code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
x.getGlobalVariable=function(X){return"page"==X&&null!=D&&null!=D[A]?D[A].getAttribute("name"):"pagenumber"==X?A+1:"pagecount"==X?null!=D?D.length:1:K.apply(this,arguments)};x.getLinkForCell=function(){return null};Editor.MathJaxRender&&x.model.addListener(mxEvent.CHANGE,mxUtils.bind(this,function(X,Z){b.editor.graph.mathEnabled&&Editor.MathJaxRender(x.container)}));var H={lines:11,length:15,width:6,radius:10,corners:1,rotate:0,direction:1,color:Editor.isDarkMode()?"#c0c0c0":"#000",speed:1.4,trail:60,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
JSON.parse(z.substring(17));null!=J.actions&&(this.updateCustomLinkActions(m,J.actions),z="data:action/json,"+JSON.stringify(J))}catch(O){}return z};Graph.prototype.updateCustomLinkActions=function(m,z){for(var J=0;J<z.length;J++){var O=z[J],T;for(T in O)this.updateCustomLinkAction(m,O[T],"cells"),this.updateCustomLinkAction(m,O[T],"excludeCells")}};Graph.prototype.updateCustomLinkAction=function(m,z,J){if(null!=z&&null!=z[J]){for(var O=[],T=0;T<z[J].length;T++)if("*"==z[J][T])O.push(z[J][T]);else{var W= m[z[J][T]];null!=W?""!=W&&O.push(W):O.push(z[J][T])}z[J]=O}};Graph.prototype.getCellsForAction=function(m,z){z=this.getCellsById(m.cells).concat(this.getCellsForTags(m.tags,null,z));if(null!=m.excludeCells){for(var J=[],O=0;O<z.length;O++)0>m.excludeCells.indexOf(z[O].id)&&J.push(z[O]);z=J}return z};Graph.prototype.getCellsById=function(m){var z=[];if(null!=m)for(var J=0;J<m.length;J++)if("*"==m[J]){var O=this.model.getRoot();z=z.concat(this.model.filterDescendants(function(W){return W!=O},O))}else{var T=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g&&g(N)}}),null,null,null,mxUtils.bind(this,function(S){null!=g&&g(S)}),null,null,q,null,v.shadowVisible,null,v,t,null,null,null,"diagram",null)}catch(S){null!=g&&g(S)}};EditorUi.prototype.getEmbeddedSvg=function(d,g,n,q,t,v,B,F,I,G,S,U,N){F=null!=F?F:!0;S=null!=S?S:0;B=null!=I?I:g.background;B==mxConstants.NONE&&(B=null);v=g.getSvg(B,G,S,null,null,v,null,null,null,g.shadowVisible||U,null,N,"diagram");(g.shadowVisible||U)&&g.addSvgShadow(v,null,null,0==S);null!=d&&v.setAttribute("content",d);null!= n&&v.setAttribute("resource",n);var P=mxUtils.bind(this,function(R){R=(q?"":Graph.xmlDeclaration+"\n"+Graph.svgFileComment+"\n"+Graph.svgDoctype+"\n")+mxUtils.getXml(R);null!=t&&t(R);return R});g.mathEnabled&&this.editor.addMathCss(v);if(null!=t)this.embedFonts(v,mxUtils.bind(this,function(R){F?this.editor.convertImages(R,mxUtils.bind(this,function(M){P(M)})):P(R)}));else return P(v)};EditorUi.prototype.embedFonts=function(d,g){this.editor.loadFonts(mxUtils.bind(this,function(){try{null!=this.editor.resolvedFontCss&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"...",function(){var Z=[{layout:"mxOrgChartLayout",config:{branchOptimizer:parseInt(T.value),parentChildSpacing:parseInt(Q.value),siblingSpacing:parseInt(X.value)}}];c.hideDialog();c.showCustomLayoutDialog(JSON.stringify(Z,null,2))});O.className="geBtn";J=new CustomDialog(c,J,function(){null==C&&(C=2);c.loadOrgChartLayouts(z)},null,null,null,O);c.showDialog(J.container,355,140,!0,!0)},y,null,l());p.addSeparator(y);p.addItem(mxResources.get("parallels"),null,mxUtils.bind(this,function(){c.tryAndHandle(mxUtils.bind(this, function(){var C=new mxParallelEdgeLayout(k);C.checkOverlap=!0;c.prompt(mxResources.get("spacing"),C.spacing,mxUtils.bind(this,function(L){c.tryAndHandle(mxUtils.bind(this,function(){C.spacing=L;c.executeLayout(function(){C.execute(k.getDefaultParent(),k.isSelectionEmpty()?null:k.getSelectionCells())},!1)}))}))}))}),y);p.addSeparator(y);c.menus.addMenuItem(p,"runLayout",y,null,null,mxResources.get("custom")+"...")};this.put("help",new Menu(mxUtils.bind(this,function(p,y){if(!mxClient.IS_CHROMEAPP&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d.name):n()}):I||n()}},function(v){n(v)}):n()});"undefined"!==typeof JSZip||this.loadingExtensions||this.isOffline(!0)?t():(this.loadingExtensions=!0,mxscript("js/extensions.min.js",t,null,null,null,n))};EditorUi.prototype.importFile=function(d,g,n,q,t,v,B,F,I,G,S,U){G=null!=G?G:!0;var N=!1,P=null,R=mxUtils.bind(this,function(M){var p=null;null!=M&&"<mxlibrary"==M.substring(0,10)?this.loadLibrary(new LocalLibrary(this,M,B)):p=this.importXml(M,n,q,G,null,null!=U?mxEvent.isControlDown(U):null);null!= F&&F(p)});"image"==g.substring(0,5)?(I=!1,"image/png"==g.substring(0,9)&&(g=S?null:this.extractGraphModelFromPng(d),null!=g&&0<g.length&&(P=this.importXml(g,n,q,G,null,null!=U?mxEvent.isControlDown(U):null),I=!0)),I||(g=this.editor.graph,I=d.indexOf(";"),0<I&&(d=d.substring(0,I)+d.substring(d.indexOf(",",I+1))),G&&g.isGridEnabled()&&(n=g.snap(n),q=g.snap(q)),P=[g.insertVertex(null,null,"",n,q,t,v,"shape=image;verticalLabelPosition=bottom;labelBackgroundColor=default;verticalAlign=top;aspect=fixed;imageAspect=0;image="+ d+";")])):/(\.*<graphml )/.test(d)?(N=!0,this.importGraphML(d,R)):null!=I&&null!=B&&(/(\.v(dx|sdx?))($|\?)/i.test(B)||/(\.vs(x|sx?))($|\?)/i.test(B))?(N=!0,this.importVisio(I,R)):(new XMLHttpRequest).upload&&this.isRemoteFileFormat(d,B)?this.isOffline()?this.showError(mxResources.get("error"),mxResources.get("notInOffline")):(N=!0,t=mxUtils.bind(this,function(M){4==M.readyState&&(200<=M.status&&299>=M.status?R(M.responseText):null!=F&&(F(null),this.showError(mxResources.get("error"),413==M.status?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
GitHubFile.prototype.setDescriptorEtag=function(b,e){b.sha=e};GitHubFile.prototype.save=function(b,e,f,c,k,l){this.doSave(this.getTitle(),e,f,c,k,l)};GitHubFile.prototype.saveAs=function(b,e,f){this.doSave(b,e,f)};GitHubFile.prototype.doSave=function(b,e,f,c,k,l){var u=this.meta.name;this.meta.name=b;DrawioFile.prototype.save.apply(this,[null,mxUtils.bind(this,function(){this.meta.name=u;this.saveFile(b,!1,e,f,c,k,l)}),f,c,k])};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
{val:"south",dispName:"South"},{val:"west",dispName:"West"}]},{name:"jettySize",dispName:"Jetty Size",type:"int",min:0,defVal:"auto",allowAuto:!0,isVisible:function(m){return"orthogonalEdgeStyle"==mxUtils.getValue(m.style,mxConstants.STYLE_EDGE,null)}},{name:"fillOpacity",dispName:"Fill Opacity",type:"int",min:0,max:100,defVal:100},{name:"strokeOpacity",dispName:"Stroke Opacity",type:"int",min:0,max:100,defVal:100},{name:"startFill",dispName:"Start Fill",type:"bool",defVal:!0},{name:"endFill",dispName:"End Fill",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){b.hideDialog()})});E.className="geBtn";b.editor.cancelFirst&&e.appendChild(E);D=mxUtils.button(mxResources.get("insert"),function(d){try{b.hideDialog(),c(u.value,x.value,d)}catch(g){b.handleError(g)}});D.className="geBtn gePrimaryBtn";e.appendChild(D);b.editor.cancelFirst||e.appendChild(E);this.container=e},NewDialog=function(b,e,f,c,k,l,u,x,E,D,A,K,H,d,g,n,q,t){function v(fa){null!=fa&&(Fa=pa=fa?135:140);fa=!0;if(null!=Ia)for(;y<Ia.length&&(fa||0!=mxUtils.mod(y,30));){var ma=Ia[y++];ma= S(ma.url,ma.libs,ma.title,ma.tooltip?ma.tooltip:ma.title,ma.select,ma.imgUrl,ma.info,ma.onClick,ma.preview,ma.noImg,ma.clibs);fa&&ma.click();fa=!1}}function B(fa,ma,na,oa,ia,ja){if(null!=fa&&mxUtils.isAncestorNode(document.body,oa)){fa=mxUtils.parseXml(fa);fa=Editor.parseDiagramNode(fa.documentElement);var wa=new mxCodec(fa.ownerDocument),xa=new mxGraphModel;wa.decode(fa,xa);fa=xa.root.getChildAt(0).children;b.sidebar.createTooltip(oa,fa,Math.min((window.innerWidth||document.documentElement.clientWidth||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(EditorUi.debug("EditorUi.generateOpenAiMermaidDiagram","\nprompt:",d,"\nresponse:",S,"\nresult:",U),this.spinner.stop(),g(U,N,P,R))}),F)}),F,mxUtils.bind(this,function(N){3>q++?v.clear()&&(this.spinner.stop(),t()):F(N)}))}),F);else{var G={message:mxResources.get("error")+" "+I.getStatus()};try{G=JSON.parse(I.getText()),G=G.error}catch(S){}F(G)}}),F)}),n)});t()};EditorUi.prototype.extractMermaidMindmap=function(d){for(0<d[1].indexOf("orientation")&&d.splice(1,1);1<d.length&&""==d[1];)d.splice(1,1);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFileSync.prototype.createToken=function(b,e,f){var c=!0,k=window.setTimeout(mxUtils.bind(this,function(){c=!1;f({code:App.ERROR_TIMEOUT,message:mxResources.get("timeout")})}),this.ui.timeout);mxUtils.get(EditorUi.cacheUrl+"?id="+encodeURIComponent(this.channelId)+"&secret="+encodeURIComponent(b),mxUtils.bind(this,function(l){window.clearTimeout(k);c&&(200<=l.getStatus()&&299>=l.getStatus()?e(l.getText()):f({code:l.getStatus(),message:"Token Error "+l.getStatus()}))}),f)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxResources.get("loading")))for(var z=d.length,J=z,O=[],T=mxUtils.bind(this,function(V,Q){O[V]=Q;if(0==--J){this.spinner.stop();if(null!=F)F(O);else{var X=[];L.getModel().beginUpdate();try{for(V=0;V<O.length;V++){var Z=O[V]();null!=Z&&(X=X.concat(Z))}}finally{L.getModel().endUpdate()}}v(X)}}),W=0;W<z;W++)mxUtils.bind(this,function(V){var Q=d[V];if(null!=Q){var X=new FileReader;X.onload=mxUtils.bind(this,function(Z){if(null==B||B(Q))try{if("image/"==Q.type.substring(0,6))if("image/svg"==Q.type.substring(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.ui.pages.push(this.ui.createPage());0>mxUtils.indexOf(this.ui.pages,this.ui.currentPage)&&this.ui.selectPage(this.ui.pages[0],!0)}finally{x.container.style.visibility="";x.model.endUpdate();x.cellRenderer.redraw=K;this.changeListenerEnabled=E;f||(k.history=l,k.indexOfNextAdd=u,k.fireEvent(new mxEventObject(mxEvent.CLEAR)));if(null==this.ui.currentPage||this.ui.currentPage.needsUpdate)A!=x.mathEnabled?(this.ui.editor.updateGraphComponents(),x.refresh()):(D!=x.foldingEnabled?x.view.revalidate(): x.view.validate(),x.sizeDidChange());null!=this.sync&&this.isRealtime()&&!c&&(this.sync.snapshot=this.ui.clonePages(this.ui.pages));this.ui.editor.fireEvent(new mxEventObject("pagesPatched","patches",b))}EditorUi.debug("DrawioFile.patch",[this],"patches",b,"resolver",e,"undoable",f)}return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
2));return r}(Graph.arrayBufferToString(pako.deflateRaw(d))),!0);"txt"!=g&&(B.responseType="blob");B.onload=function(F){if(200<=this.status&&300>this.status)if("txt"==g)n(this.response);else{var I=new FileReader;I.readAsDataURL(this.response);I.onloadend=function(G){var S=new Image;S.onload=function(){try{var U=S.width,N=S.height;if(0==U&&0==N){var P=I.result,R=P.indexOf(","),M=decodeURIComponent(escape(atob(P.substring(R+1)))),p=mxUtils.parseXml(M).getElementsByTagName("svg");0<p.length&&(U=parseFloat(p[0].getAttribute("width")), N=parseFloat(p[0].getAttribute("height")))}n(I.result,U,N)}catch(y){q(y)}};S.src=I.result};I.onerror=function(G){q(G)}}else q(F)};B.onerror=function(F){q(F)};B.send()};EditorUi.prototype.insertAsPreText=function(d,g,n){var q=this.editor.graph,t=null;q.getModel().beginUpdate();try{t=q.insertVertex(null,null,"<pre>"+d+"</pre>",g,n,1,1,"text;html=1;align=left;verticalAlign=top;"),q.updateCellSize(t,!0)}finally{q.getModel().endUpdate()}return t};EditorUi.prototype.insertTextAt=function(d,g,n,q,t,v,B,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
App.prototype.fileCreated=function(b,e,f,c,k,l){var u=window.location.pathname;null!=e&&0<e.length&&(u+="?libs="+e);null!=k&&0<k.length&&(u+="?clibs="+k);u=this.getUrl(u);b.getMode()!=App.MODE_DEVICE&&(u+="#"+b.getHash());if(this.spinner.spin(document.body,mxResources.get("inserting"))){var x=b.getData();x=0<x.length?this.editor.extractGraphModel(mxUtils.parseXml(x).documentElement,!0):null;var E=window.location.protocol+"//"+window.location.hostname+u,D=x,A=null;null!=x&&/\.svg$/i.test(b.getTitle())&& (A=this.createTemporaryGraph(this.editor.graph.getStylesheet()),document.body.appendChild(A.container),D=this.decodeNodeIntoGraph(D,A));b.setData(this.createFileData(x,A,b,E));null!=A&&A.container.parentNode.removeChild(A.container);var K=mxUtils.bind(this,function(){this.spinner.stop()}),H=mxUtils.bind(this,function(){K();var d=this.getCurrentFile();null==f&&null!=d&&(f=!d.isModified()&&null==d.getMode());var g=mxUtils.bind(this,function(){window.openFile=null;this.fileLoaded(b,null,l);f&&b.addAllSavedStatus(); null!=e&&this.sidebar.showEntries(e);if(null!=k){for(var q=[],t=k.split(";"),v=0;v<t.length;v++)q.push(decodeURIComponent(t[v]));this.loadLibraries(q)}}),n=mxUtils.bind(this,function(){f||null==d||!d.isModified()?g():this.confirm(mxResources.get("allChangesLost"),null,g,mxResources.get("cancel"),mxResources.get("discardChanges"))});null==f||f?(null!=c&&c(),n()):(b.constructor==LocalFile&&(window.openFile=new OpenFile(function(){window.openFile=null}),window.openFile.setData(b.getData(),b.getTitle(), null==b.getMode())),null!=c&&c(),window.openWindow(u,null,n))});b.constructor==LocalFile?H():b.saveFile(b.getTitle(),!1,mxUtils.bind(this,function(){H()}),mxUtils.bind(this,function(d){K();null!=d&&"AbortError"==d.name||this.handleError(d)}))}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m[z[J][T]];null!=W?""!=W&&O.push(W):O.push(z[J][T])}z[J]=O}};Graph.prototype.getCellsForAction=function(m,z){z=this.getCellsById(m.cells).concat(this.getCellsForTags(m.tags,null,z));if(null!=m.excludeCells){for(var J=[],O=0;O<z.length;O++)0>m.excludeCells.indexOf(z[O].id)&&J.push(z[O]);z=J}return z};Graph.prototype.getCellsById=function(m){var z=[];if(null!=m)for(var J=0;J<m.length;J++)if("*"==m[J]){var O=this.model.getRoot();z=z.concat(this.model.filterDescendants(function(W){return W!=O},O))}else{var T= this.model.getCell(m[J]);null!=T&&z.push(T)}return z};var R=Graph.prototype.isCellVisible;Graph.prototype.isCellVisible=function(m){return R.apply(this,arguments)&&!this.isAllTagsHidden(this.getTagsForCell(m))};Graph.prototype.setHiddenTags=function(m){this.hiddenTags=m;this.fireEvent(new mxEventObject("hiddenTagsChanged"))};Graph.prototype.toggleHiddenTag=function(m){var z=mxUtils.indexOf(this.hiddenTags,m);0>z?this.hiddenTags.push(m):0<=z&&this.hiddenTags.splice(z,1);this.fireEvent(new mxEventObject("hiddenTagsChanged"))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(H=d)}k?e(new TrelloLibrary(this.ui,H,D)):e(new TrelloFile(this.ui,H,D))}}),mxUtils.bind(this,function(H,d){window.clearTimeout(E);x&&(401==d.status?this.authenticate(l,f,!0):f())}),A||null!=D.mimeType&&"image/"==D.mimeType.substring(0,6),null,null,null,K))}}),mxUtils.bind(this,function(D){window.clearTimeout(E);x&&(null!=D&&401==D.status?this.authenticate(l,f,!0):f())}))});this.authenticate(l,f)};TrelloClient.prototype.insertLibrary=function(b,e,f,c,k){this.insertFile(b,e,f,c,!0,k)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Q.fillStyle=V;return Q};m.prototype.begin=function(){this.passThrough?this.originalBegin.apply(this.canvas,arguments):this.path=[]};m.prototype.end=function(){this.passThrough&&this.originalEnd.apply(this.canvas,arguments)};m.prototype.addOp=function(){if(null!=this.path&&(this.path.push(arguments[0]),2<arguments.length))for(var W=2;W<arguments.length;W+=2)this.lastX=arguments[W-1],this.lastY=arguments[W],this.path.push(this.canvas.format(this.lastX)),this.path.push(this.canvas.format(this.lastY))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var StorageDialog=function(b,e,f){function c(K,H,d,g,n,q){function t(){mxEvent.addListener(v,"click",null!=q?q:function(){d==App.MODE_GOOGLE&&b.spinner.spin(document.body,mxResources.get("authorizing"))?b.drive.checkToken(mxUtils.bind(this,function(){b.spinner.stop();b.setMode(d,!0);e()})):d==App.MODE_ONEDRIVE&&b.spinner.spin(document.body,mxResources.get("authorizing"))?b.oneDrive.checkToken(mxUtils.bind(this,function(){b.spinner.stop();b.setMode(d,!0);e()}),function(S){b.spinner.stop();b.handleError(S)}): (b.setMode(d,!0),e())})}x++;++u>f&&(mxUtils.br(E),u=1);var v=document.createElement("a");v.style.overflow="hidden";v.style.display="inline-block";v.className="geBaseButton";v.style.boxSizing="border-box";v.style.fontSize="11px";v.style.position="relative";v.style.margin="4px";v.style.marginTop="8px";v.style.marginBottom="0px";v.style.padding="8px 10px 8px 10px";v.style.width="88px";v.style.height="100px";v.style.whiteSpace="nowrap";v.setAttribute("title",H);var B=document.createElement("div");B.style.textOverflow=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d,g){mxSettings.setUi(d);(g=this.doSetCurrentTheme(d)||g)||this.alert(mxResources.get("restartForChangeRequired"))};EditorUi.prototype.isDefaultTheme=function(d){return""==d||"dark"==d||"default"==d||"kennedy"==d||null==d};EditorUi.prototype.doSetCurrentTheme=function(d,g,n){function q(I){return"simple"==I||0==g&&"sketch"==I}g=null!=g?g:150;var t=Editor.currentTheme,v=q(t)&&this.isDefaultTheme(d)||this.isDefaultTheme(t)&&q(d),B=v&&"sketch"!=d&&"sketch"!=t;if(v&&!this.themeSwitching){Editor.currentTheme=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(W,V,Q,X,Z,Y){this.passThrough?this.originalRoundrect.apply(this.canvas,arguments):(this.begin(),this.moveTo(W+Z,V),this.lineTo(W+Q-Z,V),this.quadTo(W+Q,V,W+Q,V+Y),this.lineTo(W+Q,V+X-Y),this.quadTo(W+Q,V+X,W+Q-Z,V+X),this.lineTo(W+Z,V+X),this.quadTo(W,V+X,W,V+X-Y),this.lineTo(W,V+Y),this.quadTo(W,V,W+Z,V))};m.prototype.drawPath=function(W){if(0<this.path.length){this.passThrough=!0;try{this.rc.path(this.path.join(" "),W)}catch(Q){}this.passThrough=!1}else if(null!=this.nextShape){for(var V in W)this.nextShape.options[V]= W[V];W.stroke!=mxConstants.NONE&&null!=W.stroke||delete this.nextShape.options.stroke;W.filled||delete this.nextShape.options.fill;this.passThrough=!0;this.rc.draw(this.nextShape);this.passThrough=!1}};m.prototype.stroke=function(){this.passThrough?this.originalStroke.apply(this.canvas,arguments):this.drawPath(this.getStyle(!0,!1))};m.prototype.fill=function(){this.passThrough?this.originalFill.apply(this.canvas,arguments):this.drawPath(this.getStyle(!1,!0))};m.prototype.fillAndStroke=function(){this.passThrough?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
B[pa.id][Ga],ka)}}if(null!=Ba)for(la=0;la<q.length;la++)for(pa=q[la],Ga=0;Ga<Ba.length;Ga++)I.setAttributeForCell(pa,mxUtils.trim(Ba[Ga]),null);if(0<v.length){var ma=new mxParallelEdgeLayout(I);ma.spacing=W;ma.checkOverlap=!0;var na=function(){0<ma.spacing&&ma.execute(I.getDefaultParent());for(var Da=0;Da<v.length;Da++){var va=I.getCellGeometry(v[Da]);va.x=Math.round(I.snap(va.x));va.y=Math.round(I.snap(va.y));"auto"==m&&(va.width=Math.round(I.snap(va.width)));"auto"==z&&(va.height=Math.round(I.snap(va.height)))}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=S?(c.resolveCrossReferences=S,S=null):(S=c.resolveCrossReferences,c.resolveCrossReferences=function(){var p=Date.now(),y=S.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.resolveCrossReferences",[this],"time",Date.now()-p+" ms","args",arguments);return y});EditorUi.debug("[Performance]",null!=t?"Enabled":"Disabled")}));this.put("testDevelop",new Menu(mxUtils.bind(this,function(p,y){this.addMenuItems(p,"createSidebarEntry showBoundingBox - testCheckPages testChecksum testFixPages - testCheckFile testDiff - testInspect testOptimize - testXmlImageExport -".split(" "),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
[];this.traverse(k,!0,mxUtils.bind(this,function(x,E){var D=null!=E&&this.isTreeEdge(E);D&&l.push(E);x==k||null!=E&&!D||l.push(x);return(null==E||D)&&(x==k||!this.model.isCollapsed(x))}));this.model.setCollapsed(k,c);for(var u=0;u<l.length;u++)this.model.setVisible(l[u],!c)}finally{this.model.endUpdate()}};Graph.prototype.isTreeEdge=function(c){return!this.isEdgeIgnored(c)};Graph.prototype.getTreeEdges=function(c,k,l,u,x,E){return this.model.filterCells(this.getEdges(c,k,l,u,x,E),mxUtils.bind(this, function(D){return this.isTreeEdge(D)}))};Graph.prototype.getIncomingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function c(M){return n.isVertex(M)&&l(M)}function k(M){var p=!1;null!=M&&(p="1"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.useCanvasForExport||".png"!=q||(q=".drawio"),".svg"===q||".xml"===q||".html"===q||".png"===q||".drawio"===q)&&(g=n+q)}d=new LocalFile(this,d,null!=urlParams.title?decodeURIComponent(urlParams.title):g,!0);d.getHash=function(){return b};this.fileLoaded(d,!0)?null!=c&&c():K()||this.handleError({message:mxResources.get("fileNotFound")},mxResources.get("errorLoadingFile"))}else K()||this.handleError({message:mxResources.get("fileNotFound")},mxResources.get("errorLoadingFile"))}),mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
[C],[L])):this.joinFile(!0)}catch(m){p=m,e.file.fireEvent(new mxEventObject("realtimeStateChanged")),EditorUi.debug("P2PCollab:","sendReply error",arguments,m)}});this.sendMessage=c;this.sendDiff=function(C){this.sendMessage("diff",{diff:C})};this.sendNotification=function(C){this.sendMessage("notify",{msg:C})};this.getState=function(){return null!=H?H.readyState:3};this.getLastError=function(){return p};this.mouseListeners={startX:0,startY:0,scrollLeft:0,scrollTop:0,mouseDown:function(C,L){},mouseMove:function(C,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(e,f){(new mxXmlRequest(this.redirectUri+"?getState=1",null,"GET")).send(mxUtils.bind(this,function(c){200<=c.getStatus()&&299>=c.getStatus()?this.authenticateStep2(c.getText(),e,f):null!=f&&f(c)}),f)};GitLabClient.prototype.authenticateStep2=function(e,f,c){if(null==window.onGitLabCallback){var k=mxUtils.bind(this,function(){var l=!0;null!=this.getPersistentToken(!0)?(new mxXmlRequest(this.redirectUri+"?state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host+"&token="+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D.length-1);0<D.length&&za(D[A]);if(1<D.length)for(C.removeAttribute("disabled"),C.style.display="",da=0;da<D.length;da++)ba=document.createElement("option"),sa=D[da].getAttribute("name")||mxResources.get("pageWithNumber",[da+1]),mxUtils.write(ba,sa),ba.setAttribute("title",sa+" ("+D[da].getAttribute("id")+")"),ba.setAttribute("value",da),da==A&&ba.setAttribute("selected","selected"),C.appendChild(ba);L=function(){try{var ea=parseInt(C.value);A=E=ea;za(D[ea])}catch(ha){C.value=E,b.handleError(ha)}}}else Ba(sa);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
q.model.getChildAt(g,F))};EditorUi.prototype.updatePageLink=function(d,g){if(Graph.isPageLink(g)){var n=d[g.substring(g.indexOf(",")+1)];g=null!=n?"data:page/id,"+n:null}else if("data:action/json,"==g.substring(0,17))try{var q=JSON.parse(g.substring(17));if(null!=q.actions){for(var t=0;t<q.actions.length;t++){var v=q.actions[t];if(null!=v.open&&Graph.isPageLink(v.open)){var B=v.open.substring(v.open.indexOf(",")+1);n=d[B];null!=n?v.open="data:page/id,"+n:null==this.getPageById(B)&&delete v.open}}g= "data:action/json,"+JSON.stringify(q)}}catch(F){}return g};EditorUi.prototype.isRemoteVisioFormat=function(d){return/(\.v(sd|dx))($|\?)/i.test(d)||/(\.vs(s|x))($|\?)/i.test(d)};EditorUi.prototype.importVisio=function(d,g,n,q,t){var v=mxUtils.bind(this,function(B){this.loadingExtensions=!1;null!=n?n(B):this.handleError(B)});this.createTimeout(null,mxUtils.bind(this,function(B){q=null!=q?q:d.name;var F=mxUtils.bind(this,function(G){B.clear()&&v(G)}),I=mxUtils.bind(this,function(){this.loadingExtensions=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxJsCanvas.prototype.image=function(b,e,f,c,k,l,u,x){k=this.rewriteImageSource(k);k=this.images[k];if(null!=k&&0<k.height&&0<k.width){var E=this.ctx;E.save();if(l){l=k.width;var D=k.height,A=Math.min(f/l,c/D);b+=(f-l*A)/2;e+=(c-D*A)/2;f=l*A;c=D*A}u&&(E.translate(2*b+f,0),E.scale(-1,1));x&&(E.translate(0,2*e+c),E.scale(1,-1));E.drawImage(k,b,e,f,c);E.restore()}};mxJsCanvas.prototype.begin=function(){this.ctx.beginPath()};mxJsCanvas.prototype.close=function(){this.ctx.closePath()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxAsyncCanvas.prototype.setFontFamily=function(b){this.state.fontFamily=b};mxAsyncCanvas.prototype.setFontStyle=function(b){this.state.fontStyle=b};mxAsyncCanvas.prototype.rect=function(b,e,f,c){};mxAsyncCanvas.prototype.roundrect=function(b,e,f,c,k,l){};mxAsyncCanvas.prototype.ellipse=function(b,e,f,c){};mxAsyncCanvas.prototype.rewriteImageSource=function(b){if("http://"==b.substring(0,7)||"https://"==b.substring(0,8))b="/proxy?url="+encodeURIComponent(b);return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
App.prototype.filterDrafts=function(b,e,f){function c(){f(k)}var k=[];try{this.getDatabaseItems(mxUtils.bind(this,function(l){EditorUi.debug("App.filterDrafts",[this],"items",l);for(var u=0;u<l.length;u++)try{var x=l[u].key;if(null!=x&&".draft_"==x.substring(0,7)){var E=JSON.parse(l[u].data);null!=E&&"draft"==E.type&&E.aliveCheck!=e&&(null==b&&null==E.fileObject||null!=E.fileObject&&E.fileObject.path==b)&&(E.key=x,k.push(E))}}catch(D){}c()}),c)}catch(l){c()}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
t.style.backgroundSize="100% 100%";t.style.display="inline-block";t.style.cursor="pointer";t.style.marginLeft="6px";t.style.width=q+"px";t.style.height=q+"px";null!=n&&(mxEvent.addListener(t,mxClient.IS_POINTER?"pointerdown":"mousedown",mxUtils.bind(this,function(v){v.preventDefault()})),mxEvent.addListener(t,"click",function(v){"disabled"!=t.getAttribute("disabled")&&n(v);mxEvent.consume(v)}));return t};EditorUi.prototype.createMenuItem=function(d,g,n){var q=this.actions.get(d),t=null!=q?q.funct: null,v=this.createToolbarButton(g,mxResources.get(d)+(null!=q&&null!=q.shortcut?" ("+q.shortcut+")":""),t);null==q||n||(d=function(){q.isEnabled()?(v.removeAttribute("disabled"),v.style.cursor="pointer"):(v.setAttribute("disabled","disabled"),v.style.cursor="default");v.style.opacity=q.isEnabled()?"":"0.2"},this.editor.graph.addListener("enabledChanged",d),q.addListener("stateChanged",d),d());return v};EditorUi.prototype.createFormatWindow=function(){if(null==this.formatWindow){var d=Math.max(10,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.isObjectEqual=function(b,e,f){if(null==b&&null==e)return!0;if(null!=b?null==e:null!=e)return!1;var c=function(k,l){return null==f||f[k]!=l?!0===l?1:l:void 0};return JSON.stringify(b,c)==JSON.stringify(e,c)};var mxSettings={currentVersion:18,defaultFormatWidth:600>screen.width?"0":"240",key:Editor.settingsKey,getLanguage:function(){return mxSettings.settings.language},setLanguage:function(b){mxSettings.settings.language=b},isMainSettings:function(){return".drawio-config"==mxSettings.key},getMainSettings:function(){var b=localStorage.getItem(".drawio-config");null==b?(b=mxSettings.getDefaults(),delete b.isNew):(b=JSON.parse(b),b.version=mxSettings.currentVersion);return b},getUi:function(){return mxSettings.isMainSettings()?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
J=[];if(0<T.length){T=T.split(" ");for(var W={},V=0;V<T.length;V++)if(null==z||null!=z[T[V]])W[T[V]]=!0,J.push(T[V]);z=W}else return[]}return J};Graph.prototype.getTagsForCells=function(m){for(var z=[],J={},O=0;O<m.length;O++){var T=this.getTagsForCell(m[O]);if(0<T.length){T=T.split(" ");for(var W=0;W<T.length;W++)null==J[T[W]]&&(J[T[W]]=!0,z.push(T[W]))}}return z};Graph.prototype.getTagsForCell=function(m){return this.getAttributeForCell(m,"tags","")};Graph.prototype.addTagsForCells=function(m,z){if(0<
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(M){if(g.isEnabled()&&1==g.getSelectionCount()){var p=g.getSelectionCell(),y=mxEvent.isControlDown(M)?null:g.getIncomingTreeEdges(p);M=[];if(null!=y&&0<y.length&&(y=g.getOutgoingTreeEdges(g.model.getTerminal(y[0],!0)),null!=y))for(var C=0;C<y.length;C++)M.push(g.model.getTerminal(y[C],!1));0==M.length&&(M=g.model.getChildren(g.model.getParent(p)));g.setSelectionCells(M)}},null,null,"Alt+Shift+S");var t=g.removeCells;g.removeCells=function(M,p){p=null!=p?p:!0;null==M&&(M=this.getDeletableCells(this.getSelectionCells())); p&&(M=this.getDeletableCells(this.addAllEdges(M)));for(var y=[],C=0;C<M.length;C++){var L=M[C];n.isEdge(L)&&l(L)&&(y.push(L),L=n.getTerminal(L,!1));if(c(L)){var m=[];g.traverse(L,!0,function(z,J){var O=null!=J&&g.isTreeEdge(J);O&&m.push(J);(null==J||O)&&m.push(z);return null==J||O});0<m.length&&(y=y.concat(m),L=g.getIncomingTreeEdges(M[C]),M=M.concat(L))}else null!=L&&y.push(M[C])}M=y;return t.apply(this,arguments)};d.hoverIcons.getStateAt=function(M,p,y){return c(M.cell)?null:this.graph.view.getState(this.graph.getCellAt(p,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.patchPages=function(b,e,f,c,k){var l={},u=[],x={},E={},D={},A={};if(null!=c&&null!=c[EditorUi.DIFF_UPDATE])for(var K in c[EditorUi.DIFF_UPDATE])l[K]=c[EditorUi.DIFF_UPDATE][K];if(null!=e[EditorUi.DIFF_REMOVE])for(c=0;c<e[EditorUi.DIFF_REMOVE].length;c++)E[e[EditorUi.DIFF_REMOVE][c]]=!0;if(null!=e[EditorUi.DIFF_INSERT])for(c=0;c<e[EditorUi.DIFF_INSERT].length;c++)x[e[EditorUi.DIFF_INSERT][c].previous]=e[EditorUi.DIFF_INSERT][c];if(null!=e[EditorUi.DIFF_UPDATE])for(K in e[EditorUi.DIFF_UPDATE])c= e[EditorUi.DIFF_UPDATE][K],null!=c.previous&&(A[c.previous]=K);if(null!=b){var H="";for(c=0;c<b.length;c++){var d=b[c].getId();D[d]=b[c];null!=A[H]||E[d]||null!=e[EditorUi.DIFF_UPDATE]&&null!=e[EditorUi.DIFF_UPDATE][d]&&null!=e[EditorUi.DIFF_UPDATE][d].previous||(A[H]=d);H=d}}var g={},n=mxUtils.bind(this,function(t){var v=null!=t?t.getId():"";if(null!=t&&!g[v]){g[v]=!0;u.push(t);var B=null!=e[EditorUi.DIFF_UPDATE]?e[EditorUi.DIFF_UPDATE][v]:null;null!=B&&(this.updatePageRoot(t),null!=B.name&&t.setName(B.name), null!=B.view&&this.patchViewState(t,B.view),null!=B.cells&&this.patchPage(t,B.cells,l[t.getId()],k),!f||null==B.cells&&null==B.view||(t.needsUpdate=!0))}t=A[v];null!=t&&(delete A[v],n(D[t]));t=x[v];null!=t&&(delete x[v],q(t))}),q=mxUtils.bind(this,function(t){t=mxUtils.parseXml(t.data).documentElement;t=new DiagramPage(t);this.updatePageRoot(t);var v=D[t.getId()];null==v?n(t):(this.patchPage(v,this.diffPages([v],[t]),l[v.getId()],k),f&&(v.needsUpdate=!0))});n();for(K in A)n(D[A[K]]),delete A[K];for(K in x)q(x[K]), delete x[K];return u};EditorUi.prototype.patchViewState=function(b,e){if(null!=b.viewState&&null!=e){b==this.currentPage&&(b.viewState=this.editor.graph.getViewState());for(var f in e)try{this.patchViewStateProperty(b,e,f)}catch(c){}b==this.currentPage&&this.editor.graph.setViewState(b.viewState,!0)}};EditorUi.prototype.patchViewStateProperty=function(b,e,f){b.viewState[f]=JSON.parse(e[f])};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
OneDriveFile.prototype.saveFile=function(b,e,f,c,k,l){if(!this.isEditable())null!=f&&f();else if(!this.savingFile)if(this.getTitle()==b){var u=mxUtils.bind(this,function(){try{this.savingFileTime=new Date;this.setShadowModified(!1);this.savingFile=!0;var x=l||this.constructor!=OneDriveFile||"manual"!=DrawioFile.SYNC&&"auto"!=DrawioFile.SYNC?null:this.getCurrentEtag(),E=this.meta;null!=this.sync&&this.sync.fileSaving();this.ui.oneDrive.saveFile(this,mxUtils.bind(this,function(D,A){this.setModified(this.getShadowModified()); this.savingFile=!1;this.meta=D;this.fileSaved(A,E,mxUtils.bind(this,function(){this.contentChanged();null!=f&&f()}),c)}),mxUtils.bind(this,function(D,A){try{this.savingFile=!1,this.isConflict(A)?(this.inConflictState=!0,null!=this.sync?(this.savingFile=!0,this.sync.fileConflict(null,mxUtils.bind(this,function(){window.setTimeout(mxUtils.bind(this,function(){this.updateFileData();u()}),100+500*Math.random())}),mxUtils.bind(this,function(){this.savingFile=!1;null!=c&&c()}))):null!=c&&c()):null!=c&& c(D)}catch(K){if(this.savingFile=!1,null!=c)c(K);else throw K;}}),x)}catch(D){if(this.savingFile=!1,null!=c)c(D);else throw D;}});u()}else this.savingFileTime=new Date,this.setShadowModified(!1),this.savingFile=!0,this.ui.oneDrive.insertFile(b,this.getData(),mxUtils.bind(this,function(x){this.setModified(this.getShadowModified());this.savingFile=!1;null!=f&&f();this.ui.fileLoaded(x)}),mxUtils.bind(this,function(){this.savingFile=!1;null!=c&&c()}))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
TrelloClient.prototype.getFile=function(b,e,f,c,k){k=null!=k?k:!1;var l=mxUtils.bind(this,function(){var u=b.split(this.SEPARATOR),x=!0,E=window.setTimeout(mxUtils.bind(this,function(){x=!1;f({code:App.ERROR_TIMEOUT,retry:l})}),this.ui.timeout);Trello.cards.get(u[0]+"/attachments/"+u[1],mxUtils.bind(this,function(D){window.clearTimeout(E);if(x){var A=/\.png$/i.test(D.name),K={Authorization:'OAuth oauth_consumer_key="'+Trello.key()+'", oauth_token="'+Trello.token()+'"'};/\.v(dx|sdx?)$/i.test(D.name)|| /\.gliffy$/i.test(D.name)||!this.ui.useCanvasForExport&&A?this.ui.convertFile(PROXY_URL+"?url="+encodeURIComponent(D.url),D.name,D.mimeType,this.extension,e,f,null,K):(x=!0,E=window.setTimeout(mxUtils.bind(this,function(){x=!1;f({code:App.ERROR_TIMEOUT})}),this.ui.timeout),this.ui.editor.loadUrl(PROXY_URL+"?url="+encodeURIComponent(D.url),mxUtils.bind(this,function(H){window.clearTimeout(E);if(x){D.compoundId=b;if(0<(A?H.lastIndexOf(","):-1)){var d=this.ui.extractGraphModelFromPng(H);null!=d&&0<d.length&& (H=d)}k?e(new TrelloLibrary(this.ui,H,D)):e(new TrelloFile(this.ui,H,D))}}),mxUtils.bind(this,function(H,d){window.clearTimeout(E);x&&(401==d.status?this.authenticate(l,f,!0):f())}),A||null!=D.mimeType&&"image/"==D.mimeType.substring(0,6),null,null,null,K))}}),mxUtils.bind(this,function(D){window.clearTimeout(E);x&&(null!=D&&401==D.status?this.authenticate(l,f,!0):f())}))});this.authenticate(l,f)};TrelloClient.prototype.insertLibrary=function(b,e,f,c,k){this.insertFile(b,e,f,c,!0,k)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxAsyncCanvas.prototype.text=function(b,e,f,c,k,l,u,x,E,D,A,K){if(null!=k&&0!=k.length&&(b=this.state.scale,"html"==E&&"function"===typeof html2canvas)){this.incWaitCounter();var H=this.canvasIndex++;html2canvas(k,{onrendered:mxUtils.bind(this,function(d){this.htmlCanvas.subCanvas[H]=d;this.decWaitCounter()}),scale:b,logging:!0})}};mxAsyncCanvas.prototype.finish=function(b){0==this.waitCounter?b():this.onComplete=b};function mxJsCanvas(b){mxAbstractCanvas2D.call(this);this.ctx=b.getContext("2d");this.ctx.textBaseline="top";this.ctx.fillStyle="rgba(255,255,255,0)";this.ctx.strokeStyle="rgba(0, 0, 0, 0)";this.M_RAD_PER_DEG=Math.PI/180;this.images=null==this.images?[]:this.images;this.subCanvas=null==this.subCanvas?[]:this.subCanvas}mxUtils.extend(mxJsCanvas,mxAbstractCanvas2D);mxJsCanvas.prototype.ctx=null;mxJsCanvas.prototype.waitCounter=0;mxJsCanvas.prototype.onComplete=null;mxJsCanvas.prototype.images=null;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k,u=0;8>u;u++)l=1==(l&1)?3988292384^l>>>1:l>>>1,Editor.crcTable[k]=l;Editor.updateCRC=function(m,z,J,O){for(var T=0;T<O;T++)m=Editor.crcTable[(m^z.charCodeAt(J+T))&255]^m>>>8;return m};Editor.crc32=function(m){for(var z=-1,J=0;J<m.length;J++)z=z>>>8^Editor.crcTable[(z^m.charCodeAt(J))&255];return(z^-1)>>>0};Editor.writeGraphModelToPng=function(m,z,J,O,T){function W(Y,aa){var ca=X;X+=aa;return Y.substring(ca,X)}function V(Y){Y=W(Y,4);return Y.charCodeAt(3)+(Y.charCodeAt(2)<<8)+(Y.charCodeAt(1)<<16)+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
StorageFile.listFiles=function(b,e,f,c){b.getDatabaseItems(function(k){var l=[];if(null!=k)for(var u=0;u<k.length;u++)"."==k[u].title.charAt(0)||null!=e&&k[u].type!=e||l.push(k[u]);f(l)},function(){null==b.database?f(StorageFile.listLocalStorageFiles(e)):null!=c&&c()},"filesInfo")};StorageFile.deleteFile=function(b,e,f,c){b.removeDatabaseItem([e,e],f,function(){null==b.database?(localStorage.removeItem(e),f()):null!=c&&c()},["files","filesInfo"])};StorageLibrary=function(b,e,f){StorageFile.call(this,b,e,f)};mxUtils.extend(StorageLibrary,StorageFile);StorageLibrary.prototype.type="L";StorageLibrary.prototype.isAutosave=function(){return!0};StorageLibrary.prototype.saveAs=function(b,e,f){this.saveFile(b,!1,e,f)};StorageLibrary.prototype.getHash=function(){return"L"+encodeURIComponent(this.title)};StorageLibrary.prototype.getTitle=function(){return".scratchpad"==this.title?mxResources.get("scratchpad"):this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DiagramFormatPanel.prototype.addOptions=function(m){m=K.apply(this,arguments);var z=this.editorUi,J=z.editor.graph;if(J.isEnabled()){var O=z.getCurrentFile();null!=O&&O.isAutosaveOptional()&&m.appendChild(this.createOption(mxResources.get("autosave"),function(){return z.editor.autosave},function(V){z.editor.setAutosave(V);z.editor.autosave&&O.isModified()&&O.fileChanged()},{install:function(V){this.listener=function(){V(z.editor.autosave)};z.editor.addListener("autosaveChanged",this.listener)},destroy:function(){z.editor.removeListener(this.listener)}}))}if(this.isMathOptionVisible()&& J.isEnabled()&&"undefined"!==typeof MathJax){var T=this.createOption(mxResources.get("mathematicalTypesetting"),function(){return J.mathEnabled},function(V){z.actions.get("mathematicalTypesetting").funct()},{install:function(V){this.listener=function(){V(J.mathEnabled)};z.addListener("mathEnabledChanged",this.listener)},destroy:function(){z.removeListener(this.listener)}});m.appendChild(T);var W=z.menus.createHelpLink("https://www.drawio.com/doc/faq/math-typesetting");W.style.position="relative"; W.style.marginLeft="6px";T.appendChild(W)}return m};mxCellRenderer.prototype.defaultVertexShape.prototype.customProperties=[{name:"arcSize",dispName:"Arc Size",type:"float",min:0,defVal:mxConstants.LINE_ARCSIZE},{name:"absoluteArcSize",dispName:"Abs. Arc Size",type:"bool",defVal:!1}];mxCellRenderer.defaultShapes.link.prototype.customProperties=[{name:"width",dispName:"Width",type:"float",min:0,defVal:4}];mxCellRenderer.defaultShapes.flexArrow.prototype.customProperties=[{name:"width",dispName:"Width",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments);this.enumerationState=0};var S=mxGraphView.prototype.stateValidated;mxGraphView.prototype.stateValidated=function(m){null!=m.shape&&this.redrawEnumerationState(m);return S.apply(this,arguments)};mxGraphView.prototype.createEnumerationValue=function(m){m=decodeURIComponent(mxUtils.getValue(m.style,"enumerateValue",""));""==m&&(m=++this.enumerationState);return'<div style="padding:2px;border:1px solid gray;background:yellow;border-radius:2px;">'+mxUtils.htmlEntities(m)+"</div>"};mxGraphView.prototype.redrawEnumerationState=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=f&&f();this.ui.fileLoaded(H)}),mxUtils.bind(this,function(){this.savingFile=!1;null!=c&&c()}),!1,K,E)}))});null!=u?x(u):this.peer.showCommitDialog(this.meta.name,null==this.getDescriptorEtag(this.meta)||this.meta.isNew,mxUtils.bind(this,function(E){x(E)}),c)}else null!=f&&f()};GitHubLibrary=function(b,e,f){GitHubFile.call(this,b,e,f)};mxUtils.extend(GitHubLibrary,GitHubFile);GitHubLibrary.prototype.doSave=function(b,e,f){this.saveFile(b,!1,e,f)};GitHubLibrary.prototype.open=function(){};(function(){var b=null;window.GitHubClient=function(e,f){DrawioClient.call(this,e,f||"ghauth")};mxUtils.extend(GitHubClient,DrawioClient);GitHubClient.prototype.clientId="test.draw.io"==window.location.hostname?"Iv1.1218f5567fbc258a":window.DRAWIO_GITHUB_ID;GitHubClient.prototype.extension=".drawio";GitHubClient.prototype.baseUrl=DRAWIO_GITHUB_API_URL;GitHubClient.prototype.baseHostUrl=DRAWIO_GITHUB_URL;GitHubClient.prototype.redirectUri=window.location.protocol+"//"+window.location.host+"/github2";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
M):U.y+U.height>M+P&&(U.height=M+P-U.y,U.y=Math.min(U.y,M+P));var p=(U.x-R)/N*100;N=100-(U.x+U.width-R)/N*100;R=(U.y-M)/P*100;U=100-(U.y+U.height-M)/P*100;return"inset("+mxUtils.format(R)+"% "+mxUtils.format(N)+"% "+mxUtils.format(U)+"% "+mxUtils.format(p)+"%"+(G?" round "+H+"%":S?" round 50%":"")+")"}function l(G){null!=A&&(!0!==G&&(A.model.setGeometry(d,K.clone()),H=5,B.value=H),A.model.setStyle(d,g+k()),A.selectAll(),v.style.visibility=q.checked?"visible":"hidden")}var u=document.createElement("div"),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f.setCellStyles(mxConstants.STYLE_ROTATION,Number(t.value),[e[B]])}}finally{f.getModel().endUpdate()}});v.className="geBtn gePrimaryBtn";mxEvent.addListener(k,"keypress",function(B){13==B.keyCode&&v.click()});l=document.createElement("div");l.style.marginTop="20px";l.style.textAlign="right";b.editor.cancelFirst?(l.appendChild(c),l.appendChild(v)):(l.appendChild(v),l.appendChild(c));k.appendChild(l);this.container=k},LibraryDialog=function(b,e,f,c,k,l){function u(S){for(S=document.elementFromPoint(S.clientX,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DriveClient.prototype.authorize=function(f,c,k,l,u){this.isExtAuth&&!f?window.parent.driveAuth(mxUtils.bind(this,function(x){this.updateAuthInfo(x,!0,!0,c,k)}),k):(new mxXmlRequest(this.redirectUri+"?getState=1",null,"GET")).send(mxUtils.bind(this,function(x){200<=x.getStatus()&&299>=x.getStatus()?this.authorizeStep2(x.getText(),f,c,k,l,u):null!=k&&k(x)}),k)};DriveClient.prototype.updateAuthInfo=function(f,c,k,l,u){b=f.access_token;delete f.access_token;f.expires=Date.now()+1E3*parseInt(f.expires_in); f.remember=c;this.resetTokenRefresh(f);this.authCalled=!0;if(k||null==this.user){var x=JSON.stringify(f);this.updateUser(mxUtils.bind(this,function(){var E=JSON.parse(x);this.setPersistentToken(E,!c);null!=l&&l()}),u)}else null!=l&&(this.setPersistentToken(f,!c),l())};DriveClient.prototype.authorizeStep2=function(f,c,k,l,u,x){try{null!=this.ui.stateArg&&null!=this.ui.stateArg.userId&&(this.userId=this.ui.stateArg.userId,null!=this.user&&this.user.id!=this.userId&&(this.user=null));if(null==this.userId){var E=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.createRoughCanvas=function(m){var z=rough.canvas({getContext:function(){return m}});z.draw=function(J){var O=J.sets||[];J=J.options||this.getDefaultOptions();for(var T=0;T<O.length;T++){var W=O[T];switch(W.type){case "path":null!=J.stroke&&this._drawToContext(m,W,J);break;case "fillPath":this._drawToContext(m,W,J);break;case "fillSketch":this.fillSketch(m,W,J)}}};z.fillSketch=function(J,O,T){var W=m.state.strokeColor,V=m.state.strokeWidth,Q=m.state.strokeAlpha,X=m.state.dashed,Z=T.fillWeight; 0>Z&&(Z=T.strokeWidth/2);m.setStrokeAlpha(m.state.fillAlpha);m.setStrokeColor(T.fill||"");m.setStrokeWidth(Z);m.setDashed(!1);this._drawToContext(J,O,T);m.setDashed(X);m.setStrokeWidth(V);m.setStrokeColor(W);m.setStrokeAlpha(Q)};z._drawToContext=function(J,O,T){J.begin();for(var W=0;W<O.ops.length;W++){var V=O.ops[W],Q=V.data;switch(V.op){case "move":J.moveTo(Q[0],Q[1]);break;case "bcurveTo":J.curveTo(Q[0],Q[1],Q[2],Q[3],Q[4],Q[5]);break;case "lineTo":J.lineTo(Q[0],Q[1])}}J.end();"fillPath"===O.type&& T.filled?J.fill():J.stroke()};return z};(function(){function m(W,V,Q){this.canvas=W;this.rc=V;this.shape=Q;this.canvas.setLineJoin("round");this.canvas.setLineCap("round");this.originalBegin=this.canvas.begin;this.canvas.begin=mxUtils.bind(this,m.prototype.begin);this.originalEnd=this.canvas.end;this.canvas.end=mxUtils.bind(this,m.prototype.end);this.originalRect=this.canvas.rect;this.canvas.rect=mxUtils.bind(this,m.prototype.rect);this.originalRoundrect=this.canvas.roundrect;this.canvas.roundrect=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.bind(this,function(){this.fireEvent(new mxEventObject("darkModeChanged"))}),mxUtils.bind(this,function(g){null!=window.console&&console.error(g);this.editor.setStatus(g.message)}))};EditorUi.prototype.createDarkStyle=function(){var d=document.createElement("link");d.setAttribute("rel","stylesheet");d.setAttribute("href",STYLE_PATH+"/dark.css");d.setAttribute("charset","UTF-8");d.setAttribute("type","text/css");return d};EditorUi.prototype.doSetDarkMode=function(d,g,n){var q=mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
t/I.view.scale);if(G.length<=MAX_REQUEST_SIZE&&U*N<MAX_AREA)if(d.hideDialog(),"png"!=n&&"jpg"!=n&&"jpeg"!=n||!d.isExportToCanvas()){var P={globalVars:I.getExportVariables()};F&&(P.grid={size:I.gridSize,steps:I.view.gridSteps,color:I.view.gridColor});d.saveRequest(g,n,function(R,M){return new mxXmlRequest(EXPORT_URL,"format="+n+"&base64="+(M||"0")+(null!=R?"&filename="+encodeURIComponent(R):"")+"&extras="+encodeURIComponent(JSON.stringify(P))+(0<B?"&dpi="+B:"")+"&bg="+(null!=q?q:"none")+"&w="+U+"&h="+ N+"&border="+v+"&xml="+encodeURIComponent(G))})}else"png"==n?d.exportImage(t,null==q||"none"==q,!0,!1,!1,v,!0,!1,null,F,B):d.exportImage(t,!1,!0,!1,!1,v,!0,!1,"jpeg",F);else mxUtils.alert(mxResources.get("drawingTooLarge"))}});EditorUi.prototype.getDiagramTextContent=function(){this.editor.graph.setEnabled(!1);var d=this.editor.graph,g="";if(null!=this.pages)for(var n=0;n<this.pages.length;n++){var q=d;this.currentPage!=this.pages[n]&&(q=this.createTemporaryGraph(d.getStylesheet()),this.updatePageRoot(this.pages[n]),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u.rev+"&chrome=0&nav=1&layers=1&edit=_blank"+(null!=x?"&page="+x:""))+window.location.hash})})})(c.entries[l]);b(k)}catch(u){e(u)}}));f["catch"](function(c){e(c)})};DropboxFile.prototype.getLatestVersion=function(b,e){this.ui.dropbox.getFile(this.getId(),b,e)};DropboxFile.prototype.updateDescriptor=function(b){this.stat=b.stat};DropboxFile.prototype.save=function(b,e,f,c,k){this.doSave(this.getTitle(),b,e,f,c,k)};DropboxFile.prototype.saveAs=function(b,e,f){this.doSave(b,!1,e,f)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
C,this.thumbImageCache)):C(m)});N?this.embedFonts(p,L):(this.editor.addFontCss(p),L(p))}catch(m){this.handleError(m)}};EditorUi.prototype.addRadiobox=function(d,g,n,q,t,v,B){return this.addCheckbox(d,n,q,t,v,B,!0,g)};EditorUi.prototype.addCheckbox=function(d,g,n,q,t,v,B,F){v=null!=v?v:!0;var I=document.createElement("input");I.style.marginRight="8px";I.style.marginTop="16px";I.setAttribute("type",B?"radio":"checkbox");B="geCheckbox-"+Editor.guid();I.id=B;null!=F&&I.setAttribute("name",F);n&&(I.setAttribute("checked", "checked"),I.defaultChecked=!0);q&&I.setAttribute("disabled","disabled");v&&(d.appendChild(I),n=document.createElement("label"),mxUtils.write(n,g),n.setAttribute("for",B),d.appendChild(n),t||mxUtils.br(d));return I};EditorUi.prototype.addEditButton=function(d,g){var n=this.addCheckbox(d,mxResources.get("edit")+":",!0,null,!0);n.style.marginLeft="24px";var q=this.getCurrentFile(),t="";null!=q&&q.getMode()!=App.MODE_DEVICE&&q.getMode()!=App.MODE_BROWSER&&(t=window.location.href);var v=document.createElement("select");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
else if(15E7<=f.length)k({message:mxResources.get("drawingTooLarge")+" ("+this.ui.formatFileSize(f.length)+" / 150 MB)"});else{l=null!=l?l:"";var u=mxUtils.bind(this,function(){return this.client.filesUpload({path:"/"+l+e,mode:{".tag":"overwrite"},mute:!0,contents:new Blob([f],{type:"text/plain"})})});this.executePromise(u,c,k)}};DropboxClient.prototype.pickLibrary=function(e){Dropbox.choose({linkType:"direct",cancel:mxUtils.bind(this,function(){}),success:mxUtils.bind(this,function(f){if(this.ui.spinner.spin(document.body, mxResources.get("loading"))){var c=mxUtils.bind(this,function(u){this.ui.spinner.stop();this.ui.handleError(u)}),k=f[0].link.indexOf(this.appPath);if(0<k){var l=decodeURIComponent(f[0].link.substring(k+this.appPath.length-1));this.readFile({path:l},mxUtils.bind(this,function(u,x){if(null!=x&&x.id==f[0].id)try{this.ui.spinner.stop(),e(l.substring(1),new DropboxLibrary(this.ui,u,x))}catch(E){this.ui.handleError(E)}else this.createLibrary(f[0],e,c)}),c)}else this.createLibrary(f[0],e,c)}})})};DropboxClient.prototype.createLibrary=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
v(c3&63);return r+=v(c4&63)}function v(F){if(10>F)return String.fromCharCode(48+F);F-=10;if(26>F)return String.fromCharCode(65+F);F-=26;if(26>F)return String.fromCharCode(97+F);F-=26;return 0==F?"-":1==F?"_":"?"}var B=new XMLHttpRequest;B.open("GET",("txt"==g?PLANT_URL+"/txt/":"png"==g?PLANT_URL+"/png/":PLANT_URL+"/svg/")+function(F){r="";for(i=0;i<F.length;i+=3)r=i+2==F.length?r+t(F.charCodeAt(i),F.charCodeAt(i+1),0):i+1==F.length?r+t(F.charCodeAt(i),0,0):r+t(F.charCodeAt(i),F.charCodeAt(i+1),F.charCodeAt(i+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
na.join(" ")}null!=ka?(O=ka,O.className+=" "+fa,T=ma,la.className="geTempDlgCreateBtn"):(T=O=null,la.className="geTempDlgCreateBtn geTempDlgBtnDisabled")}function F(ka,fa){if(null!=T){var ma=function(wa){ja.isExternal?E(ja,function(xa){na(xa,wa)},oa):ja.url?mxUtils.get(TEMPLATE_PATH+"/"+ja.url,mxUtils.bind(this,function(xa){200<=xa.getStatus()&&299>=xa.getStatus()?na(xa.getText(),wa):oa()})):na(b.emptyDiagramXml,wa)},na=function(wa,xa){g||b.hideDialog(!0);e(wa,xa,ja,fa)},oa=function(){n(mxResources.get("cannotLoad"));
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
App.prototype.exportFile=function(b,e,f,c,k,l){k==App.MODE_DROPBOX?null!=this.dropbox&&this.spinner.spin(document.body,mxResources.get("saving"))&&this.dropbox.insertFile(e,c?this.base64ToBlob(b,f):b,mxUtils.bind(this,function(){this.spinner.stop()}),mxUtils.bind(this,function(u){this.spinner.stop();this.handleError(u)})):k==App.MODE_GOOGLE?null!=this.drive&&this.spinner.spin(document.body,mxResources.get("saving"))&&this.drive.insertFile(e,b,l,mxUtils.bind(this,function(u){this.spinner.stop()}), mxUtils.bind(this,function(u){this.spinner.stop();this.handleError(u)}),f,c):k==App.MODE_ONEDRIVE?null!=this.oneDrive&&this.spinner.spin(document.body,mxResources.get("saving"))&&this.oneDrive.insertFile(e,c?this.base64ToBlob(b,f):b,mxUtils.bind(this,function(){this.spinner.stop()}),mxUtils.bind(this,function(u){this.spinner.stop();this.handleError(u)}),!1,l):k==App.MODE_GITHUB?null!=this.gitHub&&this.spinner.spin(document.body,mxResources.get("saving"))&&this.gitHub.insertFile(e,b,mxUtils.bind(this, function(){this.spinner.stop()}),mxUtils.bind(this,function(u){this.spinner.stop();this.handleError(u)}),!0,l,c):k==App.MODE_GITLAB?null!=this.gitHub&&this.spinner.spin(document.body,mxResources.get("saving"))&&this.gitLab.insertFile(e,b,mxUtils.bind(this,function(){this.spinner.stop()}),mxUtils.bind(this,function(u){this.spinner.stop();this.handleError(u)}),!0,l,c):k==App.MODE_TRELLO?null!=this.trello&&this.spinner.spin(document.body,mxResources.get("saving"))&&this.trello.insertFile(e,c?this.base64ToBlob(b, f):b,mxUtils.bind(this,function(){this.spinner.stop()}),mxUtils.bind(this,function(u){this.spinner.stop();this.handleError(u)}),!1,l):k==App.MODE_BROWSER&&(f=mxUtils.bind(this,function(){localStorage.setItem(e,b)}),null==localStorage.getItem(e)?f():this.confirm(mxResources.get("replaceIt",[e]),f))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){b.spinner.stop();c(null);b.showError(mxResources.get("error"),mxResources.get("fileNotFound"),mxResources.get("ok"))}):(b.hideDialog(),c(B,null,null,H,d,g)):(B=b.convertDataUri(B),F=null==F?120:F,I=null==I?100:I,b.hideDialog(),c(B,F,I,H,d,g))},q=function(B,F){if(null!=B){var I=k?null:D.getModel().getGeometry(D.getSelectionCell());null!=I?n(B,I.width,I.height,F):n(B,null,null,F)}else b.hideDialog(),c(null)};this.init=function(){K.focus();if(Graph.fileSupport){K.setAttribute("placeholder",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!1,!0)}finally{I.model.endUpdate()}}}catch(L){if(t)throw L;this.handleError(L)}return F};EditorUi.prototype.updatePageLinks=function(d,g){for(var n=0;n<g.length;n++)this.updatePageLinksForCell(d,g[n].root),null!=g[n].viewState&&this.updateBackgroundPageLink(d,g[n].viewState.backgroundImage)};EditorUi.prototype.updateBackgroundPageLink=function(d,g){try{if(null!=g&&Graph.isPageLink(g.originalSrc)){var n=d[g.originalSrc.substring(g.originalSrc.indexOf(",")+1)];null!=n&&(g.originalSrc="data:page/id,"+ n)}}catch(q){}};EditorUi.prototype.updatePageLinksForCell=function(d,g){var n=document.createElement("div"),q=this.editor.graph,t=q.getLinkForCell(g);null!=t&&q.setLinkForCell(g,this.updatePageLink(d,t));if(q.isHtmlLabel(g)){n.innerHTML=Graph.sanitizeHtml(q.getLabel(g));for(var v=n.getElementsByTagName("a"),B=!1,F=0;F<v.length;F++)t=v[F].getAttribute("href"),null!=t&&(v[F].setAttribute("href",this.updatePageLink(d,t)),B=!0);B&&q.labelChanged(g,n.innerHTML)}for(F=0;F<q.model.getChildCount(g);F++)this.updatePageLinksForCell(d,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(D){return this.isTreeEdge(D)}))};Graph.prototype.getIncomingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function c(M){return n.isVertex(M)&&l(M)}function k(M){var p=!1;null!=M&&(p="1"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.autosave=function(b,e,f,c){null==this.lastAutosave&&(this.lastAutosave=Date.now());b=Date.now()-this.lastAutosave<e?b:0;this.clearAutosave();var k=window.setTimeout(mxUtils.bind(this,function(){try{if(this.lastAutosave=null,this.autosaveThread==k&&(this.autosaveThread=null),EditorUi.debug("DrawioFile.autosave",[this],"thread",k,"modified",this.isModified(),"now",this.isAutosaveNow(),"saving",this.savingFile),this.isModified()&&this.isAutosaveNow()){var l=this.isAutosaveRevision(); l&&(this.lastAutosaveRevision=(new Date).getTime());this.save(l,mxUtils.bind(this,function(u){this.autosaveCompleted();null!=f&&f(u)}),mxUtils.bind(this,function(u){null!=c&&c(u)}))}else this.isModified()||this.ui.editor.setStatus(""),null!=f&&f(null)}catch(u){null!=c&&c(u)}}),b);EditorUi.debug("DrawioFile.autosave",[this],"thread",k,"delay",b,"saving",this.savingFile);this.autosaveThread=k};DrawioFile.prototype.isAutosaveNow=function(){return!0};DrawioFile.prototype.autosaveCompleted=function(){};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d.nodeName&&(B=d.hasAttribute("max-scale")?parseFloat(d.getAttribute("max-scale")):1);d=d.nextSibling}}finally{v.endUpdate()}null!=B&&this.chromelessResize&&this.chromelessResize(!0,B)}return n};EditorUi.prototype.getCopyFilename=function(d,g){var n=null!=d&&null!=d.getTitle()?d.getTitle():this.defaultFilename;d="";var q=n.lastIndexOf(".");0<=q&&(d=n.substring(q),n=n.substring(0,q));if(g){g=n;var t=new Date;n=t.getFullYear();q=t.getMonth()+1;var v=t.getDate(),B=t.getHours(),F=t.getMinutes();t=t.getSeconds(); n=g+(" "+(n+"-"+q+"-"+v+"-"+B+"-"+F+"-"+t))}return n=mxResources.get("copyOf",[n])+d};EditorUi.prototype.fileLoaded=function(d,g,n){var q=this.getCurrentFile();this.fileEditable=this.fileLoadedError=null;this.setCurrentFile(null);var t=!1;this.hideDialog();null!=q&&(EditorUi.debug("File.closed",[q]),q.removeListener(this.descriptorChangedListener),q.close());this.editor.graph.model.clear();this.editor.undoManager.clear();var v=mxUtils.bind(this,function(){this.setGraphEnabled(!1);this.setCurrentFile(null);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
return y});null!=I?(c.clonePages=I,I=null):(I=c.clonePages,c.clonePages=function(){var p=Date.now(),y=I.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.clonePages",[this],"time",Date.now()-p+" ms","args",arguments);return y});null!=G?(c.getHashValueForPages=G,G=null):(G=c.getHashValueForPages,c.getHashValueForPages=function(){var p=Date.now(),y=G.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.getHashValueForPages",[this],"time",Date.now()-p+" ms","args",arguments);return y});
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D&&D.close()}}else null!=D&&D.close()}):c({message:mxResources.get("serviceUnavailableOrBlocked"),retry:k})}),mxUtils.bind(this,function(){l&&(window.onDropboxCallback=null,l=!1,c({message:mxResources.get("accessDenied"),retry:k}))}))});k()}else c({code:App.ERROR_BUSY})};DropboxClient.prototype.executePromise=function(e,f,c){var k=mxUtils.bind(this,function(u){var x=!0,E=window.setTimeout(mxUtils.bind(this,function(){x=!1;c({code:App.ERROR_TIMEOUT,retry:l})}),this.ui.timeout),D=e();D.then(mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f=mxUtils.button(f,c);f.insertBefore(x,f.firstChild);f.style.marginTop="6px";f.className="geBigButton";f.style.fontSize="18px";f.style.padding="14px";k.appendChild(l);k.appendChild(b);k.appendChild(f);this.container=k},FontDialog=function(b,e,f,c,k){function l(B){this.style.border="";13==B.keyCode&&v.click()}var u=document.createElement("table"),x=document.createElement("tbody");u.style.marginTop="8px";var E=document.createElement("tr");var D=document.createElement("td");D.colSpan=2;D.style.whiteSpace=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments);D.style.backgroundColor=""};A.dblClick=function(){};var O=A.getSelectionModel().changeSelection;A.getSelectionModel().changeSelection=function(){O.call(this,[d],[d])}};E.onerror=function(){E.onload=null;E.src=Editor.errorImage};E.setAttribute("src",e);E.style.maxWidth="300px";E.style.maxHeight="300px";x.appendChild(E);u.appendChild(x);var D=document.createElement("div");D.style.width="300px";D.style.height="300px";D.style.overflow="hidden";D.style.backgroundColor="#fff9";u.appendChild(D);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.customFontElements={};Graph.recentCustomFonts={};Graph.isGoogleFontUrl=function(m){return m.substring(0,Editor.GOOGLE_FONTS.length)==Editor.GOOGLE_FONTS};Graph.isCssFontUrl=function(m){return Graph.isGoogleFontUrl(m)};Graph.createFontElement=function(m,z){var J=Graph.fontMapping[z];null==J&&Graph.isCssFontUrl(z)?(m=document.createElement("link"),m.setAttribute("rel","stylesheet"),m.setAttribute("type","text/css"),m.setAttribute("charset","UTF-8"),m.setAttribute("href",z)):(null==J&&(J='@font-face {\nfont-family: "'+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.getTextContent(z[J]);0>O.indexOf("mxPageSelector")&&0<O.indexOf("MathJax")&&m[0].appendChild(z[J].cloneNode(!0))}};Editor.prototype.addFontCss=function(m,z){z=null!=z?z:this.absoluteCssFonts(this.fontCss);if(null!=z){var J=m.getElementsByTagName("defs"),O=m.ownerDocument;0==J.length?(J=null!=O.createElementNS?O.createElementNS(mxConstants.NS_SVG,"defs"):O.createElement("defs"),null!=m.firstChild?m.insertBefore(J,m.firstChild):m.appendChild(J)):J=J[0];m=null!=O.createElementNS?O.createElementNS(mxConstants.NS_SVG, "style"):O.createElement("style");m.setAttribute("type","text/css");mxUtils.setTextContent(m,z);J.appendChild(m)}};Editor.prototype.isExportToCanvas=function(){return mxClient.IS_CHROMEAPP||this.useCanvasForExport};Editor.prototype.getMaxCanvasScale=function(m,z,J){var O=mxClient.IS_FF?8192:16384;return Math.min(J,Math.min(O/m,O/z))};Editor.prototype.exportToCanvas=function(m,z,J,O,T,W,V,Q,X,Z,Y,aa,ca,da,ba,sa,za,Ba){try{W=null!=W?W:!0;V=null!=V?V:!0;aa=null!=aa?aa:this.graph;ca=null!=ca?ca:0;var ea=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
M.readAsText(R)}else this.doImportVisio(R,g,F,q)}catch(p){F(p)}else try{""==P.responseType||"text"==P.responseType?F({message:P.responseText}):(M=new FileReader,M.onload=function(){try{F({message:JSON.parse(M.result).Message})}catch(p){F(p)}},M.readAsText(P.response))}catch(p){F({})}});P.send(G)}else if(B.clear())try{this.doImportVisio(d,g,F,q)}catch(R){F(R)}}else F({message:mxResources.get("serviceUnavailableOrBlocked")})});this.doImportVisio||this.loadingExtensions||this.isOffline(!0)?I():(this.loadingExtensions=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m);z[0].parentNode.appendChild(W)}}};Editor.prototype.csvToArray=function(m){if(0<m.length){var z="",J=[""],O=0,T=!0,W;m=$jscomp.makeIterator(m);for(W=m.next();!W.done;W=m.next())W=W.value,'"'===W?(T&&W===z&&(J[O]+=W),T=!T):","===W&&T?W=J[++O]="":J[O]+=W,z=W;return J}return[]};Editor.prototype.getProxiedUrl=function(m){if((/test\.draw\.io$/.test(window.location.hostname)||/app\.diagrams\.net$/.test(window.location.hostname))&&!this.isCorsEnabledForUrl(m)){var z=/(\.v(dx|sdx?))($|\?)/i.test(m)||/(\.vs(x|sx?))($|\?)/i.test(m); z=/\.png$/i.test(m)||/\.pdf$/i.test(m)||z;var J="t="+(new Date).getTime();m=PROXY_URL+"?url="+encodeURIComponent(m)+"&"+J+(z?"&base64=1":"")}return m};Editor.prototype.isCorsEnabledForUrl=function(m){if(mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||m.substring(0,window.location.origin.length)==window.location.origin)return!0;null!=urlParams.cors&&null==this.corsRegExp&&(this.corsRegExp=new RegExp(decodeURIComponent(urlParams.cors)));return null!=this.corsRegExp&&this.corsRegExp.test(m)||"https://raw.githubusercontent.com/"===
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Ga;var Ea=aa.gridSize*ra.gridSteps*Q,Qa=aa.getGraphBounds(),Ha=ra.translate.x*ua,Ra=ra.translate.y*ua,Ia=Ha+(Qa.x-Ha)/ua-ca,Va=Ra+(Qa.y-Ra)/ua-ca,Ua=new Image;Ua.onload=function(){try{for(var ka=-Math.round(Ea-mxUtils.mod((Ha-Ia)*Q,Ea)),fa=-Math.round(Ea-mxUtils.mod((Ra-Va)*Q,Ea));ka<ta;ka+=Ea)for(var ma=fa;ma<Fa;ma+=Ea)pa.drawImage(Ua,ka/Q,ma/Q);ya()}catch(na){null!=T&&T(na)}};Ua.onerror=function(ka){null!=T&&T(ka)};Ua.src=Ga}else ya()}catch(ka){null!=T&&T(ka)}});qa.onerror=function(ya){null!=T&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(D){return this.isTreeEdge(D)}))};Graph.prototype.getIncomingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(c,k){return this.getTreeEdges(c,k,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function c(M){return n.isVertex(M)&&l(M)}function k(M){var p=!1;null!=M&&(p="1"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){var m=this.editorUi.getSelectionState();null!=this.defaultColorSchemes&&0<this.defaultColorSchemes.length&&"image"!=m.style.shape&&!m.containsLabel&&0<m.cells.length&&this.container.appendChild(this.addStyles(this.createPanel()));H.apply(this,arguments);if(Editor.enableCustomProperties){for(var z={},J=m.vertices,O=m.edges,T=0;T<J.length;T++)this.findCommonProperties(J[T],z,0==T);for(T=0;T<O.length;T++)this.findCommonProperties(O[T],z,0==J.length&&0==T);null!=Object.getOwnPropertyNames&& 0<Object.getOwnPropertyNames(z).length&&this.container.appendChild(this.addProperties(this.createPanel(),z,m))}};var d=StyleFormatPanel.prototype.addStyleOps;StyleFormatPanel.prototype.addStyleOps=function(m){var z=this.editorUi.getSelectionState();1==z.cells.length?this.addActions(m,["copyStyle","pasteStyle"]):1<=z.cells.length&&this.addActions(m,["pasteStyle","pasteData"]);return d.apply(this,arguments)};EditorUi.prototype.propertiesCollapsed=!0;StyleFormatPanel.prototype.addProperties=function(m,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
TrelloClient.prototype.saveFile=function(b,e,f){var c=b.meta.compoundId.split(this.SEPARATOR),k=mxUtils.bind(this,function(u){this.writeFile(b.meta.name,u,c[0],function(x){Trello.del("cards/"+c[0]+"/attachments/"+c[1],mxUtils.bind(this,function(){e(x)}),mxUtils.bind(this,function(E){null!=E&&401==E.status?this.authenticate(l,f,!0):f()}))},f)}),l=mxUtils.bind(this,function(){this.ui.useCanvasForExport&&/(\.png)$/i.test(b.meta.name)?this.ui.getEmbeddedPng(mxUtils.bind(this,function(u){k(this.ui.base64ToBlob(u, "image/png"))}),f,this.ui.getCurrentFile()!=b?b.getData():null):k(b.getData())});this.authenticate(l,f)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.onMathJaxDone=function(){};var T=Editor.prototype.init;Editor.prototype.init=function(){T.apply(this,arguments);var V=mxUtils.bind(this,function(Q,X){null!=this.graph.container&&this.graph.mathEnabled&&Editor.MathJaxRender(this.graph.container)});this.graph.model.addListener(mxEvent.CHANGE,V);this.graph.addListener(mxEvent.REFRESH,V)};z=document.getElementsByTagName("script");if(null!=z&&0<z.length){var W=document.createElement("script");W.setAttribute("type","text/javascript");W.setAttribute("src",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
360,null!=d.pages&&1<d.pages.length?470:390,!0,!0)};this.defaultFilename=mxResources.get("untitledDiagram");var S=g.getExportVariables;g.getExportVariables=function(){var C=S.apply(this,arguments),L=d.getCurrentFile();null!=L&&(C.filename=L.getTitle());C.pagecount=null!=d.pages?d.pages.length:1;C.page=null!=d.currentPage?d.currentPage.getName():"";C.pagenumber=null!=d.pages&&null!=d.currentPage?mxUtils.indexOf(d.pages,d.currentPage)+1:1;return C};var U=g.getGlobalVariable;g.getGlobalVariable=function(C){var L= d.getCurrentFile();return"filename"==C&&null!=L?L.getTitle():"page"==C&&null!=d.currentPage?d.currentPage.getName():"pagenumber"==C?null!=d.currentPage&&null!=d.pages?mxUtils.indexOf(d.pages,d.currentPage)+1:1:"pagecount"==C?null!=d.pages?d.pages.length:1:U.apply(this,arguments)};var N=null,P=null;this.addListener("fileDescriptorChanged",mxUtils.bind(this,function(){var C=this.getCurrentFile(),L=null!=C&&null!=C.getTitle()?C.getTitle():this.defaultFilename;N!=L&&C==P&&(g.invalidateDescendantsWithPlaceholders(g.model.getRoot()),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e||""===e)return!1;for(var f=0;f<this.invalidFilenameRegExs.length;f++)if(this.invalidFilenameRegExs[f].test(e))return!1;return!0};OneDriveClient.prototype.get=function(e,f,c){e=new mxXmlRequest(e,null,"GET");e.setRequestHeaders=mxUtils.bind(this,function(k,l){k.setRequestHeader("Authorization","Bearer "+b)});e.send(f,c);return e};OneDriveClient.prototype.updateUser=function(e,f,c){var k=!0,l=window.setTimeout(mxUtils.bind(this,function(){k=!1;f({code:App.ERROR_TIMEOUT})}),this.ui.timeout);this.get(this.baseUrl+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m?m.getElementsByTagName("parsererror"):null;null!=m&&0<m.length&&(J=z||mxResources.get("invalidChars"),z=m[0].getElementsByTagName("div"),0<z.length&&(J=mxUtils.getTextContent(z[0])));return null!=J?mxUtils.trim(J):J};Editor.addRetryToError=function(m,z){null!=m&&(m=null!=m.error?m.error:m,null==m.retry&&(m.retry=z))};Editor.mermaidToDrawio=function(m,z,J){if("function"===typeof mxMermaidToDrawio)return mxMermaidToDrawio(m,z,J)};Editor.configure=function(m){if(null!=m){Editor.config=m;Editor.configVersion=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
38==M.keyCode?(H(p,mxConstants.DIRECTION_NORTH),mxEvent.consume(M)):39==M.keyCode?(H(p,mxConstants.DIRECTION_EAST),mxEvent.consume(M)):40==M.keyCode&&(H(p,mxConstants.DIRECTION_SOUTH),mxEvent.consume(M)))}}catch(C){d.handleError(C)}mxEvent.isConsumed(M)||G.apply(this,arguments)};var S=g.connectVertex;g.connectVertex=function(M,p,y,C,L,m,z){var J=g.getIncomingTreeEdges(M);if(c(M)){var O=x(M),T=O==mxConstants.DIRECTION_EAST||O==mxConstants.DIRECTION_WEST,W=p==mxConstants.DIRECTION_EAST||p==mxConstants.DIRECTION_WEST; return O==p||0==J.length?A(M,p):T==W?D(M):E(M,p!=mxConstants.DIRECTION_NORTH&&p!=mxConstants.DIRECTION_WEST)}return S.apply(this,arguments)};g.getSubtree=function(M){var p=[M];!k(M)&&!c(M)||u(M)||g.traverse(M,!0,function(y,C){var L=null!=C&&g.isTreeEdge(C);L&&0>mxUtils.indexOf(p,C)&&p.push(C);(null==C||L)&&0>mxUtils.indexOf(p,y)&&p.push(y);return null==C||L});return p};var U=mxVertexHandler.prototype.init;mxVertexHandler.prototype.init=function(){U.apply(this,arguments);(k(this.state.cell)||c(this.state.cell))&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var X=this.fill,Z=this.stroke;this.stroke=this.fill=null;var Y=this.configurePointerEvents,aa=W.setStrokeColor;W.setStrokeColor=function(){};var ca=W.setFillColor;W.setFillColor=function(){};Q||null==X||(this.configurePointerEvents=function(){});W.handJiggle.passThrough=!0;O.apply(this,arguments);W.handJiggle.passThrough=!1;W.setFillColor=ca;W.setStrokeColor=aa;this.configurePointerEvents=Y;this.stroke=Z;this.fill=X;W.restore();Q&&null!=X&&(W.addTolerance=function(){})}O.apply(this,arguments);W.addTolerance=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.reloadFile=function(b,e){try{this.ui.spinner.stop();var f=mxUtils.bind(this,function(){EditorUi.debug("DrawioFile.reloadFile",[this],"hash",this.getHash(),"modified",this.isModified(),"backupPatch",this.backupPatch);this.stats.fileReloaded++;if(""==this.getHash())this.mergeLatestVersion(null!=this.backupPatch?[this.backupPatch]:null,mxUtils.bind(this,function(){this.backupPatch=null;null!=b&&b()}),e);else{var c=this.ui.editor.graph,k=c.getSelectionCells(),l=c.getViewState(),u= this.ui.currentPage;this.ui.loadFile(this.getHash(),!0,null,mxUtils.bind(this,function(){if(null==this.ui.fileLoadedError){this.ui.restoreViewState(u,l,k);null!=this.backupPatch&&this.patch([this.backupPatch]);var x=this.ui.getCurrentFile();null!=x&&(x.stats=this.stats);null!=b&&b()}}),!0)}});this.isModified()&&null==this.backupPatch?this.ui.confirm(mxResources.get("allChangesLost"),mxUtils.bind(this,function(){this.handleFileSuccess("manual"==DrawioFile.SYNC)}),f,mxResources.get("cancel"),mxResources.get("discardChanges")): f()}catch(c){null!=e&&e(c)}};DrawioFile.prototype.mergeLatestVersion=function(b,e,f){this.getLatestVersion(mxUtils.bind(this,function(c){this.ui.editor.graph.model.beginUpdate();try{this.ui.replaceFileData(c.getData()),null!=b&&this.patch(b)}finally{this.ui.editor.graph.model.endUpdate()}this.inConflictState=this.invalidChecksum=!1;this.setDescriptor(c.getDescriptor());this.descriptorChanged();null!=e&&e()}),f)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
App.prototype.save=function(b,e){var f=this.getCurrentFile();if(null!=f&&this.spinner.spin(document.body,mxResources.get("saving"))){var c=mxUtils.bind(this,function(k){this.handleError(k)});this.createTimeout(3*this.timeout,mxUtils.bind(this,function(k){this.editor.setStatus("");this.editor.graph.isEditing()&&this.editor.graph.stopEditing();var l=mxUtils.bind(this,function(){k.clear()&&(f.handleFileSuccess(!0),null!=e&&e())}),u=mxUtils.bind(this,function(x){k.clear()&&(f.isModified()&&Editor.addRetryToError(x, mxUtils.bind(this,function(){this.save(b,e)})),f.handleFileError(x,null==x||"AbortError"!=x.name))});try{b==f.getTitle()?f.save(!0,l,u):f.saveAs(b,l,u)}catch(x){u(x)}}),c)}};App.prototype.getExtensionForService=function(b){b=this.getServiceForName(b);return null!=b?b.extension:".drawio"};App.prototype.getServiceForName=function(b){return b==App.MODE_GOOGLE?this.drive:b==App.MODE_ONEDRIVE?this.oneDrive:b==App.MODE_GITHUB?this.gitHub:b==App.MODE_GITLAB?this.gitLab:b==App.MODE_TRELLO?this.trello:null};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
L,m,z,J){l=mxEvent.isAltDown(n)?l:v.getCenterInsertPoint(new mxRectangle(0,0,z,J));var O=null;v.getModel().beginUpdate();try{O="txt"==L?b.insertAsPreText(m,l.x,l.y):v.insertVertex(null,null,null,l.x,l.y,z,J,"shape=image;noLabel=1;verticalAlign=top;aspect=fixed;imageAspect=0;image="+b.convertDataUri(m)+";"),v.setAttributeForCell(O,"plantUmlData",JSON.stringify({data:C,format:L},null,2))}finally{v.getModel().endUpdate()}null!=O&&(v.setSelectionCell(O),v.scrollCellToVisible(O))},v=b.editor.graph,B="plantUmlTxt"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
n)});F()};GitHubClient.prototype.logout=function(){this.clearPersistentToken();this.setUser(null);b=null}})();TrelloFile=function(b,e,f){DrawioFile.call(this,b,e);this.meta=f;this.saveNeededCounter=0};mxUtils.extend(TrelloFile,DrawioFile);TrelloFile.prototype.getHash=function(){return"T"+encodeURIComponent(this.meta.compoundId)};TrelloFile.prototype.getMode=function(){return App.MODE_TRELLO};TrelloFile.prototype.isAutosave=function(){return!0};TrelloFile.prototype.getTitle=function(){return this.meta.name};TrelloFile.prototype.isRenamable=function(){return!1};TrelloFile.prototype.getSize=function(){return this.meta.bytes};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){window.clearTimeout(O);J&&z(Editor.svgBrokenImage.src)});else{var T=new Image;this.crossOriginImages&&(T.crossOrigin="anonymous");T.onload=function(){window.clearTimeout(O);if(J)try{var W=document.createElement("canvas"),V=W.getContext("2d");W.height=T.height;W.width=T.width;V.drawImage(T,0,0);z(W.toDataURL())}catch(Q){z(Editor.svgBrokenImage.src)}};T.onerror=function(){window.clearTimeout(O);J&&z(Editor.svgBrokenImage.src)};T.src=m}}catch(W){z(Editor.svgBrokenImage.src)}};Editor.prototype.convertImages=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DriveFile.prototype.getComments=function(b,e){function f(k,l,u){if(l.deleted)return null;u=new DriveComment(k,l.commentId||l.replyId,l.content,l.modifiedDate,l.createdDate,"resolved"==l.status,l.author.isAuthenticatedUser?c:new DrawioUser(l.author.permissionId,l.author.emailAddress,l.author.displayName,l.author.picture.url),u);for(var x=0;null!=l.replies&&x<l.replies.length;x++)u.addReplyDirect(f(k,l.replies[x],l.commentId));return u}var c=this.ui.getCurrentUser();this.ui.drive.executeRequest({url:"/files/"+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
return this.editor.embedExtFonts(d)};EditorUi.prototype.exportToCanvas=function(d,g,n,q,t,v,B,F,I,G,S,U,N,P,R,M){EditorUi.logEvent("SHOULD NOT BE CALLED: exportToCanvas");return this.editor.exportToCanvas(d,g,n,q,t,v,B,F,I,G,S,U,N,P,R,M)};EditorUi.prototype.createImageUrlConverter=function(){EditorUi.logEvent("SHOULD NOT BE CALLED: createImageUrlConverter");return this.editor.createImageUrlConverter()};EditorUi.prototype.convertImages=function(d,g,n,q){EditorUi.logEvent("SHOULD NOT BE CALLED: convertImages");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f?A=new mxHierarchicalLayout(l,mxConstants.DIRECTION_WEST):"circle"==f?A=new mxCircleLayout(l):(A=new mxFastOrganicLayout(l,!1),A.forceConstant=80);if(null!=A){var K=function(n,q){l.getModel().beginUpdate();try{null!=n&&n(),A.execute(l.getDefaultParent(),D)}catch(t){throw t;}finally{n=new mxMorphing(l),n.addListener(mxEvent.DONE,mxUtils.bind(this,function(){l.getModel().endUpdate();null!=q&&q()})),n.startAnimation()}},H=mxEdgeHandler.prototype.connect;mxEdgeHandler.prototype.connect=function(n,q,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
parentRow:Qa,isDeletable:!0,flipBkg:Ha}));btn=mxUtils.button("+",mxUtils.bind(Y,function(Ra){for(var Ia=Qa,Va=0;null!=Ia.nextSibling;)if(Ia.nextSibling.getAttribute("data-pName")==pa)Ia=Ia.nextSibling,Va++;else break;var Ua={type:ua,parentRow:Qa,index:Va,isDeletable:!0,defVal:Ga,countProperty:Ea};Va=Z(pa,"",Ua,0==Va%2,Ha);O(pa,Ga,Ua);Ia.parentNode.insertBefore(Va,Ia.nextSibling);mxEvent.consume(Ra)}));btn.style.height="16px";btn.style.width="25px";btn.className="geColorBtn";return btn}function Q(pa, ra,ua,Ga,Ea,Qa,Ha){if(0<Ea){var Ra=Array(Ea);ra=null!=ra?ra.split(","):[];for(var Ia=0;Ia<Ea;Ia++)Ra[Ia]=null!=ra[Ia]?ra[Ia]:null!=Ga?Ga:"";ca.push({name:pa,values:Ra,type:ua,defVal:Ga,parentRow:Qa,flipBkg:Ha,size:Ea})}return document.createElement("div")}function X(pa,ra,ua){var Ga=document.createElement("input");Ga.type="checkbox";Ga.checked="1"==ra;mxEvent.addListener(Ga,"change",function(){O(pa,Ga.checked?"1":"0",ua)});return Ga}function Z(pa,ra,ua,Ga,Ea){var Qa=ua.dispName,Ha=ua.type,Ra=document.createElement("tr");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0,A.width,A.height),e.style+";rotatable=0;resizable=0;connectable=0;editable=0;movable=0;");H.vertex=!0;K.addCell(H);K.dblClick=function(R,M){if(null!=M&&M!=H)K.setSelectionCell(M);else{M=mxUtils.convertPoint(K.container,mxEvent.getClientX(R),mxEvent.getClientY(R));mxEvent.consume(R);R=K.view.scale;var p=K.view.translate;K.setSelectionCell(l((M.x-3*R)/R-p.x,(M.y-3*R)/R-p.y))}};k=new mxKeyHandler(K);k.bindKey(46,u);k.bindKey(8,u);K.getRubberband().isForceRubberbandEvent=function(R){return 0==R.evt.button&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"-rev_"+this.ui.hashValue(x):"")+(null!=t?"-latest_"+t:"")+(null!=n?"-latestRev_"+this.ui.hashValue(n.getCurrentRevisionId()):""));EditorUi.logEvent({category:"CHECKSUM-ERROR-SYNC-FILE-"+H,action:k,label:"user_"+K+(null!=this.sync?"-client_"+this.sync.clientId:"-nosync")+"-bytes_"+d+"-patches_"+e.length+"-size_"+this.getSize()})}catch(v){}}),b)}}catch(n){}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
console.log("Error in MathJax.typeset: "+Q.toString())}};window.MathJax=null!=z?z:{options:{skipHtmlTags:{"[+]":["text"]}},loader:{load:["html"==urlParams["math-output"]?"output/chtml":"output/svg","input/tex","input/asciimath","ui/safe"]},startup:{pageReady:function(){for(var V=0;V<Editor.mathJaxQueue.length;V++)Editor.doMathJaxRender(Editor.mathJaxQueue[V])}}};Editor.MathJaxRender=function(V){"undefined"!==typeof MathJax&&"function"===typeof MathJax.typeset?Editor.doMathJaxRender(V):Editor.mathJaxQueue.push(V)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null,f):mxUtils.bind(this,function(){OneDrive.open({clientId:this.clientId,action:"query",multiSelect:!1,advanced:{endpointHint:mxClient.IS_IE11?null:this.endpointHint,redirectUri:this.pickerRedirectUri,queryParameters:"select=id,name,parentReference,webUrl",accessToken:b,isConsumerAccount:!1},success:mxUtils.bind(this,function(l){null!=l&&null!=l.value&&0<l.value.length&&(mxClient.IS_IE11&&(b=l.accessToken),e(OneDriveFile.prototype.getIdOf(l.value[0]),l))}),cancel:mxUtils.bind(this,function(){}),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0,260,200);this.window.destroyOnClose=!1;this.window.setMaximizable(!1);this.window.setResizable(!0);this.window.setClosable(!0);this.window.setVisible(!0);this.window.addListener(mxEvent.SHOW,mxUtils.bind(this,function(){this.window.fit()}));b.installResizeHandler(this,!0)},ConfirmDialog=function(b,e,f,c,k,l,u,x,E,D,A){var K=document.createElement("div");K.style.textAlign="center";A=null!=A?A:44;var H=document.createElement("div");H.style.padding="6px";H.style.overflow="auto";H.style.maxHeight=A+ "px";H.style.lineHeight="1.2em";mxUtils.write(H,e);K.appendChild(H);null!=D&&(H=document.createElement("div"),H.style.padding="6px 0 6px 0",e=document.createElement("img"),e.setAttribute("src",D),H.appendChild(e),K.appendChild(H));D=document.createElement("div");D.style.textAlign="center";D.style.whiteSpace="nowrap";var d=document.createElement("input");d.setAttribute("type","checkbox");l=mxUtils.button(l||mxResources.get("cancel"),function(){b.hideDialog();null!=c&&c(d.checked)});l.className="geBtn"; null!=x&&(l.innerHTML=x+"<br>"+l.innerHTML,l.style.paddingBottom="8px",l.style.paddingTop="8px",l.style.height="auto",l.style.width="40%");b.editor.cancelFirst&&D.appendChild(l);var g=mxUtils.button(k||mxResources.get("ok"),function(){b.hideDialog();null!=f&&f(d.checked)});D.appendChild(g);null!=u?(g.innerHTML=u+"<br>"+g.innerHTML+"<br>",g.style.paddingBottom="8px",g.style.paddingTop="8px",g.style.height="auto",g.className="geBtn",g.style.width="40%"):g.className="geBtn gePrimaryBtn";b.editor.cancelFirst|| D.appendChild(l);K.appendChild(D);E?(D.style.marginTop="10px",H=document.createElement("p"),H.style.marginTop="20px",H.style.marginBottom="0px",H.appendChild(d),k=document.createElement("span"),mxUtils.write(k," "+mxResources.get("rememberThisSetting")),H.appendChild(k),K.appendChild(H),mxEvent.addListener(k,"click",function(n){d.checked=!d.checked;mxEvent.consume(n)})):D.style.marginTop="12px";this.init=function(){g.focus()};this.container=K},HeadlessEditorUi=function(){EditorUi.call(this,new Editor(!0),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
return S}),G=!0);return G};var B=t.stop;t.stop=function(){B.call(this);this.active=!1;null!=t.status&&null!=t.status.parentNode&&t.status.parentNode.removeChild(t.status);t.status=null};t.pause=function(){return function(){}};return t};EditorUi.prototype.isCompatibleString=function(d){try{var g=mxUtils.parseXml(d),n=this.editor.extractGraphModel(g.documentElement,!0);return null!=n&&0==n.getElementsByTagName("parsererror").length}catch(q){}return!1};EditorUi.prototype.isVisioData=function(d){return 8<
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
StorageFile.listFiles=function(b,e,f,c){b.getDatabaseItems(function(k){var l=[];if(null!=k)for(var u=0;u<k.length;u++)"."==k[u].title.charAt(0)||null!=e&&k[u].type!=e||l.push(k[u]);f(l)},function(){null==b.database?f(StorageFile.listLocalStorageFiles(e)):null!=c&&c()},"filesInfo")};StorageFile.deleteFile=function(b,e,f,c){b.removeDatabaseItem([e,e],f,function(){null==b.database?(localStorage.removeItem(e),f()):null!=c&&c()},["files","filesInfo"])};StorageLibrary=function(b,e,f){StorageFile.call(this,b,e,f)};mxUtils.extend(StorageLibrary,StorageFile);StorageLibrary.prototype.type="L";StorageLibrary.prototype.isAutosave=function(){return!0};StorageLibrary.prototype.saveAs=function(b,e,f){this.saveFile(b,!1,e,f)};StorageLibrary.prototype.getHash=function(){return"L"+encodeURIComponent(this.title)};StorageLibrary.prototype.getTitle=function(){return".scratchpad"==this.title?mxResources.get("scratchpad"):this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DriveComment.prototype.deleteComment=function(b,e){this.file.ui.drive.executeRequest(this.pCommentId?{url:"/files/"+this.file.getId()+"/comments/"+this.pCommentId+"/replies/"+this.id,method:"DELETE"}:{url:"/files/"+this.file.getId()+"/comments/"+this.id,method:"DELETE"},b,e)};function mxODPicker(b,e,f,c,k,l,u,x,E,D,A,K,H,d){function g(V,Q){Q=Q||document;return Q.querySelector(V)}function n(V,Q,X){if(null==V["@microsoft.graph.downloadUrl"])if(null==V.parentReference)X();else{c(V.id,V.parentReference.driveId,function(aa){n(aa,Q,X)},X);return}var Z=new XMLHttpRequest;Z.open("GET",V["@microsoft.graph.downloadUrl"]);var Y=V.file?"image/png"==V.file.mimeType:!1;Z.onreadystatechange=function(){if(4==this.readyState){if(200<=this.status&&299>=this.status)try{var aa=Z.responseText; Y&&(aa="data:image/png;base64,"+Editor.base64Encode(aa),aa=Editor.extractGraphModelFromPng(aa));var ca=mxUtils.parseXml(aa),da="mxlibrary"==ca.documentElement.nodeName?ca.documentElement:Editor.extractGraphModel(ca.documentElement);if(null!=da){Q(da.ownerDocument);return}}catch(ba){}X()}};Y&&Z.overrideMimeType&&Z.overrideMimeType("text/plain; charset=x-user-defined");Z.send()}function q(){K&&null!=R?P.exportToCanvas(function(V){V=EditorUi.prototype.createImageDataUri(V,null,"png");u(M,V);l(M)},400,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"checked"):(H=parseInt(p[5]),B.value=H,q.setAttribute("checked","checked"),v.style.visibility="visible"):n.setAttribute("checked","checked")):f=null}else f=null}catch(T){}d.style=g+(f?f:k());d.vertex=!0;A.addCell(d,null,null,null,null);A.selectAll();A.addListener(mxEvent.CELLS_MOVED,G);A.addListener(mxEvent.CELLS_RESIZED,G);var z=A.graphHandler.mouseUp,J=A.graphHandler.mouseDown;A.graphHandler.mouseUp=function(){z.apply(this,arguments);D.style.backgroundColor="#fff9"};A.graphHandler.mouseDown=function(){J.apply(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(q<<5)-q+this.hashValue(d.childNodes[t],g,n)<<0}else if(null!=d&&"function"!==typeof d){d=String(d);g=0;null!=n&&(n.byteCount+=d.length);for(t=0;t<d.length;t++)g=(g<<5)-g+d.charCodeAt(t)<<0;q^=g}return q};EditorUi.prototype.descriptorChanged=function(){};EditorUi.prototype.restoreLibraries=function(){};EditorUi.prototype.saveLibrary=function(d,g,n,q,t,v,B){};EditorUi.prototype.isScratchpadEnabled=function(){return isLocalStorage||mxClient.IS_CHROMEAPP};EditorUi.prototype.toggleScratchpad=function(){this.isScratchpadEnabled()&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.endpointHint=this.defEndpointHint;var l=JSON.parse(this.getPersistentToken(!0));null!=l&&(l.endpointHint=this.endpointHint,this.setPersistentToken(JSON.stringify(l),!l.remember));e();return}}catch(u){}f({message:mxResources.get("unknownError")+" (Code: "+c.getStatus()+")"})}),f)};OneDriveClient.prototype.executeRequest=function(e,f,c){var k=mxUtils.bind(this,function(l){var u=!0,x=window.setTimeout(mxUtils.bind(this,function(){u=!1;c({code:App.ERROR_TIMEOUT,retry:k})}),this.ui.timeout);this.get(e,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable