return function(){clearTimeout(m);var J=this,O=arguments,T=function(){m=null;z=Date.now();C.apply(J,O)};Date.now()-z>L?T():m=setTimeout(T,L)}}(function(C,L){k(L)},300),mouseUp:function(C,L){k(L)}};A.addMouseListener(this.mouseListeners);this.shareCursorPositionListener=function(){b.isShareCursorPosition()||c("cursor",{hide:!0})};b.addListener("shareCursorPositionChanged",this.shareCursorPositionListener);this.selectionChangeListener=function(C,L){C=function(J){return null!=J?J.id:null}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
retry:Z})},Q)});Z()}catch(Y){null!=J&&J(Y)}};Editor.prototype.getErrorMessage=function(m){var z=mxResources.get("error")+" "+m.getStatus();try{var J=m.getText(),O=JSON.parse(J);null!=O&&null!=O.error&&null!=O.error.message&&(z=O.error.message+" ("+z+")")}catch(T){}return z};Editor.prototype.absoluteCssFonts=function(m){var z=null;if(null!=m){var J=m.split("url(");if(0<J.length){z=[J[0]];m=window.location.pathname;var O=null!=m?m.lastIndexOf("/"):-1;0<=O&&(m=m.substring(0,O+1));O=document.getElementsByTagName("base");
var T=null;null!=O&&0<O.length&&(T=O[0].getAttribute("href"));for(var W=1;W<J.length;W++)if(O=J[W].indexOf(")"),0<O){var V=Editor.trimCssUrl(J[W].substring(0,O));this.graph.isRelativeUrl(V)&&(V=null!=T?T+V:window.location.protocol+"//"+window.location.hostname+("/"==V.charAt(0)?"":m)+V);z.push('url("'+V+'"'+J[W].substring(O))}else z.push(J[W])}else z=[m]}return null!=z?z.join(""):null};Editor.prototype.mapFontUrl=function(m,z,J){/^https?:\/\//.test(z)&&!this.isCorsEnabledForUrl(z)&&(z=PROXY_URL+"?url="+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
retry:Z})},Q)});Z()}catch(Y){null!=J&&J(Y)}};Editor.prototype.getErrorMessage=function(m){var z=mxResources.get("error")+" "+m.getStatus();try{var J=m.getText(),O=JSON.parse(J);null!=O&&null!=O.error&&null!=O.error.message&&(z=O.error.message+" ("+z+")")}catch(T){}return z};Editor.prototype.absoluteCssFonts=function(m){var z=null;if(null!=m){var J=m.split("url(");if(0<J.length){z=[J[0]];m=window.location.pathname;var O=null!=m?m.lastIndexOf("/"):-1;0<=O&&(m=m.substring(0,O+1));O=document.getElementsByTagName("base"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(d){var g=A.apply(this,arguments);this.addListener("darkModeChanged",mxUtils.bind(this,function(){g.refresh();this.restoreOpenLibraries()}));this.addListener("sketchModeChanged",mxUtils.bind(this,function(){g.refresh();this.restoreOpenLibraries()}));return g};EditorUi.prototype.restoreOpenLibraries=function(){var d=this.openLibraries;this.openLibraries=null;if(null!=d)for(var g=0;g<d.length;g++)this.libraryLoaded(d[g].file,d[g].images,d[g].title,null!=d[g].div?"none"!=d[g].div.style.display:
d[g].expand)};var K=EditorUi.prototype.updateActionStates;EditorUi.prototype.updateActionStates=function(){K.apply(this,arguments);var d=this.editor.graph,g=this.getCurrentFile(),n=this.getSelectionState(),q=this.isDiagramActive(),t="1"==urlParams.embed&&this.editor.graph.isEnabled()||null!=g&&g.isEditable();this.actions.get("undo").setEnabled(this.canUndo()&&t);this.actions.get("redo").setEnabled(this.canRedo()&&t);this.actions.get("autosave").setEnabled(null!=g&&g.isEditable()&&g.isAutosaveOptional()); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
arguments);D.style.backgroundColor=""};A.dblClick=function(){};var O=A.getSelectionModel().changeSelection;A.getSelectionModel().changeSelection=function(){O.call(this,[d],[d])}};E.onerror=function(){E.onload=null;E.src=Editor.errorImage};E.setAttribute("src",e);E.style.maxWidth="300px";E.style.maxHeight="300px";x.appendChild(E);u.appendChild(x);var D=document.createElement("div");D.style.width="300px";D.style.height="300px";D.style.overflow="hidden";D.style.backgroundColor="#fff9";u.appendChild(D); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"GET")).send(mxUtils.bind(this,function(k){200<=k.getStatus()&&299>=k.getStatus()?this.authenticateStep2(k.getText(),e,f,c):null!=f&&f(k)}),f)};OneDriveClient.prototype.updateAuthInfo=function(e,f,c,k,l){c&&this.setUser(null);b=e.access_token;delete e.access_token;e.expiresOn=Date.now()+1E3*e.expires_in;this.tokenExpiresOn=e.expiresOn;e.remember=f;this.setPersistentToken(JSON.stringify(e),!f);this.resetTokenRefresh(e.expires_in);c?this.getAccountTypeAndEndpoint(mxUtils.bind(this,function(){k()}),
l):k()};OneDriveClient.prototype.authenticateStep2=function(e,f,c,k){if(null==window.onOneDriveCallback){var l=mxUtils.bind(this,function(){var u=!0,x=JSON.parse(this.getPersistentToken(!0));null!=x?(new mxXmlRequest(this.redirectUri+"?state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host+"&token="+e),null,"GET")).send(mxUtils.bind(this,function(E){200<=E.getStatus()&&299>=E.getStatus()?this.updateAuthInfo(JSON.parse(E.getText()),x.remember,!1,f,c):(this.clearPersistentToken(), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
f?A=new mxHierarchicalLayout(l,mxConstants.DIRECTION_WEST):"circle"==f?A=new mxCircleLayout(l):(A=new mxFastOrganicLayout(l,!1),A.forceConstant=80);if(null!=A){var K=function(n,q){l.getModel().beginUpdate();try{null!=n&&n(),A.execute(l.getDefaultParent(),D)}catch(t){throw t;}finally{n=new mxMorphing(l),n.addListener(mxEvent.DONE,mxUtils.bind(this,function(){l.getModel().endUpdate();null!=q&&q()})),n.startAnimation()}},H=mxEdgeHandler.prototype.connect;mxEdgeHandler.prototype.connect=function(n,q, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
x=document.createElement("div");x.style.height="300px";x.style.width="300px";x.style.display="inline-flex";x.style.justifyContent="center";x.style.alignItems="center";x.style.position="absolute";var E=document.createElement("img");E.onload=function(){function G(){A.model.setStyle(d,g+k())}A=new Graph(D);A.autoExtend=!1;A.autoScroll=!1;A.setGridEnabled(!1);A.setEnabled(!0);A.setPanning(!1);A.setConnectable(!1);A.getRubberband().setEnabled(!1);A.graphHandler.allowLivePreview=!1;var S=A.createVertexHandler;
A.createVertexHandler=function(){var T=S.apply(this,arguments);T.livePreview=!1;return T};if(null!=f)try{if("inset"==f.substring(0,5)){var U=d.geometry,N=E.width,P=E.height,R=(300-N)/2,M=(300-P)/2,p=f.match(/\(([^)]+)\)/)[1].split(/[ ,]+/),y=parseFloat(p[0]),C=parseFloat(p[1]),L=parseFloat(p[2]),m=parseFloat(p[3]);isFinite(y)&&isFinite(C)&&isFinite(L)&&isFinite(m)?(U.x=m/100*N+R,U.y=y/100*P+M,U.width=(100-C)/100*N+R-U.x,U.height=(100-L)/100*P+M-U.y,"round"==p[4]?"50%"==p[5]?t.setAttribute("checked",
"checked"):(H=parseInt(p[5]),B.value=H,q.setAttribute("checked","checked"),v.style.visibility="visible"):n.setAttribute("checked","checked")):f=null}else f=null}catch(T){}d.style=g+(f?f:k());d.vertex=!0;A.addCell(d,null,null,null,null);A.selectAll();A.addListener(mxEvent.CELLS_MOVED,G);A.addListener(mxEvent.CELLS_RESIZED,G);var z=A.graphHandler.mouseUp,J=A.graphHandler.mouseDown;A.graphHandler.mouseUp=function(){z.apply(this,arguments);D.style.backgroundColor="#fff9"};A.graphHandler.mouseDown=function(){J.apply(this,
arguments);D.style.backgroundColor=""};A.dblClick=function(){};var O=A.getSelectionModel().changeSelection;A.getSelectionModel().changeSelection=function(){O.call(this,[d],[d])}};E.onerror=function(){E.onload=null;E.src=Editor.errorImage};E.setAttribute("src",e);E.style.maxWidth="300px";E.style.maxHeight="300px";x.appendChild(E);u.appendChild(x);var D=document.createElement("div");D.style.width="300px";D.style.height="300px";D.style.overflow="hidden";D.style.backgroundColor="#fff9";u.appendChild(D); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
wa.innerText=ja;ia.appendChild(wa);qa.appendChild(ia);mxEvent.addListener(ia,"click",function(){function Ka(){var Aa=Ja.querySelector(".geTemplateDrawioCatLink");null!=Aa?Aa.click():setTimeout(Ka,200)}ca=!0;var Ja=C.querySelector(".geTemplatesList");Ja.style.display="block";Ba.style.width="";Ca.style.display="";Ca.value="";Y=null;Ka()});da.style.display=ka.length<=ma?"none":""}function U(ka,fa,ma){function na(Oa,Xa){Oa=mxResources.get(Oa,null,Oa.substring(0,1).toUpperCase()+Oa.substring(1));var Sa= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.settingsKey=".sketch-config")};EditorUi.initTheme();EditorUi.prototype.showImageDialog=function(d,g,n,q,t,v,B){d=new ImageDialog(this,d,g,n,q,t,v,B);this.showDialog(d.container,Graph.fileSupport?480:360,Graph.fileSupport?200:90,!0,!0);d.init()};EditorUi.prototype.showLocalStorageDialog=function(d,g,n,q,t,v){var B=localStorage.getItem(g);d=new TextareaDialog(this,d,null!=B?JSON.stringify(JSON.parse(B),null,2):"",mxUtils.bind(this,function(F){if(null!=F)try{if(null!=v&&v(F),F==B)this.hideDialog();
else{if(0<F.length){var I=JSON.parse(F);localStorage.setItem(g,JSON.stringify(I))}else localStorage.removeItem(g);this.hideDialog();this.alert(mxResources.get("restartForChangeRequired"))}}catch(G){this.handleError(G)}}),null,mxResources.get("close"),null,null,null,!0,null,null,t,n,q);this.showDialog(d.container,620,460,!0,!1);d.init()};EditorUi.prototype.showBackgroundImageDialog=function(d,g,n,q){d=null!=d?d:mxUtils.bind(this,function(t,v,B,F){v||(t=new ChangePageSetup(this,q?B:null,t),t.ignoreColor= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
B);window.setTimeout(mxUtils.bind(this,function(){M()}),S)});mxEvent.addListener(U,"click",mxUtils.bind(this,function(y){var C=mxEvent.getSource(y);C!=P&&C!=R?(null!=n&&n(),M(),mxEvent.consume(y)):p()}));window.setTimeout(mxUtils.bind(this,function(){mxUtils.setPrefixedStyle(U.style,"transform",F)}),S/2);window.setTimeout(p,t?4E3:3E4);G=!0}return G};EditorUi.prototype.setCurrentFile=function(d){null!=d&&(d.opened=new Date);this.currentFile=d};EditorUi.prototype.getCurrentFile=function(){return this.currentFile}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"":"none";this.editor.graph.setEnabled(d);null!=this.tabContainer&&(this.tabContainer.style.visibility=d?"":"hidden");null!=this.ruler&&(this.ruler.hRuler.container.style.visibility=d?"":"hidden",this.ruler.vRuler.container.style.visibility=d?"":"hidden");d||this.hideWindows()};EditorUi.prototype.initializeEmbedMode=function(){this.setGraphEnabled(!1);if((window.opener||window.parent)!=window&&("1"!=urlParams.spin||this.spinner.spin(document.body,mxResources.get("loading")))){var d=!1;this.installMessageHandler(mxUtils.bind(this,
function(g,n,q,t){d||(d=!0,this.spinner.stop(),this.addEmbedButtons(),this.setGraphEnabled(!0));if(null==g||0==g.length)g=this.emptyDiagramXml;this.setCurrentFile(new EmbedFile(this,g,{}));this.mode=App.MODE_EMBED;this.setFileData(g);if(t)try{var v=this.editor.graph;v.setGridEnabled(!1);v.pageVisible=!1;var B=v.model.cells,F;for(F in B){var I=B[F];null!=I&&null!=I.style&&(I.style+=";sketch=1;"+(-1==I.style.indexOf("fontFamily=")||-1<I.style.indexOf("fontFamily=Helvetica;")?"fontFamily=Architects Daughter;fontSource=https%3A%2F%2Ffonts.googleapis.com%2Fcss%3Ffamily%3DArchitects%2BDaughter;":
""))}}catch(G){console.log(G)}this.editor.isChromelessView()?this.editor.graph.isLightboxView()&&this.lightboxFit():this.showLayersDialog();this.chromelessResize&&this.chromelessResize();this.editor.undoManager.clear();this.editor.modified=null!=q?q:!1;this.updateUi();window.self!==window.top&&window.focus();null!=this.format&&this.format.refresh()}))}};EditorUi.prototype.showLayersDialog=function(){1<this.editor.graph.getModel().getChildCount(this.editor.graph.getModel().getRoot())&&(null==this.actions.layersWindow? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c="data:image/jpeg;base64,"+c:/\.gif$/i.test(f)?c="data:image/gif;base64,"+c:/\.pdf$/i.test(f)?c="data:application/pdf;base64,"+c:/\.png$/i.test(f)?(e=this.ui.extractGraphModelFromPng(c),c=null!=e&&0<e.length?e:"data:image/png;base64,"+c):c=Base64.decode(c));return c};GitLabClient.prototype.createGitLabFile=function(e,f,c,k,l,u){var x=DRAWIO_GITLAB_URL+"/";e={org:e,repo:f,ref:c,name:k.file_name,path:k.file_path,html_url:x+e+"/"+f+"/blob/"+c+"/"+k.file_path,download_url:x+e+"/"+f+"/raw/"+c+"/"+k.file_path+
"?inline=false",last_commit_id:k.last_commit_id,refPos:u};k=this.getFileContent(k);return l?new GitLabLibrary(this.ui,k,e):new GitLabFile(this.ui,k,e)};GitLabClient.prototype.insertFile=function(e,f,c,k,l,u,x){l=null!=l?l:!1;u=u.split("/");this.getRefIndex(u,!0,mxUtils.bind(this,function(E,D){var A=Math.max(D-1,0),K=E.slice(0,A).join("/"),H=E[A],d=E[D];path=E.slice(D+1,E.length).join("/");0<path.length&&(path+="/");path+=e;this.checkExists(K+"/"+H+"/"+d+"/"+path,!0,mxUtils.bind(this,function(g,n){g? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.bind(this,function(){this.save(b,e)})),f.handleFileError(x,null==x||"AbortError"!=x.name))});try{b==f.getTitle()?f.save(!0,l,u):f.saveAs(b,l,u)}catch(x){u(x)}}),c)}};App.prototype.getExtensionForService=function(b){b=this.getServiceForName(b);return null!=b?b.extension:".drawio"};App.prototype.getServiceForName=function(b){return b==App.MODE_GOOGLE?this.drive:b==App.MODE_ONEDRIVE?this.oneDrive:b==App.MODE_GITHUB?this.gitHub:b==App.MODE_GITLAB?this.gitLab:b==App.MODE_TRELLO?this.trello:null}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"")+"/log?severity="+v+"&v="+encodeURIComponent(EditorUi.VERSION)+"&msg=clientError:"+encodeURIComponent(d)+":url:"+encodeURIComponent(window.location.href)+":lnum:"+encodeURIComponent(n)+(null!=q?":colno:"+encodeURIComponent(q):"")+(""!=t.stack?"&stack="+encodeURIComponent(t.stack):""))}catch(F){}try{B||null==window.console||console.error(v,d,g,n,q,t)}catch(F){}}};EditorUi.logEvent=function(d){if("1"==urlParams.dev)EditorUi.debug("logEvent",d);else if(EditorUi.enableLogging)try{var g=null!=window.DRAWIO_LOG_URL?
window.DRAWIO_LOG_URL:"";(new Image).src=g+"/images/1x1.png?v="+encodeURIComponent(EditorUi.VERSION)+(null!=d?"&data="+encodeURIComponent(JSON.stringify(d)):"")}catch(n){}};EditorUi.sendReport=function(d,g){if("1"==urlParams.dev)EditorUi.debug("sendReport",d);else if(EditorUi.enableLogging)try{g=null!=g?g:5E4,d.length>g&&(d=d.substring(0,g)+"\n...[SHORTENED]"),mxUtils.post("/email","version="+encodeURIComponent(EditorUi.VERSION)+"&url="+encodeURIComponent(window.location.href)+"&data="+encodeURIComponent(d))}catch(n){}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
parseFloat(W.rackUnitSize):"undefined"!==typeof mxRackContainer?mxRackContainer.unitSize:20;V.marginLeft=W.marginLeft||0;V.marginRight=W.marginRight||0;V.marginTop=W.marginTop||0;V.marginBottom=W.marginBottom||0;V.allowGaps=W.allowGaps||0;V.horizontal="1"==mxUtils.getValue(W,"horizontalRack","0");V.resizeParent=!1;V.fill=!0;return V}return O.apply(this,arguments)};this.updateGlobalUrlVariables()};var n=Graph.prototype.postProcessCellStyle;Graph.prototype.postProcessCellStyle=function(m,z){return Graph.processFontStyle(n.apply(this,
arguments))};var q=mxSvgCanvas2D.prototype.updateTextNodes;mxSvgCanvas2D.prototype.updateTextNodes=function(m,z,J,O,T,W,V,Q,X,Z,Y){q.apply(this,arguments);Graph.processFontAttributes(Y)};var t=mxText.prototype.redraw;mxText.prototype.redraw=function(){t.apply(this,arguments);null!=this.node&&"DIV"==this.node.nodeName&&Graph.processFontAttributes(this.node)};Graph.prototype.createTagsDialog=function(m,z,J,O){function T(){for(var sa=Q.getSelectionCells(),za=[],Ba=0;Ba<sa.length;Ba++)Q.isCellVisible(sa[Ba])&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
d?d:"",extras:JSON.stringify(t),scale:B,border:F,w:U&&isFinite(U)?U:null,h:N&&isFinite(N)?N:null}};EditorUi.prototype.setMode=function(d,g){this.mode=d};EditorUi.prototype.getDiagramId=function(){var d=window.location.hash;null!=d&&0<d.length&&(d=d.substring(1));if(null!=d&&1<d.length){var g=d.indexOf("#");0<=g&&(d=d.substring(0,g))}return d};EditorUi.prototype.getHashObject=function(){var d=window.location.hash,g={};if(null!=d&&0<d.length){var n=d.lastIndexOf("#");if(0<n){d=decodeURIComponent(d.substring(n+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(q<<5)-q+this.hashValue(d.childNodes[t],g,n)<<0}else if(null!=d&&"function"!==typeof d){d=String(d);g=0;null!=n&&(n.byteCount+=d.length);for(t=0;t<d.length;t++)g=(g<<5)-g+d.charCodeAt(t)<<0;q^=g}return q};EditorUi.prototype.descriptorChanged=function(){};EditorUi.prototype.restoreLibraries=function(){};EditorUi.prototype.saveLibrary=function(d,g,n,q,t,v,B){};EditorUi.prototype.isScratchpadEnabled=function(){return isLocalStorage||mxClient.IS_CHROMEAPP};EditorUi.prototype.toggleScratchpad=function(){this.isScratchpadEnabled()&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"xlink:href");J("img","src");0==T&&z(m)};Editor.base64Encode=function(m){for(var z="",J=0,O=m.length,T,W,V;J<O;){T=m.charCodeAt(J++)&255;if(J==O){z+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt(T>>2);z+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((T&3)<<4);z+="==";break}W=m.charCodeAt(J++);if(J==O){z+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt(T>>2);z+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((T&
3)<<4|(W&240)>>4);z+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((W&15)<<2);z+="=";break}V=m.charCodeAt(J++);z+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt(T>>2);z+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((T&3)<<4|(W&240)>>4);z+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((W&15)<<2|(V&192)>>6);z+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt(V&63)}return z}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
f,c,!1,!0)};OneDriveClient.prototype.removeExtraHtmlContent=function(e){var f=e.lastIndexOf('<html><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=utf-8"><meta name="Robots" ');0<f&&(e=e.substring(0,f));return e};OneDriveClient.prototype.getFile=function(e,f,c,k,l){l=null!=l?l:!1;this.executeRequest(this.getItemURL(e),mxUtils.bind(this,function(u){if(200<=u.getStatus()&&299>=u.getStatus()){var x=JSON.parse(u.getText()),E=/\.png$/i.test(x.name);if(/\.v(dx|sdx?)$/i.test(x.name)||/\.gliffy$/i.test(x.name)|| | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(D){return this.isTreeEdge(D)}))};Graph.prototype.getIncomingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function c(M){return n.isVertex(M)&&l(M)}function k(M){var p=!1;null!=M&&(p="1"== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
N+"&border="+v+"&xml="+encodeURIComponent(G))})}else"png"==n?d.exportImage(t,null==q||"none"==q,!0,!1,!1,v,!0,!1,null,F,B):d.exportImage(t,!1,!0,!1,!1,v,!0,!1,"jpeg",F);else mxUtils.alert(mxResources.get("drawingTooLarge"))}});EditorUi.prototype.getDiagramTextContent=function(){this.editor.graph.setEnabled(!1);var d=this.editor.graph,g="";if(null!=this.pages)for(var n=0;n<this.pages.length;n++){var q=d;this.currentPage!=this.pages[n]&&(q=this.createTemporaryGraph(d.getStylesheet()),this.updatePageRoot(this.pages[n]),
q.model.setRoot(this.pages[n].root));g+=this.pages[n].getName()+" "+q.getIndexableText()+" "}else g=d.getIndexableText();this.editor.graph.setEnabled(!0);return g};EditorUi.prototype.showRemotelyStoredLibrary=function(d){var g={},n=document.createElement("div");n.style.whiteSpace="nowrap";var q=document.createElement("h3");mxUtils.write(q,mxUtils.htmlEntities(d));q.style.cssText="width:100%;text-align:center;margin-top:0px;margin-bottom:12px";n.appendChild(q);var t=document.createElement("div");t.style.cssText= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Math.floor((new Date-d)/1E3);var g=Math.floor(d/31536E3);if(1<g)return g+" "+mxResources.get("years");g=Math.floor(d/2592E3);if(1<g)return g+" "+mxResources.get("months");g=Math.floor(d/86400);if(1<g)return g+" "+mxResources.get("days");g=Math.floor(d/3600);if(1<g)return g+" "+mxResources.get("hours");g=Math.floor(d/60);return 1<g?g+" "+mxResources.get("minutes"):1==g?g+" "+mxResources.get("minute"):null};EditorUi.prototype.decodeNodeIntoGraph=function(d,g){if(null!=d){var n=null;if("diagram"==d.nodeName)n=
d;else if("mxfile"==d.nodeName){var q=d.getElementsByTagName("diagram");if(0<q.length){n=q[0];var t=g.getGlobalVariable;g.getGlobalVariable=function(v){return"page"==v?n.getAttribute("name")||mxResources.get("pageWithNumber",[1]):"pagenumber"==v?1:t.apply(this,arguments)}}}null!=n&&(d=Editor.parseDiagramNode(n))}q=this.editor.graph;try{this.editor.graph=g,this.editor.setGraphXml(d)}catch(v){}finally{this.editor.graph=q}return d};EditorUi.prototype.getSvgFileProperties=function(d){return this.getPngFileProperties(d)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
360,null!=d.pages&&1<d.pages.length?470:390,!0,!0)};this.defaultFilename=mxResources.get("untitledDiagram");var S=g.getExportVariables;g.getExportVariables=function(){var C=S.apply(this,arguments),L=d.getCurrentFile();null!=L&&(C.filename=L.getTitle());C.pagecount=null!=d.pages?d.pages.length:1;C.page=null!=d.currentPage?d.currentPage.getName():"";C.pagenumber=null!=d.pages&&null!=d.currentPage?mxUtils.indexOf(d.pages,d.currentPage)+1:1;return C};var U=g.getGlobalVariable;g.getGlobalVariable=function(C){var L= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
libs:ka.getAttribute("libs"),clibs:ka.getAttribute("clibs"),title:ka.getAttribute("title")}),ka=ka.nextSibling;S(Ha)}});var Va=function(ka,fa,ma){za.style.display="";Fa.stop();L=!1;if(m)m=!1;else if(fa)ba.innerText=fa;else{ma=ma||{};fa=0;for(var na in ma)fa+=ma[na].length;0==ka.length&&0==fa?ba.innerText=mxResources.get("noDiagrams"):G(ka,!1,Q,0==fa?null:ma)}};P(V);var Ua=null;mxEvent.addListener(Ca,"keyup",p);mxEvent.addListener(Ca,"search",p);mxEvent.addListener(Ca,"input",p);mxEvent.addListener(la,
"click",function(ka){F(!1,!1)});K&&mxEvent.addListener(ya,"click",function(ka){F(!1,!0)});H&&mxEvent.addListener(C.querySelector(".geTempDlgLinkToDiagramBtn"),"click",function(ka){F(!0)});mxEvent.addListener(C.querySelector(".geTempDlgCancelBtn"),"click",function(){null!=f&&f();g||b.hideDialog(!0)})};TemplatesDialog.tagsList={}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.handleError({message:mxResources.get("error")+" "+P.getStatus()}))}),mxUtils.bind(this,function(P){this.handleError(P)}))}),U=mxUtils.bind(this,function(){window.clearTimeout(G);G=window.setTimeout(S,I)});this.editor.addListener("pageSelected",mxUtils.bind(this,function(){U();S()}));U();S()}null!=g&&g()});if(null!=d.url&&0<d.url.length){var v=this.editor.getProxiedUrl(d.url);this.editor.loadUrl(v,mxUtils.bind(this,function(B){t(B)}),mxUtils.bind(this,function(B){null!=n&&n(B)}))}else t("")}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
d.error.data[0].reason)||404==I.code||404==I.status)){U="#U"==U.substring(0,2)?U.substring(45,U.lastIndexOf("%26ex")):U.substring(2);this.showError(g,B,mxResources.get("openInNewWindow"),mxUtils.bind(this,function(){this.editor.graph.openLink("https://drive.google.com/open?id="+U);this.handleError(d,g,n,q,t)}),S,mxResources.get("changeUser"),mxUtils.bind(this,function(){function P(){y.innerText="";for(var C=0;C<R.length;C++){var L=document.createElement("option");mxUtils.write(L,R[C].displayName);
L.value=C;y.appendChild(L);L=document.createElement("option");L.innerHTML=" ";mxUtils.write(L,"<"+R[C].email+">");L.setAttribute("disabled","disabled");y.appendChild(L)}L=document.createElement("option");mxUtils.write(L,mxResources.get("addAccount"));L.value=R.length;y.appendChild(L)}var R=this.drive.getUsersList(),M=document.createElement("div"),p=document.createElement("span");p.style.marginTop="6px";mxUtils.write(p,mxResources.get("changeUser")+": ");M.appendChild(p);var y=document.createElement("select"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
t,v,B){H.apply(this,arguments);K()};l.resizeCell=function(){mxGraph.prototype.resizeCell.apply(this,arguments);K()};l.connectionHandler.addListener(mxEvent.CONNECT,function(){K()})}var d=mxUtils.button(mxResources.get("close"),function(){b.confirm(mxResources.get("areYouSure"),function(){null!=k.parentNode&&(l.destroy(),k.parentNode.removeChild(k));b.hideDialog()})});d.className="geBtn";b.editor.cancelFirst&&c.appendChild(d);var g=mxUtils.button(mxResources.get("insert"),function(n){l.clearCellOverlays(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
k,u=0;8>u;u++)l=1==(l&1)?3988292384^l>>>1:l>>>1,Editor.crcTable[k]=l;Editor.updateCRC=function(m,z,J,O){for(var T=0;T<O;T++)m=Editor.crcTable[(m^z.charCodeAt(J+T))&255]^m>>>8;return m};Editor.crc32=function(m){for(var z=-1,J=0;J<m.length;J++)z=z>>>8^Editor.crcTable[(z^m.charCodeAt(J))&255];return(z^-1)>>>0};Editor.writeGraphModelToPng=function(m,z,J,O,T){function W(Y,aa){var ca=X;X+=aa;return Y.substring(ca,X)}function V(Y){Y=W(Y,4);return Y.charCodeAt(3)+(Y.charCodeAt(2)<<8)+(Y.charCodeAt(1)<<16)+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
H.formatElt.style.width)}function e(H,d){function g(t,v){var B=H.menus.get(t);t=n.addMenu(v,mxUtils.bind(this,function(){B.funct.apply(this,arguments)}));t.style.cssText="position:absolute;border-width:1px;cusor:pointer;border-style:none;height:24px;bottom:0px;text-align:center;padding:8px 6px 0 6px;border-top-style:solid;width:50%;height:32px;box-sizing:border-box;font-size:11px;";t.className="geTitle";d.appendChild(t);return t}var n=new Menubar(H,d);if(Editor.enableCustomLibraries&&("1"!=urlParams.embed||
"1"==urlParams.libraries))if(null!=H.actions.get("newLibrary")){var q=document.createElement("div");q.style.cssText="position:absolute;border-width:1px;cusor:pointer;border-style:none;height:24px;bottom:0px;text-align:center;padding:8px 6px 0 6px;border-top-style:solid;width:50%;height:32px;box-sizing:border-box;font-size:11px;";q.className="geTitle";mxUtils.write(q,mxResources.get("newLibrary"));d.appendChild(q);mxEvent.addListener(q,"click",this.actions.get("newLibrary").funct);q=q.cloneNode(!1);
q.style.left="50%";q.style.borderLeftStyle="solid";mxUtils.write(q,mxResources.get("openLibrary"));d.appendChild(q);mxEvent.addListener(q,"click",this.actions.get("openLibrary").funct)}else q=g("newLibrary",mxResources.get("newLibrary")),q.style.fontSize="11px",q.style.left="0",q=g("openLibraryFrom",mxResources.get("openLibraryFrom")),q.style.borderLeftStyle="solid",q.style.fontSize="11px",q.style.left="50%";d.appendChild(H.sidebar.container);d.style.overflow="hidden"}function f(H,d){if(EditorUi.windowed){var g= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null!=d.getMode())try{this.addRecent({id:d.getHash(),title:d.getTitle(),mode:d.getMode()})}catch(F){}try{mxSettings.setOpenCounter(mxSettings.getOpenCounter()+1),mxSettings.save()}catch(F){}}catch(F){this.fileLoadedError=F;if(null!=d)try{d.close()}catch(I){}if(EditorUi.enableLogging&&!this.isOffline())try{EditorUi.logEvent({category:"ERROR-LOAD-FILE-"+(null!=d?d.getHash():"none"),action:"message_"+F.message,label:"stack_"+F.stack})}catch(I){}d=mxUtils.bind(this,function(){null!=urlParams.url&&this.spinner.spin(document.body,
mxResources.get("reconnecting"))?window.location.search=this.getSearch(["url"]):null!=q?this.fileLoaded(q)||v():v()});g?d():this.handleError(F,mxResources.get("errorLoadingFile"),d,!0,null,null,!0)}else v();return t};EditorUi.prototype.getHashValueForPages=function(d,g){var n=0,q=new mxGraphModel,t=new mxCodec;null!=g&&(g.byteCount=0,g.attrCount=0,g.eltCount=0,g.nodeCount=0);for(var v=0;v<d.length;v++){this.updatePageRoot(d[v]);var B=d[v].node.cloneNode(!1);B.removeAttribute("name");q.root=d[v].root; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!1)))}var N=v=null;null!=I&&null!=I.helpLink?(v=mxResources.get("help"),N=mxUtils.bind(this,function(){return this.editor.graph.openLink(I.helpLink)})):null!=I&&null!=I.ownerEmail&&(v=mxResources.get("contactOwner"),B+=mxUtils.htmlEntities(" ("+v+": "+I.ownerEmail+")",!1),N=mxUtils.bind(this,function(){return this.openLink("mailto:"+mxUtils.htmlEntities(I.ownerEmail))}));this.showError(g,B,G,n,S,null,null,v,N,null,null,null,q?n:null)}else null!=n&&n()};EditorUi.prototype.alert=function(d,g,n){d=new ErrorDialog(this,
null,d,mxResources.get("ok"),g);this.showDialog(d.container,n||340,100,!0,!1);d.init()};EditorUi.prototype.confirm=function(d,g,n,q,t,v){d=null!=d?d:"";var B=null!=this.spinner&&null!=this.spinner.pause?this.spinner.pause():function(){},F=Math.min(220,28*Math.ceil(Math.max(1,d.length)/50));d=new ConfirmDialog(this,d,function(){B();null!=g&&g()},function(){B();null!=n&&n()},q,t,null,null,null,null,F);this.showDialog(d.container,340,46+F,!0,v);d.init()};EditorUi.prototype.showBanner=function(d,g,n, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
JSON.parse(z.substring(17));null!=J.actions&&(this.updateCustomLinkActions(m,J.actions),z="data:action/json,"+JSON.stringify(J))}catch(O){}return z};Graph.prototype.updateCustomLinkActions=function(m,z){for(var J=0;J<z.length;J++){var O=z[J],T;for(T in O)this.updateCustomLinkAction(m,O[T],"cells"),this.updateCustomLinkAction(m,O[T],"excludeCells")}};Graph.prototype.updateCustomLinkAction=function(m,z,J){if(null!=z&&null!=z[J]){for(var O=[],T=0;T<z[J].length;T++)if("*"==z[J][T])O.push(z[J][T]);else{var W= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Math.min(Q,Math.max(parseInt(ca.value),parseInt(aa.value))));aa.value=Math.max(1,Math.min(Q,Math.min(parseInt(ca.value),parseInt(aa.value))))}function O(Qa){function Ha(Aa,La,Da,va){var Ma=Aa.useCssTransforms,Oa=Aa.currentTranslate,Xa=Aa.currentScale,Sa=Aa.view.translate,Ta=Aa.view.scale;Aa.useCssTransforms&&(Aa.useCssTransforms=!1,Aa.currentTranslate=new mxPoint(0,0),Aa.currentScale=1,Aa.view.translate=new mxPoint(0,0),Aa.view.scale=1);var Pa=Aa.getGraphBounds(),Na=0,Ya=0,Wa=Ga.get(),ab=1/Aa.pageScale,
$a=Ba.checked;if($a){ab=parseInt(ra.value);var gb=parseInt(ua.value);ab=Math.min(Wa.height*gb/(Pa.height/Aa.view.scale),Wa.width*ab/(Pa.width/Aa.view.scale))}else ab=parseInt(za.value)/(100*Aa.pageScale),isNaN(ab)&&(Ra=1/Aa.pageScale,za.value="100 %");Wa=mxRectangle.fromRectangle(Wa);Wa.width=Math.ceil(Wa.width*Ra);Wa.height=Math.ceil(Wa.height*Ra);ab*=Ra;!$a&&Aa.pageVisible?(Pa=Aa.getPageLayout(),Na-=Pa.x*Wa.width,Ya-=Pa.y*Wa.height):$a=!0;va=null!=va?"page/id,"+va:null;if(null==La){La=PrintDialog.createPrintPreview(Aa, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
v.defaultLibraryName=mxResources.get("untitledLibrary");var F=document.createElement("div");F.className="geMenubarContainer";var I=null,G=new Menubar(v,F);v.statusContainer=v.createStatusContainer();v.statusContainer.style.position="relative";v.statusContainer.style.maxWidth="";v.statusContainer.style.color="gray";v.statusContainer.style.cursor="default";var S=v.hideCurrentMenu;v.hideCurrentMenu=function(){S.apply(this,arguments);this.editor.graph.popupMenuHandler.hideMenu()};var U=v.descriptorChanged; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null!=C.lastCursor.pageId&&C.lastCursor.pageId!=m)C.cursor.style.display="none";else{m=function(){var V=Math.max(A.container.scrollLeft,Math.min(A.container.scrollLeft+A.container.clientWidth-C.cursor.clientWidth,O)),Q=Math.max(A.container.scrollTop-22,Math.min(A.container.scrollTop+A.container.clientHeight-C.cursor.clientHeight,T));W.style.opacity=V!=O||Q!=T?0:1;C.cursor.style.left=V+"px";C.cursor.style.top=Q+"px";C.cursor.style.display=""};var z=A.view.translate,J=A.view.scale,O=(z.x+C.lastCursor.x)* | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l&&(this.lastAutosaveRevision=(new Date).getTime());this.save(l,mxUtils.bind(this,function(u){this.autosaveCompleted();null!=f&&f(u)}),mxUtils.bind(this,function(u){null!=c&&c(u)}))}else this.isModified()||this.ui.editor.setStatus(""),null!=f&&f(null)}catch(u){null!=c&&c(u)}}),b);EditorUi.debug("DrawioFile.autosave",[this],"thread",k,"delay",b,"saving",this.savingFile);this.autosaveThread=k};DrawioFile.prototype.isAutosaveNow=function(){return!0};DrawioFile.prototype.autosaveCompleted=function(){}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g(B)}}),g)};EditorUi.prototype.getDatabaseItemKeys=function(d,g,n){this.openDatabase(mxUtils.bind(this,function(q){try{n=n||"objects";var t=q.transaction([n],"readonly").objectStore(n).getAllKeys();t.onsuccess=function(){d(t.result)};t.onerror=g}catch(v){null!=g&&g(v)}}),g)};EditorUi.prototype.commentsSupported=function(){var d=this.getCurrentFile();return null!=d?d.commentsSupported():!1};EditorUi.prototype.commentsRefreshNeeded=function(){var d=this.getCurrentFile();return null!=d?d.commentsRefreshNeeded(): | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
19)&&localStorage.removeItem("odpickerv7cache")}window.open(this.authUrl+"/oauth2/v2.0/logout","logout","width=525,height=525,status=no,resizable=yes,toolbar=no,menubar=no,scrollbars=yes");this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken();this.setUser(null);b=null}})();GitHubFile=function(b,e,f){DrawioFile.call(this,b,e);this.meta=f;this.peer=this.ui.gitHub};mxUtils.extend(GitHubFile,DrawioFile);GitHubFile.prototype.share=function(){this.ui.editor.graph.openLink("https://github.com/"+encodeURIComponent(this.meta.org)+"/"+encodeURIComponent(this.meta.repo)+"/settings/access")}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.synchronizeFile=function(b,e){if(this.savingFile)null!=e&&e({message:mxResources.get("busy")});else{var f=!0,c=window.setTimeout(mxUtils.bind(this,function(){f=!1;null!=e&&e({code:App.ERROR_TIMEOUT,message:mxResources.get("timeout"),retry:mxUtils.bind(this,function(){this.synchronizeFile(b,e)})})}),this.ui.timeout),k=mxUtils.bind(this,function(u){f&&(window.clearTimeout(c),null!=e&&e(u))}),l=mxUtils.bind(this,function(){return!f});null!=this.sync?this.sync.fileChanged(mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(d,g,n){var q=window.open("about:blank");null==q||null==q.document?mxUtils.popup(d,!0):("image/svg+xml"!=g||mxClient.IS_SVG?"image/svg+xml"!=g||n?(d=n?d:btoa(unescape(encodeURIComponent(d))),q.document.write('<html><img style="max-width:100%;" src="data:'+g+";base64,"+d+'"/></html>')):q.document.write("<html>"+d+"</html>"):q.document.write("<html><pre>"+mxUtils.htmlEntities(d,!1)+"</pre></html>"),q.document.close())};var c=EditorUi.prototype.addChromelessToolbarItems;EditorUi.prototype.isChromelessImageExportEnabled= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
StorageFile.listFiles=function(b,e,f,c){b.getDatabaseItems(function(k){var l=[];if(null!=k)for(var u=0;u<k.length;u++)"."==k[u].title.charAt(0)||null!=e&&k[u].type!=e||l.push(k[u]);f(l)},function(){null==b.database?f(StorageFile.listLocalStorageFiles(e)):null!=c&&c()},"filesInfo")};StorageFile.deleteFile=function(b,e,f,c){b.removeDatabaseItem([e,e],f,function(){null==b.database?(localStorage.removeItem(e),f()):null!=c&&c()},["files","filesInfo"])};StorageLibrary=function(b,e,f){StorageFile.call(this,b,e,f)};mxUtils.extend(StorageLibrary,StorageFile);StorageLibrary.prototype.type="L";StorageLibrary.prototype.isAutosave=function(){return!0};StorageLibrary.prototype.saveAs=function(b,e,f){this.saveFile(b,!1,e,f)};StorageLibrary.prototype.getHash=function(){return"L"+encodeURIComponent(this.title)};StorageLibrary.prototype.getTitle=function(){return".scratchpad"==this.title?mxResources.get("scratchpad"):this.title}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
J.apply(this,arguments)};var O=L.restore;L.restore=function(){z--;O.apply(this,arguments)};var T=p.drawShape;p.drawShape=function(W){mxLog.debug("entering shape",W,z);T.apply(this,arguments);mxLog.debug("leaving shape",W,z)};p.drawState(k.getView().getState(k.model.root),L);mxLog.show();mxLog.debug(mxUtils.getXml(m));mxLog.debug("stateCounter",z)}));c.actions.addAction("testShowConsole",function(){mxLog.isVisible()?mxLog.window.fit():mxLog.show();mxLog.window.div.style.zIndex=mxPopupMenu.prototype.zIndex- | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null,null,null,mxUtils.htmlEntities(mxResources.get("objectNotFound")))},X,Z)}function aa(){x(da,ba,function(sa){Y()},!0)}var ca=C().pdiv,da=b.newComment(W,b.getCurrentUser());da.pCommentId=N.id;null==N.replies&&(N.replies=[]);var ba=H(da,N.replies,ca,M+1);V?aa():Y()}if(p||!N.isResolved){B.style.display="none";var m=document.createElement("div");m.className="geCommentContainer";m.setAttribute("data-commentId",N.id);m.style.marginLeft=20*M+5+"px";N.isResolved&&!Editor.isDarkMode()&&(m.style.backgroundColor= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
d+(null!=n?"&mime="+n:"")+(null!=t?"&format="+t:"")+(null!=v?"&base64="+v:"")+(null!=g?"&filename="+encodeURIComponent(g):"")+(q?"&binary=1":""))};EditorUi.prototype.base64ToBlob=function(d,g){g=g||"";d=atob(d);for(var n=d.length,q=Math.ceil(n/1024),t=Array(q),v=0;v<q;++v){for(var B=1024*v,F=Math.min(B+1024,n),I=Array(F-B),G=0;B<F;++G,++B)I[G]=d[B].charCodeAt(0);t[v]=new Uint8Array(I)}return new Blob(t,{type:g})};EditorUi.prototype.saveLocalFile=function(d,g,n,q,t,v,B,F){v=null!=v?v:!1;B=null!=B?
B:"vsdx"!=t&&(!mxClient.IS_IOS||!navigator.standalone);t=this.getServiceCount(v);isLocalStorage&&t++;var I=4>=t?2:6<t?4:3;g=new CreateDialog(this,g,mxUtils.bind(this,function(G,S){try{if("_blank"==S)if(null!=n&&"image/"==n.substring(0,6))this.openInNewWindow(d,n,q);else if(null!=n&&"text/html"==n.substring(0,9)){var U=new EmbedDialog(this,d);this.showDialog(U.container,450,240,!0,!0);U.init()}else{var N=window.open("about:blank");null==N?mxUtils.popup(d,!0):(N.document.write("<pre>"+mxUtils.htmlEntities(d,
!1)+"</pre>"),N.document.close())}else S==App.MODE_DEVICE||"download"==S?this.doSaveLocalFile(d,G,n,q,null,F):null!=G&&0<G.length&&this.pickFolder(S,mxUtils.bind(this,function(P){try{this.exportFile(d,G,n,q,S,P)}catch(R){this.handleError(R)}}))}catch(P){this.handleError(P)}}),mxUtils.bind(this,function(){this.hideDialog()}),mxResources.get("saveAs"),mxResources.get("download"),!1,v,B,null,1<t,I,d,n,q);v=this.isServices(t)?t>I?390:280:160;this.showDialog(g.container,420,v,!0,!0);g.init()};EditorUi.prototype.openInNewWindow= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.write(y,mxResources.get("showStartScreen"));mxEvent.addListener(y,"click",function(L){mxEvent.getSource(L)!=p&&(p.checked=!p.checked)});header=y}y=[[mxResources.get("reset"),function(){c.confirm(mxResources.get("areYouSure"),function(){try{localStorage.removeItem(Editor.configurationKey),c.hideDialog(),c.alert(mxResources.get("restartForChangeRequired"))}catch(L){c.handleError(L)}})}]];if(!c.isOfflineApp()&&isLocalStorage&&c.mode!=App.MODE_ATLAS){var C=c.actions.get("plugins");null==C||"sketch"!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.model.getCell(m[J]);null!=T&&z.push(T)}return z};var R=Graph.prototype.isCellVisible;Graph.prototype.isCellVisible=function(m){return R.apply(this,arguments)&&!this.isAllTagsHidden(this.getTagsForCell(m))};Graph.prototype.setHiddenTags=function(m){this.hiddenTags=m;this.fireEvent(new mxEventObject("hiddenTagsChanged"))};Graph.prototype.toggleHiddenTag=function(m){var z=mxUtils.indexOf(this.hiddenTags,m);0>z?this.hiddenTags.push(m):0<=z&&this.hiddenTags.splice(z,1);this.fireEvent(new mxEventObject("hiddenTagsChanged"))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.ui.handleError(D)}}))};DriveClient.prototype.showPermissions=function(f){var c=mxUtils.bind(this,function(){var k=new ConfirmDialog(this.ui,mxResources.get("googleSharingNotAvailable"),mxUtils.bind(this,function(){this.ui.editor.graph.openLink("https://drive.google.com/open?id="+f)}),null,mxResources.get("open"),null,null,null,null,IMAGE_PATH+"/google-share.png");this.ui.showDialog(k.container,360,190,!0,!0);k.init()});this.sharingFailed?c():this.checkToken(mxUtils.bind(this,function(){try{var k=
new gapi.drive.share.ShareClient(this.appId);k.setOAuthToken(b);k.setItemIds([f]);k.showSettingsDialog();"MutationObserver"in window&&(null!=this.sharingObserver&&(this.sharingObserver.disconnect(),this.sharingObserver=null),this.sharingObserver=new MutationObserver(mxUtils.bind(this,function(l){for(var u=!1,x=0;x<l.length;x++)for(var E=0;E<l[x].addedNodes.length;E++){var D=l[x].addedNodes[E];"BUTTON"==D.nodeName&&"ok"==D.getAttribute("name")&&null!=D.parentNode&&null!=D.parentNode.parentNode&&"dialog"==
D.parentNode.parentNode.getAttribute("role")?(this.sharingFailed=!0,D.click(),c(),u=!0):"DIV"==D.nodeName&&"shr-q-shr-r-shr-xb"==D.className&&(u=!0)}u&&(this.sharingObserver.disconnect(),this.sharingObserver=null)})),this.sharingObserver.observe(document,{childList:!0,subtree:!0}))}catch(l){this.ui.handleError(l)}}))};DriveClient.prototype.clearPersistentToken=function(){var f=JSON.parse(this.getPersistentToken(!0))||{};delete f.current;delete f[this.userId];for(var c in f){f.current={userId:c,expires:0}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
b);var D=new XMLHttpRequest;D.responseType="json";D.onreadystatechange=mxUtils.bind(this,function(){if(4===D.readyState&&(window.clearTimeout(x),u))if(200==D.status){var A=D.response;A.compoundId=f+this.SEPARATOR+A.id;c(A)}else 401==D.status?this.authenticate(l,k,!0):k()});D.open("POST",this.baseUrl+"cards/"+f+"/attachments");D.send(E)});this.authenticate(l,k)}else k({message:mxResources.get("unknownError")})};TrelloClient.prototype.pickLibrary=function(b){this.pickFile(b)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(k){this.savingFile=!1;null!=c&&c(k)})):this.ui.pickFolder(App.MODE_TRELLO,mxUtils.bind(this,function(k){this.ui.trello.insertFile(b,this.getData(),mxUtils.bind(this,function(l){this.savingFile=!1;null!=f&&f();this.ui.fileLoaded(l);0<this.saveNeededCounter&&(this.saveNeededCounter--,this.saveFile(b,e,f,c))}),mxUtils.bind(this,function(){this.savingFile=!1;null!=c&&c()}),!1,k)}))):null!=f&&f()};TrelloLibrary=function(b,e,f){TrelloFile.call(this,b,e,f)};mxUtils.extend(TrelloLibrary,TrelloFile);TrelloLibrary.prototype.doSave=function(b,e,f){this.saveFile(b,!1,e,f)};TrelloLibrary.prototype.open=function(){};TrelloClient=function(b){DrawioClient.call(this,b,"tauth");Trello.setKey(this.key)};mxUtils.extend(TrelloClient,DrawioClient);TrelloClient.prototype.key="e89d109082298ce91f6576f82f458551";TrelloClient.prototype.baseUrl="https://api.trello.com/1/";TrelloClient.prototype.SEPARATOR="|$|";TrelloClient.prototype.maxFileSize=1E7;TrelloClient.prototype.extension=".xml"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
delete x[K];return u};EditorUi.prototype.patchViewState=function(b,e){if(null!=b.viewState&&null!=e){b==this.currentPage&&(b.viewState=this.editor.graph.getViewState());for(var f in e)try{this.patchViewStateProperty(b,e,f)}catch(c){}b==this.currentPage&&this.editor.graph.setViewState(b.viewState,!0)}};EditorUi.prototype.patchViewStateProperty=function(b,e,f){b.viewState[f]=JSON.parse(e[f])}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(function(){var b=EditorUi.prototype.setMode;App.prototype.setMode=function(e,f){b.apply(this,arguments);null!=this.mode&&(Editor.useLocalStorage=this.mode==App.MODE_BROWSER);if(null!=this.appIcon){var c=this.getCurrentFile();e=null!=c?c.getMode():e;e==App.MODE_GOOGLE?(this.appIcon.setAttribute("title",mxResources.get("openIt",[mxResources.get("googleDrive")])),this.appIcon.style.cursor="pointer"):e==App.MODE_DROPBOX?(this.appIcon.setAttribute("title",mxResources.get("openIt",[mxResources.get("dropbox")])),
this.appIcon.style.cursor="pointer"):e==App.MODE_ONEDRIVE?(this.appIcon.setAttribute("title",mxResources.get("openIt",[mxResources.get("oneDrive")])),this.appIcon.style.cursor="pointer"):(this.appIcon.removeAttribute("title"),this.appIcon.style.cursor=e==App.MODE_DEVICE?"pointer":"default")}if(f)try{if(isLocalStorage)localStorage.setItem(".mode",e);else if("undefined"!=typeof Storage){var k=new Date;k.setYear(k.getFullYear()+1);document.cookie="MODE="+e+"; expires="+k.toUTCString()}}catch(l){}}})(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.libraryLoaded(d,q,n.documentElement.getAttribute("title"),g)}else throw{message:mxResources.get("notALibraryFile")};};EditorUi.prototype.getLibraryStorageHint=function(d){return""};EditorUi.prototype.libraryLoaded=function(d,g,n,q){if(null!=this.sidebar){d.constructor!=LocalLibrary&&mxSettings.addCustomLibrary(d.getHash());var t=null;if(d.constructor!=StorageLibrary||".scratchpad"!=d.title){null==this.openLibraries&&(this.openLibraries=[]);for(var v=0;v<this.openLibraries.length;v++)if(this.openLibraries[v].file.getHash()== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l.x,l.y),b.editor.graph.fireEvent(new mxEventObject("cellsInserted","cells",N))}finally{b.editor.graph.getModel().endUpdate()}b.editor.graph.setSelectionCells(N);b.editor.graph.scrollCellToVisible(b.editor.graph.getSelectionCell());v.destroy();q.parentNode.removeChild(q)}}}function k(){return"list"==x.value?"Person\n-name: String\n-birthDate: Date\n--\n+getName(): String\n+setName(String): void\n+isBirthday(): boolean\n\nAddress\n-street: String\n-city: String\n-state: String":"mermaid"==x.value|| | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
StorageFile.listFiles=function(b,e,f,c){b.getDatabaseItems(function(k){var l=[];if(null!=k)for(var u=0;u<k.length;u++)"."==k[u].title.charAt(0)||null!=e&&k[u].type!=e||l.push(k[u]);f(l)},function(){null==b.database?f(StorageFile.listLocalStorageFiles(e)):null!=c&&c()},"filesInfo")};StorageFile.deleteFile=function(b,e,f,c){b.removeDatabaseItem([e,e],f,function(){null==b.database?(localStorage.removeItem(e),f()):null!=c&&c()},["files","filesInfo"])};StorageLibrary=function(b,e,f){StorageFile.call(this,b,e,f)};mxUtils.extend(StorageLibrary,StorageFile);StorageLibrary.prototype.type="L";StorageLibrary.prototype.isAutosave=function(){return!0};StorageLibrary.prototype.saveAs=function(b,e,f){this.saveFile(b,!1,e,f)};StorageLibrary.prototype.getHash=function(){return"L"+encodeURIComponent(this.title)};StorageLibrary.prototype.getTitle=function(){return".scratchpad"==this.title?mxResources.get("scratchpad"):this.title}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
k&&(401===u.getStatus()?c?f({message:mxResources.get("accessDenied")}):(this.logout(),this.authenticate(mxUtils.bind(this,function(){this.updateUser(e,f,!0)}),f)):200>u.getStatus()||300<=u.getStatus()?f({message:mxResources.get("accessDenied")}):(this.setUser(this.createUser(JSON.parse(u.getText()))),e()))}),f)};GitHubClient.prototype.createUser=function(e){return new DrawioUser(e.id,e.email,e.name)};GitHubClient.prototype.authenticate=function(e,f){(new mxXmlRequest(this.redirectUri+"?getState=1", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
q,n);null!=g&&(q.style.backgroundImage="url("+g+")",q.style.backgroundPosition="center center",q.style.backgroundRepeat="no-repeat",q.style.backgroundSize="100% 100%",q.style.width="24px",q.innerText="");return q};EditorUi.prototype.createToolbarButton=function(d,g,n,q){q=null!=q?q:24;var t=document.createElement("a");t.className="geToolbarButton geAdaptiveAsset";t.setAttribute("title",g);t.style.backgroundImage="url("+d+")";t.style.backgroundPosition="center center";t.style.backgroundRepeat="no-repeat";
t.style.backgroundSize="100% 100%";t.style.display="inline-block";t.style.cursor="pointer";t.style.marginLeft="6px";t.style.width=q+"px";t.style.height=q+"px";null!=n&&(mxEvent.addListener(t,mxClient.IS_POINTER?"pointerdown":"mousedown",mxUtils.bind(this,function(v){v.preventDefault()})),mxEvent.addListener(t,"click",function(v){"disabled"!=t.getAttribute("disabled")&&n(v);mxEvent.consume(v)}));return t};EditorUi.prototype.createMenuItem=function(d,g,n){var q=this.actions.get(d),t=null!=q?q.funct: | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
[this],"time",Date.now()-p+" ms","args",arguments);return y});null!=B?(c.diffPages=B,B=null):(B=c.diffPages,c.diffPages=function(){var p=Date.now(),y=B.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.diffPages",[this],"time",Date.now()-p+" ms","args",arguments);return y});null!=F?(c.patchPages=F,F=null):(F=c.patchPages,c.patchPages=function(){var p=Date.now(),y=F.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.patchPages",[this],"time",Date.now()-p+" ms","args",arguments);
return y});null!=I?(c.clonePages=I,I=null):(I=c.clonePages,c.clonePages=function(){var p=Date.now(),y=I.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.clonePages",[this],"time",Date.now()-p+" ms","args",arguments);return y});null!=G?(c.getHashValueForPages=G,G=null):(G=c.getHashValueForPages,c.getHashValueForPages=function(){var p=Date.now(),y=G.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.getHashValueForPages",[this],"time",Date.now()-p+" ms","args",arguments);return y}); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.formatWindow.window.toggleMinimized()}));this.formatWindow.window.minimumSize=new mxRectangle(0,0,240,80);"sketch"==Editor.currentTheme?(d=window.innerHeight||document.documentElement.clientHeight||document.body.clientHeight,(1200>(window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth)||708>d)&&this.formatWindow.window.toggleMinimized()):this.formatWindow.window.setVisible(!1)}};var x=EditorUi.prototype.toggleFormatPanel;EditorUi.prototype.toggleFormatPanel=function(d){var g=
this.formatWindow;null!=g?g.window.setVisible(null!=d?d:!this.isFormatPanelVisible()):x.apply(this,arguments)};EditorUi.prototype.toggleShapesPanel=function(d){var g=EditorUi.prototype.hsplitPosition;0==g&&(g=134);var n=this.hsplitPosition,q=mxUtils.bind(this,function(){this.hsplitPosition=t;this.refresh();this.diagramContainer.scrollLeft-=n-this.hsplitPosition}),t=d?g:0;mxUtils.setPrefixedStyle(this.sidebarContainer.style,"transform",0==t?"translateX(0)":"translateX(-100%)");0!=t&&q();window.setTimeout(mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(P){A=P};this.setAutoScroll=function(P){K=P};this.setOpenFill=function(P){H=P};this.setStopClickEnabled=function(P){n=P};this.setSelectInserted=function(P){q=P};this.setSmoothing=function(P){f=P};this.setPerfectFreehandMode=function(P){v=P};this.isPerfectFreehandMode=function(){return v};this.setBrushSize=function(P){t.size=P};this.getBrushSize=function(){return t.size};var B=function(P){g=P;b.getRubberband().setEnabled(!P);b.graphHandler.setSelectEnabled(!P);b.graphHandler.setMoveEnabled(!P); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null}l(K)}));f=!0}}catch(U){f=!1,null!=u&&u!=this.editor.graph&&null!=u.container.parentNode&&u.container.parentNode.removeChild(u.container)}f||window.clearTimeout(k);return f};App.prototype.createBackground=function(){var b=this.createDiv("background");b.style.position="absolute";b.style.background="white";b.style.left="0px";b.style.top="0px";b.style.bottom="0px";b.style.right="0px";mxUtils.setOpacity(b,100);return b}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.prototype.isAllTagsHidden=function(m){if(null==m||0==m.length||0==this.hiddenTags.length)return!1;m=m.split(" ");if(m.length>this.hiddenTags.length)return!1;for(var z=0;z<m.length;z++)if(0>mxUtils.indexOf(this.hiddenTags,m[z]))return!1;return!0};Graph.prototype.getCellsForTags=function(m,z,J,O){var T=[];if(null!=m){z=null!=z?z:this.model.getDescendants(this.model.getRoot());for(var W=0,V={},Q=0;Q<m.length;Q++)0<m[Q].length&&(V[m[Q]]=!0,W++);for(Q=0;Q<z.length;Q++)if(J&&this.model.getParent(z[Q])== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
m.length&&0<z.length){this.model.beginUpdate();try{for(var J=0;J<m.length;J++){for(var O=this.getTagsForCell(m[J]),T=O.split(" "),W=!1,V=0;V<z.length;V++){var Q=mxUtils.trim(z[V]);""!=Q&&0>mxUtils.indexOf(T,Q)&&(O=0<O.length?O+" "+Q:Q,W=!0)}W&&this.setAttributeForCell(m[J],"tags",O)}}finally{this.model.endUpdate()}}};Graph.prototype.removeTagsForCells=function(m,z){if(0<m.length&&0<z.length){this.model.beginUpdate();try{for(var J=0;J<m.length;J++){var O=this.getTagsForCell(m[J]);if(0<O.length){for(var T= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
ia[ma]=na),na.push(oa))}ka=ka.nextSibling}U(Ga,Qa,Ia)}})}function P(ka){u&&(Ba.scrollTop=0,ba.innerText="",Fa.spin(ba),m=!1,L=!0,sa.innerText=mxResources.get("recentDiag"),Y=null,u(Va,function(){n(mxResources.get("cannotLoad"));Va([])},ka?null:l))}function R(ka){if(""==ka)null!=J&&(J.click(),J=null);else{if(null==TemplatesDialog.tagsList[c]){var fa={};for(Ka in Ga)for(var ma=Ga[Ka],na=0;na<ma.length;na++){var oa=ma[na];if(null!=oa.tags)for(var ia=oa.tags.toLowerCase().split(";"),ja=0;ja<ia.length;ja++)null==
fa[ia[ja]]&&(fa[ia[ja]]=[]),fa[ia[ja]].push(oa)}TemplatesDialog.tagsList[c]=fa}var wa=ka.toLowerCase().split(" ");fa=TemplatesDialog.tagsList[c];if(0<Ia&&null==fa.__tagsList__){for(Ka in Qa)for(ma=Qa[Ka],na=0;na<ma.length;na++)for(oa=ma[na],ia=oa.title.split(" "),ia.push(Ka),ja=0;ja<ia.length;ja++){var xa=ia[ja].toLowerCase();null==fa[xa]&&(fa[xa]=[]);fa[xa].push(oa)}fa.__tagsList__=!0}var Ka=[];ma={};for(na=ia=0;na<wa.length;na++)if(0<wa[na].length){xa=fa[wa[na]];var Ja={};Ka=[];if(null!=xa)for(ja=
0;ja<xa.length;ja++)oa=xa[ja],0==ia==(null==ma[oa.url])&&(Ja[oa.url]=!0,Ka.push(oa));ma=Ja;ia++}0==Ka.length?sa.innerText=mxResources.get("noResultsFor",[ka]):G(Ka,!0)}}function M(ka){if(Y!=ka||V!=aa)q(),Ba.scrollTop=0,ba.innerText="",sa.innerText=mxResources.get("searchResults")+' "'+ka+'"',Ua=null,ca?R(ka):x&&(ka?(Fa.spin(ba),m=!1,L=!0,x(ka,Va,function(){n(mxResources.get("searchFailed"));Va([])},V?null:l)):P(V)),Y=ka,aa=V}function p(ka){null!=Ua&&clearTimeout(Ua);13==ka.keyCode?M(Ca.value):Ua= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.addMenuItem(p,"export",y).firstChild.nextSibling.innerHTML=mxResources.get("advanced")+"...");mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||"min"!=Editor.currentTheme||this.addMenuItems(p,["publishLink"],y);c.mode==App.MODE_ATLAS||"1"==urlParams.extAuth||"simple"!=Editor.currentTheme&&"sketch"!=Editor.currentTheme&&"min"!=Editor.currentTheme||(p.addSeparator(y),c.menus.addSubmenu("embed",p,y))})));this.put("importFrom",new Menu(mxUtils.bind(this,function(p,y){function C(z){z.pickFile(function(J){c.spinner.spin(document.body,
mxResources.get("loading"))&&z.getFile(J,function(O){var T="data:image/"==O.getData().substring(0,11)?m(O.getTitle()):"text/xml";/\.svg$/i.test(O.getTitle())&&!c.editor.isDataSvg(O.getData())&&(O.setData(Editor.createSvgDataUri(O.getData())),T="image/svg+xml");L(O.getData(),T,O.getTitle())},function(O){c.handleError(O,null!=O?mxResources.get("errorLoadingFile"):null)},z==c.drive)},!0)}var L=mxUtils.bind(this,function(z,J,O){var T=k.view,W=k.getGraphBounds(),V=k.snap(Math.ceil(Math.max(0,W.x/T.scale- | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(n(mxMarker.getPackageForType(t[mxConstants.STYLE_STARTARROW])),n(mxMarker.getPackageForType(t[mxConstants.STYLE_ENDARROW])));t=q.model.getChildCount(d);for(var v=0;v<t;v++)this.addBasenamesForCell(q.model.getChildAt(d,v),g)};EditorUi.prototype.setGraphEnabled=function(d){this.diagramContainer.style.visibility=d?"":"hidden";this.formatContainer.style.visibility=d?"":"hidden";this.sidebarContainer.style.display=d?"":"none";this.hsplit.style.display=d&&"sketch"!=Editor.currentTheme&&"min"!=Editor.currentTheme?
"":"none";this.editor.graph.setEnabled(d);null!=this.tabContainer&&(this.tabContainer.style.visibility=d?"":"hidden");null!=this.ruler&&(this.ruler.hRuler.container.style.visibility=d?"":"hidden",this.ruler.vRuler.container.style.visibility=d?"":"hidden");d||this.hideWindows()};EditorUi.prototype.initializeEmbedMode=function(){this.setGraphEnabled(!1);if((window.opener||window.parent)!=window&&("1"!=urlParams.spin||this.spinner.spin(document.body,mxResources.get("loading")))){var d=!1;this.installMessageHandler(mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
x.apply(this,arguments)};var E=EditorUi.prototype.setGraphEnabled;EditorUi.prototype.setGraphEnabled=function(H){E.apply(this,arguments);if(H){var d=window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth;1E3<=d&&null!=this.sidebarWindow&&this.sidebarWindow.window.setVisible(!0);null!=this.formatWindow&&1E3<=d&&this.formatWindow.window.setVisible(!0)}else null!=this.sidebarWindow&&this.sidebarWindow.window.setVisible(!1),null!=this.formatWindow&&this.formatWindow.window.setVisible(!1)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
m[z[J][T]];null!=W?""!=W&&O.push(W):O.push(z[J][T])}z[J]=O}};Graph.prototype.getCellsForAction=function(m,z){z=this.getCellsById(m.cells).concat(this.getCellsForTags(m.tags,null,z));if(null!=m.excludeCells){for(var J=[],O=0;O<z.length;O++)0>m.excludeCells.indexOf(z[O].id)&&J.push(z[O]);z=J}return z};Graph.prototype.getCellsById=function(m){var z=[];if(null!=m)for(var J=0;J<m.length;J++)if("*"==m[J]){var O=this.model.getRoot();z=z.concat(this.model.filterDescendants(function(W){return W!=O},O))}else{var T= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"22px";B.style.width="22px";B.style.position="relative";B.style.top=mxClient.IS_IE||mxClient.IS_IE11||mxClient.IS_EDGE?"6px":"1px";B.className="geColorBtn";d.appendChild(B);mxUtils.br(d);return{getColor:function(){return v},getTarget:function(){return q.value},focus:function(){q.focus()}}};EditorUi.prototype.createUrlParameters=function(d,g,n,q,t,v,B){B=null!=B?B:[];q&&("https://viewer.diagrams.net"==EditorUi.lightboxHost&&"1"!=urlParams.dev||B.push("lightbox=1"),"auto"!=d&&B.push("target="+d),null!=
g&&g!=mxConstants.NONE&&B.push("highlight="+("#"==g.charAt(0)?g.substring(1):g)),null!=t&&0<t.length&&B.push("edit="+encodeURIComponent(t)),v&&B.push("layers=1"),this.editor.graph.foldingEnabled&&B.push("nav=1"));n&&null!=this.currentPage&&null!=this.pages&&this.currentPage!=this.pages[0]&&B.push("page-id="+this.currentPage.getId());return B};EditorUi.prototype.createLink=function(d,g,n,q,t,v,B,F,I,G){I=this.createUrlParameters(d,g,n,q,t,v,I);d=this.getCurrentFile();g=!0;null!=B?n="#U"+encodeURIComponent(B): | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
q)}))}else c({message:mxResources.get("accessDenied")});else D="&t="+(new Date).getTime(),d=this.baseUrl+"/projects/"+encodeURIComponent(A+"/"+K)+"/repository/files/"+encodeURIComponent(e)+"?ref="+H,x=new mxXmlRequest(d+D,null,"GET"),this.executeRequest(x,mxUtils.bind(this,function(g){try{f(this.createGitLabFile(A,K,H,JSON.parse(g.getText()),k,E))}catch(n){c(n)}}),c)}),c,u)};GitLabClient.prototype.getFileContent=function(e){var f=e.file_name,c=e.content;"base64"===e.encoding&&(/\.jpe?g$/i.test(f)?
c="data:image/jpeg;base64,"+c:/\.gif$/i.test(f)?c="data:image/gif;base64,"+c:/\.pdf$/i.test(f)?c="data:application/pdf;base64,"+c:/\.png$/i.test(f)?(e=this.ui.extractGraphModelFromPng(c),c=null!=e&&0<e.length?e:"data:image/png;base64,"+c):c=Base64.decode(c));return c};GitLabClient.prototype.createGitLabFile=function(e,f,c,k,l,u){var x=DRAWIO_GITLAB_URL+"/";e={org:e,repo:f,ref:c,name:k.file_name,path:k.file_path,html_url:x+e+"/"+f+"/blob/"+c+"/"+k.file_path,download_url:x+e+"/"+f+"/raw/"+c+"/"+k.file_path+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(d){return 1!=d};EditorUi.prototype.getEditBlankXml=function(){return this.getFileData(!0)};EditorUi.prototype.exportFile=function(d,g,n,q,t,v){};EditorUi.prototype.getServiceForName=function(d){return null};EditorUi.prototype.getTitleForService=function(d){return mxResources.get(d)};EditorUi.prototype.pickFolder=function(d,g,n){g(null)};EditorUi.prototype.exportSvg=function(d,g,n,q,t,v,B,F,I,G,S,U,N,P){if(this.spinner.spin(document.body,mxResources.get("export")))try{var R=this.editor.graph.isSelectionEmpty(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"?inline=false",last_commit_id:k.last_commit_id,refPos:u};k=this.getFileContent(k);return l?new GitLabLibrary(this.ui,k,e):new GitLabFile(this.ui,k,e)};GitLabClient.prototype.insertFile=function(e,f,c,k,l,u,x){l=null!=l?l:!1;u=u.split("/");this.getRefIndex(u,!0,mxUtils.bind(this,function(E,D){var A=Math.max(D-1,0),K=E.slice(0,A).join("/"),H=E[A],d=E[D];path=E.slice(D+1,E.length).join("/");0<path.length&&(path+="/");path+=e;this.checkExists(K+"/"+H+"/"+d+"/"+path,!0,mxUtils.bind(this,function(g,n){g?
l?(x||(f=Base64.encode(f)),this.showCommitDialog(e,!0,mxUtils.bind(this,function(q){this.writeFile(K,H,d,path,q,f,n,mxUtils.bind(this,function(t){try{var v=JSON.parse(t.getText());c(this.createGitLabFile(K,H,d,null!=v.content?v.content:v,l,D))}catch(B){k(B)}}),k)}),k)):(g=DRAWIO_GITLAB_URL+"/",c(new GitLabFile(this.ui,f,{org:K,repo:H,ref:d,name:e,path:path,html_url:g+K+"/"+H+"/blob/"+d+"/"+path,download_url:g+K+"/"+H+"/raw/"+d+"/"+path+"?inline=false",refPos:D,last_commit_id:n,isNew:!0}))):k()}))}),
k,null,4>=u.length)};GitLabClient.prototype.checkExists=function(e,f,c){this.getFile(e,mxUtils.bind(this,function(k){if(f){var l=this.ui.spinner.pause();this.ui.confirm(mxResources.get("replaceIt",[e]),function(){l();c(!0,k.getCurrentEtag())},function(){l();c(!1)})}else this.ui.spinner.stop(),this.ui.showError(mxResources.get("error"),mxResources.get("fileExists"),mxResources.get("ok"),function(){c(!1)})}),mxUtils.bind(this,function(k){c(!0)}),null,!0)};GitLabClient.prototype.writeFile=function(e, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Y+"')";break;default:null==Q?C=[{driveId:V}]:C.push({name:Z,driveId:V,folderId:Q}),qa=(V?"/drives/"+V:"/me/drive")+(Q?"/items/"+Q:"/root")+"/children"}ba||(qa+=(0<qa.indexOf("?")?"&":"?")+"select=id,name,description,parentReference,file,createdBy,lastModifiedBy,lastModifiedDateTime,size,folder,remoteItem,@microsoft.graph.downloadUrl");var la=[];ca()}}function I(V){T.className=T.className.replace("odCatSelected","");T=V;T.className+=" odCatSelected"}function G(V){y||(W=null,F("search",null,null,null,
V))}var S="";null==e&&(e=t,S='<div style="text-align: center;" class="odPreview"></div>');null==k&&(k=function(){var V=null;try{V=JSON.parse(localStorage.getItem("mxODPickerRecentList"))}catch(Q){}return V});null==l&&(l=function(V){if(null!=V){var Q=k()||{};delete V["@microsoft.graph.downloadUrl"];Q[V.id]=V;localStorage.setItem("mxODPickerRecentList",JSON.stringify(Q))}});S='<div class="odCatsList"><div class="odCatsListLbl">OneDrive</div><div id="odFiles" class="odCatListTitle odCatSelected">'+mxUtils.htmlEntities(mxResources.get("files"))+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DiagramFormatPanel.prototype.addOptions=function(m){m=K.apply(this,arguments);var z=this.editorUi,J=z.editor.graph;if(J.isEnabled()){var O=z.getCurrentFile();null!=O&&O.isAutosaveOptional()&&m.appendChild(this.createOption(mxResources.get("autosave"),function(){return z.editor.autosave},function(V){z.editor.setAutosave(V);z.editor.autosave&&O.isModified()&&O.fileChanged()},{install:function(V){this.listener=function(){V(z.editor.autosave)};z.editor.addListener("autosaveChanged",this.listener)},destroy:function(){z.editor.removeListener(this.listener)}}))}if(this.isMathOptionVisible()&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
M){var p=M.getAttribute("background");if(null==p||""==p||p==mxConstants.NONE)p=Editor.isDarkMode()?"transparent":"#ffffff";q.style.backgroundColor=p;(new mxCodec(M.ownerDocument)).decode(M,t.getModel());t.maxFitScale=1;t.fit(8);t.center()}return M}function N(M){null!=M&&(M=U(Editor.parseDiagramNode(M)));return M}mxEvent.addListener(S,"change",function(M){F=parseInt(S.value);N(I[F]);mxEvent.consume(M)});if("mxfile"==B.nodeName){var P=B.getElementsByTagName("diagram");I=[];for(var R=0;R<P.length;R++)I.push(P[R]); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
2));return r}(Graph.arrayBufferToString(pako.deflateRaw(d))),!0);"txt"!=g&&(B.responseType="blob");B.onload=function(F){if(200<=this.status&&300>this.status)if("txt"==g)n(this.response);else{var I=new FileReader;I.readAsDataURL(this.response);I.onloadend=function(G){var S=new Image;S.onload=function(){try{var U=S.width,N=S.height;if(0==U&&0==N){var P=I.result,R=P.indexOf(","),M=decodeURIComponent(escape(atob(P.substring(R+1)))),p=mxUtils.parseXml(M).getElementsByTagName("svg");0<p.length&&(U=parseFloat(p[0].getAttribute("width")),
N=parseFloat(p[0].getAttribute("height")))}n(I.result,U,N)}catch(y){q(y)}};S.src=I.result};I.onerror=function(G){q(G)}}else q(F)};B.onerror=function(F){q(F)};B.send()};EditorUi.prototype.insertAsPreText=function(d,g,n){var q=this.editor.graph,t=null;q.getModel().beginUpdate();try{t=q.insertVertex(null,null,"<pre>"+d+"</pre>",g,n,1,1,"text;html=1;align=left;verticalAlign=top;"),q.updateCellSize(t,!0)}finally{q.getModel().endUpdate()}return t};EditorUi.prototype.insertTextAt=function(d,g,n,q,t,v,B, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
d.shortcut):u.apply(this,arguments)};EditorUi.prototype.toggleFormatPanel=function(H){null!=this.formatWindow?this.formatWindow.window.setVisible(null!=H?H:!this.formatWindow.window.isVisible()):b(this)};EditorUi.prototype.isFormatPanelVisible=function(){return null!=this.formatWindow&&this.formatWindow.window.isVisible()||null==this.formatWindow&&0<this.formatWidth};DiagramFormatPanel.prototype.isMathOptionVisible=function(){return!0};var x=EditorUi.prototype.destroy;EditorUi.prototype.destroy=function(){this.destroyWindows(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"metaEdit","0")?d.showDataDialog(C):n.apply(this,arguments)}}catch(J){d.handleError(J)}};g.getLinkTitle=function(C){return d.getLinkTitle(C)};g.customLinkClicked=function(C){var L=!1;try{d.handleCustomLink(C),L=!0}catch(m){d.handleError(m)}return L};var q=g.parseBackgroundImage;g.parseBackgroundImage=function(C){var L=q.apply(this,arguments);null!=L&&null!=L.src&&Graph.isPageLink(L.src)&&(L={originalSrc:L.src});return L};var t=g.setBackgroundImage;g.setBackgroundImage=function(C){null!=C&&null!=C.originalSrc&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DriveComment.prototype.deleteComment=function(b,e){this.file.ui.drive.executeRequest(this.pCommentId?{url:"/files/"+this.file.getId()+"/comments/"+this.pCommentId+"/replies/"+this.id,method:"DELETE"}:{url:"/files/"+this.file.getId()+"/comments/"+this.id,method:"DELETE"},b,e)};function mxODPicker(b,e,f,c,k,l,u,x,E,D,A,K,H,d){function g(V,Q){Q=Q||document;return Q.querySelector(V)}function n(V,Q,X){if(null==V["@microsoft.graph.downloadUrl"])if(null==V.parentReference)X();else{c(V.id,V.parentReference.driveId,function(aa){n(aa,Q,X)},X);return}var Z=new XMLHttpRequest;Z.open("GET",V["@microsoft.graph.downloadUrl"]);var Y=V.file?"image/png"==V.file.mimeType:!1;Z.onreadystatechange=function(){if(4==this.readyState){if(200<=this.status&&299>=this.status)try{var aa=Z.responseText;
Y&&(aa="data:image/png;base64,"+Editor.base64Encode(aa),aa=Editor.extractGraphModelFromPng(aa));var ca=mxUtils.parseXml(aa),da="mxlibrary"==ca.documentElement.nodeName?ca.documentElement:Editor.extractGraphModel(ca.documentElement);if(null!=da){Q(da.ownerDocument);return}}catch(ba){}X()}};Y&&Z.overrideMimeType&&Z.overrideMimeType("text/plain; charset=x-user-defined");Z.send()}function q(){K&&null!=R?P.exportToCanvas(function(V){V=EditorUi.prototype.createImageDataUri(V,null,"png");u(M,V);l(M)},400, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.