code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
arguments))};var q=mxSvgCanvas2D.prototype.updateTextNodes;mxSvgCanvas2D.prototype.updateTextNodes=function(m,z,J,O,T,W,V,Q,X,Z,Y){q.apply(this,arguments);Graph.processFontAttributes(Y)};var t=mxText.prototype.redraw;mxText.prototype.redraw=function(){t.apply(this,arguments);null!=this.node&&"DIV"==this.node.nodeName&&Graph.processFontAttributes(this.node)};Graph.prototype.createTagsDialog=function(m,z,J,O){function T(){for(var sa=Q.getSelectionCells(),za=[],Ba=0;Ba<sa.length;Ba++)Q.isCellVisible(sa[Ba])&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
1)),null!=u&&0<u.length&&(l=u));this.insertFile(e.name,l,mxUtils.bind(this,function(x){f(e.name,x)}),c)}),mxUtils.bind(this,function(){this.ui.spinner.stop()})):(this.ui.spinner.stop(),c({message:mxResources.get("errorLoadingFile")}))}),c,k)}})();OneDriveFile=function(b,e,f){DrawioFile.call(this,b,e);this.meta=f};mxUtils.extend(OneDriveFile,DrawioFile);OneDriveFile.prototype.autosaveDelay=500;OneDriveFile.prototype.isRealtimeSupported=function(){return!0};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.isDarkMode()?{outBkgClr:Editor.darkColor,cornerClr:Editor.darkColor,strokeClr:"#505759",fontClr:"#BBBBBB",guideClr:"#0088cf"}:{outBkgClr:"#e8e9ed",cornerClr:"#fbfbfb",strokeClr:"#dadce0",fontClr:"#BBBBBB",guideClr:"#0000BB"};K.style[f?"borderRight":"borderBottom"]="0.5px solid "+A.strokeClr;K.style.borderLeft="0.5px solid "+A.strokeClr});this.updateStyle();b.diagramContainer.appendChild(K);mxEvent.disableContextMenu(K);this.editorUiRefresh=b.refresh;b.refresh=function(B){D.editorUiRefresh.apply(b, arguments);k()};k();var H=document.createElement("canvas");H.width=K.offsetWidth;H.height=K.offsetHeight;K.style.overflow="hidden";H.style.position="relative";K.appendChild(H);var d=H.getContext("2d");this.ui=b;var g=b.editor.graph;this.graph=g;this.container=K;this.canvas=H;var n=function(B,F,I,G,S){B=Math.round(B);F=Math.round(F);I=Math.round(I);G=Math.round(G);d.beginPath();d.moveTo(B+.5,F+.5);d.lineTo(I+.5,G+.5);d.stroke();S&&(f?(d.save(),d.translate(B,F),d.rotate(-Math.PI/2),d.fillText(S,0,0),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d.nodeName&&(B=d.hasAttribute("max-scale")?parseFloat(d.getAttribute("max-scale")):1);d=d.nextSibling}}finally{v.endUpdate()}null!=B&&this.chromelessResize&&this.chromelessResize(!0,B)}return n};EditorUi.prototype.getCopyFilename=function(d,g){var n=null!=d&&null!=d.getTitle()?d.getTitle():this.defaultFilename;d="";var q=n.lastIndexOf(".");0<=q&&(d=n.substring(q),n=n.substring(0,q));if(g){g=n;var t=new Date;n=t.getFullYear();q=t.getMonth()+1;var v=t.getDate(),B=t.getHours(),F=t.getMinutes();t=t.getSeconds();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.resolveOwnUpdatedCells=function(b,e,f,c){if(null!=b)for(var k in b){var l=e[k];null!=l?(c.inserted[k]||(c.cells[EditorUi.DIFF_INSERT].push(l),c.inserted[k]=!0),c.cells[EditorUi.DIFF_UPDATE][k]=b[k]):null!=f&&(l=f[k],null!=l&&(this.adoptParentCell(k,l,e,c),this.adoptTerminalCell(k,l,e,!0,c,k),this.adoptTerminalCell(k,l,e,!1,c,k)))}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.customFontElements={};Graph.recentCustomFonts={};Graph.isGoogleFontUrl=function(m){return m.substring(0,Editor.GOOGLE_FONTS.length)==Editor.GOOGLE_FONTS};Graph.isCssFontUrl=function(m){return Graph.isGoogleFontUrl(m)};Graph.createFontElement=function(m,z){var J=Graph.fontMapping[z];null==J&&Graph.isCssFontUrl(z)?(m=document.createElement("link"),m.setAttribute("rel","stylesheet"),m.setAttribute("type","text/css"),m.setAttribute("charset","UTF-8"),m.setAttribute("href",z)):(null==J&&(J='@font-face {\nfont-family: "'+ m+'";\nsrc: url("'+z+'");\n}'),m=document.createElement("style"),mxUtils.write(m,J));return m};Graph.addFont=function(m,z,J){if(null!=m&&0<m.length&&null!=z&&0<z.length){var O=m.toLowerCase();if("helvetica"!=O&&"arial"!=m&&"sans-serif"!=O){var T=Graph.customFontElements[O];null!=T&&T.url!=z&&(T.elt.parentNode.removeChild(T.elt),T=null);null==T?(T=z,"http:"==z.substring(0,5)&&(T=PROXY_URL+"?url="+encodeURIComponent(z)),T={name:m,url:z,elt:Graph.createFontElement(m,T)},Graph.customFontElements[O]=T,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){return"draw.io"!=this.getServiceName()||/.*\.draw\.io$/.test(window.location.hostname)||/.*\.diagrams\.net$/.test(window.location.hostname)};EditorUi.prototype.addChromelessToolbarItems=function(d){if(null!=urlParams.tags){this.tagsDialog=this.tagsComponent=null;var g=d(mxUtils.bind(this,function(q){null==this.tagsComponent&&(this.tagsComponent=this.editor.graph.createTagsDialog(mxUtils.bind(this,function(){return null!=this.tagsDialog}),!0),this.tagsComponent.div.getElementsByTagName("div")[0].style.position=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d.shortcut):u.apply(this,arguments)};EditorUi.prototype.toggleFormatPanel=function(H){null!=this.formatWindow?this.formatWindow.window.setVisible(null!=H?H:!this.formatWindow.window.isVisible()):b(this)};EditorUi.prototype.isFormatPanelVisible=function(){return null!=this.formatWindow&&this.formatWindow.window.isVisible()||null==this.formatWindow&&0<this.formatWidth};DiagramFormatPanel.prototype.isMathOptionVisible=function(){return!0};var x=EditorUi.prototype.destroy;EditorUi.prototype.destroy=function(){this.destroyWindows();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
return y});null!=I?(c.clonePages=I,I=null):(I=c.clonePages,c.clonePages=function(){var p=Date.now(),y=I.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.clonePages",[this],"time",Date.now()-p+" ms","args",arguments);return y});null!=G?(c.getHashValueForPages=G,G=null):(G=c.getHashValueForPages,c.getHashValueForPages=function(){var p=Date.now(),y=G.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.getHashValueForPages",[this],"time",Date.now()-p+" ms","args",arguments);return y});
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
fa.getAttribute("section");na=fa.getAttribute("subsection");if(null==oa&&(ja=ia.indexOf("/"),oa=ia.substring(0,ja),null==na)){var wa=ia.indexOf("/",ja+1);-1<wa&&(na=ia.substring(ja+1,wa))}ja=ra[oa];null==ja&&(ja=[],ra[oa]=ja);ia=fa.getAttribute("clibs");null!=ma[ia]&&(ia=ma[ia]);ia={url:fa.getAttribute("url"),libs:fa.getAttribute("libs"),title:fa.getAttribute("title"),tooltip:fa.getAttribute("name")||fa.getAttribute("url"),preview:fa.getAttribute("preview"),clibs:ia,tags:fa.getAttribute("tags")}; ja.push(ia);null!=na&&(ja=ua[oa],null==ja&&(ja={},ua[oa]=ja),oa=ja[na],null==oa&&(oa=[],ja[na]=oa),oa.push(ia))}fa=fa.nextSibling}C.stop();U()}})};P.appendChild(qa);P.appendChild(ta);P.appendChild(ha);var Ua=!1,ka=A;/^https?:\/\//.test(ka)&&!b.editor.isCorsEnabledForUrl(ka)&&(ka=PROXY_URL+"?url="+encodeURIComponent(ka));C.spin(ha);null!=q?q(function(fa,ma){Ga=fa;Q=Ea=ma;Va()},Va):Va();V=ra}mxEvent.addListener(p,"keypress",function(fa){b.dialog.container.firstChild==P&&13==fa.keyCode&&I()});q=document.createElement("div");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){Trello.get("search",{query:""==mxUtils.trim(c)?"is:open":c,cards_limit:100,cards_page:g-1},mxUtils.bind(this,function(t){this.ui.spinner.stop();t=null!=t?t.cards:null;if(null==t||0==t.length)mxUtils.write(x,mxResources.get("noFiles"));else{1==g&&(x.appendChild(E(mxResources.get("filterCards")+"...",mxUtils.bind(this,function(){var B=new FilenameDialog(this.ui,c,mxResources.get("ok"),mxUtils.bind(this,function(F){null!=F&&(c=F,d())}),mxResources.get("filterCards"),null,null,"http://help.trello.com/article/808-searching-for-cards-all-boards"); this.ui.showDialog(B.container,300,80,!0,!1);B.init()}))),mxUtils.br(x));for(var v=0;v<t.length;v++)mxUtils.bind(this,function(B){x.appendChild(E(B.name,mxUtils.bind(this,function(){b?(f=B.id,A()):(this.ui.hideDialog(),e(B.id))})))})(t[v]);100==t.length&&(x.appendChild(K),H=function(){x.scrollTop>=x.scrollHeight-x.offsetHeight&&n()},mxEvent.addListener(x,"scroll",H))}}),mxUtils.bind(this,function(t){401==t.status?this.authenticate(q,D,!0):null!=D&&D({message:t.responseText})}))});q()});d()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
v.scrollCellToVisible(v.getSelectionCell())}}}else{R=function(C){var L=p[C];null==L&&(L=new mxCell(C,new mxGeometry(0,0,80,30),"whiteSpace=wrap;html=1;"),L.vertex=!0,p[C]=L,G.push(L));return L};var p={};G=[];for(F=0;F<q.length;F++)if(";"!=q[F].charAt(0)){var y=q[F].split("->");2<=y.length&&(P=R(y[0]),M=R(y[y.length-1]),y=new mxCell(2<y.length?y[1]:"",new mxGeometry),y.edge=!0,P.insertEdge(y,!0),M.insertEdge(y,!1),G.push(y))}if(0<G.length){q=document.createElement("div");q.style.visibility="hidden";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"22px";B.style.width="22px";B.style.position="relative";B.style.top=mxClient.IS_IE||mxClient.IS_IE11||mxClient.IS_EDGE?"6px":"1px";B.className="geColorBtn";d.appendChild(B);mxUtils.br(d);return{getColor:function(){return v},getTarget:function(){return q.value},focus:function(){q.focus()}}};EditorUi.prototype.createUrlParameters=function(d,g,n,q,t,v,B){B=null!=B?B:[];q&&("https://viewer.diagrams.net"==EditorUi.lightboxHost&&"1"!=urlParams.dev||B.push("lightbox=1"),"auto"!=d&&B.push("target="+d),null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
c({message:mxResources.get("fileNotFoundOrDenied"),ownerEmail:null!=window.urlParams?urlParams.ownerEml:null}):c(this.parseRequestText(u))}),c)};OneDriveClient.prototype.renameFile=function(e,f,c,k){null!=e&&null!=f&&(this.isValidFilename(f)?this.checkExists(e.getParentId(),f,!1,mxUtils.bind(this,function(l){l?this.writeFile(this.getItemURL(e.getId()),JSON.stringify({name:f}),"PATCH","application/json",c,k):k()})):k({message:this.invalidFilenameRegExs[0].test(f)?mxResources.get("oneDriveCharsNotAllowed"):
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
t,mxResources.get("ok"),function(F){null!=F?t=F:v.value="blank"},mxResources.get("url"),null,null,null,null,function(){v.value="blank"});this.showDialog(B.container,300,80,!0,!1);B.init()}}));mxEvent.addListener(n,"change",mxUtils.bind(this,function(){n.checked&&(null==g||g.checked)?v.removeAttribute("disabled"):v.setAttribute("disabled","disabled")}));mxUtils.br(d);return{getLink:function(){return n.checked?"blank"===v.value?"_blank":t:null},getEditInput:function(){return n},getEditSelect:function(){return v}}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"cells",[R])),b.fireEvent(new mxEventObject("freehandInserted","cell",R))}finally{b.model.endUpdate()}q&&b.setSelectionCells([R])}}for(R=0;R<k.length;R++)k[R].parentNode.removeChild(k[R]);c=null;k=[];u=[]}B(!1)};b.addListener(mxEvent.FIRE_MOUSE_EVENT,mxUtils.bind(this,function(P,R){P=R.getProperty("eventName");R=R.getProperty("event");P==mxEvent.MOUSE_MOVE&&g&&(null!=R.sourceState&&R.sourceState.setCursor("crosshair"),R.consume())}));b.addMouseListener({mouseDown:mxUtils.bind(this,function(P,R){if(b.isEnabled()&& !b.isCellLocked(b.getDefaultParent())&&(P=R.getEvent(),g&&!mxEvent.isPopupTrigger(P)&&!mxEvent.isMultiTouchEvent(P))){var M=parseFloat(b.currentVertexStyle[mxConstants.STYLE_STROKEWIDTH]||1);M=Math.max(1,M*b.view.scale);var p=G();c=document.createElementNS("http://www.w3.org/2000/svg","path");c.setAttribute("fill",v?p:"none");c.setAttribute("stroke",p);c.setAttribute("stroke-width",M);"1"==b.currentVertexStyle[mxConstants.STYLE_DASHED]&&(p=b.currentVertexStyle[mxConstants.STYLE_DASH_PATTERN]||"3 3", p=p.split(" ").map(function(y){return parseFloat(y)*M}).join(" "),c.setAttribute("stroke-dasharray",p));d=[];P=S(P);U(P);l="M"+P.x+" "+P.y;u.push(P);x=[];c.setAttribute("d",v?PerfectFreehand.getSvgPathFromStroke([[P.x,P.y]],t):l);e.appendChild(c);R.consume()}}),mouseMove:mxUtils.bind(this,function(P,R){if(c&&b.isEnabled()&&!b.isCellLocked(b.getDefaultParent())){P=R.getEvent();P=S(P);U(P);var M=N(0);if(M)if(u.push(M),v){var p=[];for(M=0;M<u.length;M++)p.push([u[M].x,u[M].y]);x=[];for(var y=2;y<d.length;y+=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k&&(401===u.getStatus()?c?f({message:mxResources.get("accessDenied")}):(this.logout(),this.authenticate(mxUtils.bind(this,function(){this.updateUser(e,f,!0)}),f)):200>u.getStatus()||300<=u.getStatus()?f({message:mxResources.get("accessDenied")}):(this.setUser(this.createUser(JSON.parse(u.getText()))),e()))}),f)};GitHubClient.prototype.createUser=function(e){return new DrawioUser(e.id,e.email,e.name)};GitHubClient.prototype.authenticate=function(e,f){(new mxXmlRequest(this.redirectUri+"?getState=1", null,"GET")).send(mxUtils.bind(this,function(c){200<=c.getStatus()&&299>=c.getStatus()?this.authenticateStep2(c.getText(),e,f):null!=f&&f(c)}),f)};GitHubClient.prototype.authenticateStep2=function(e,f,c){if(null==window.onGitHubCallback){var k=mxUtils.bind(this,function(){var l=!0;null!=this.getPersistentToken(!0)?(new mxXmlRequest(this.redirectUri+"?state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host+"&token="+e),null,"GET")).send(mxUtils.bind(this,function(u){200<=u.getStatus()&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.parseXml(z).documentElement;return"mxfile"==J.nodeName||"mxGraphModel"==J.nodeName}}catch(O){}return!1};Editor.prototype.extractGraphModel=function(m,z,J){return Editor.extractGraphModel.apply(this,arguments)};var f=Editor.prototype.resetGraph;Editor.prototype.resetGraph=function(){this.graph.mathEnabled="1"==urlParams.math;this.graph.view.x0=null;this.graph.view.y0=null;this.graph.useCssTransforms=!mxClient.NO_FO&&this.isChromelessView()&&this.graph.isCssTransformsSupported();this.graph.updateCssTransform();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
{fill:"#ffcc99",stroke:"#36393d"},{fill:"#cce5ff",stroke:"#36393d"},{fill:"#ffff88",stroke:"#36393d"},{fill:"#cdeb8b",stroke:"#36393d"},{fill:"#ffcccc",stroke:"#36393d"}]];StyleFormatPanel.prototype.customColorSchemes=null;StyleFormatPanel.prototype.findCommonProperties=function(m,z,J){if(null!=z){var O=function(W){if(null!=W)if(J)for(var V=0;V<W.length;V++)z[W[V].name]=W[V];else for(var Q in z){var X=!1;for(V=0;V<W.length;V++)if(W[V].name==Q&&W[V].type==z[Q].type){X=!0;break}X||delete z[Q]}},T=this.editorUi.editor.graph.view.getState(m); null!=T&&null!=T.shape&&(T.shape.commonCustomPropAdded||(T.shape.commonCustomPropAdded=!0,T.shape.customProperties=T.shape.customProperties||[],T.cell.vertex?Array.prototype.push.apply(T.shape.customProperties,Editor.commonVertexProperties):Array.prototype.push.apply(T.shape.customProperties,Editor.commonEdgeProperties)),O(T.shape.customProperties));m=m.getAttribute("customProperties");if(null!=m)try{O(JSON.parse(m))}catch(W){}}};var H=StyleFormatPanel.prototype.init;StyleFormatPanel.prototype.init=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d,g,n){var q=new XMLHttpRequest;q.open("POST",OPEN_URL);q.setRequestHeader("Content-Type","application/x-www-form-urlencoded");q.onreadystatechange=function(){g(q)};q.send("format=xml&filename="+encodeURIComponent(n)+"&data="+encodeURIComponent(d));try{EditorUi.logEvent({category:"GLIFFY-IMPORT-FILE",action:"size_"+file.size})}catch(t){}};EditorUi.prototype.isResampleImageSize=function(d,g){g=null!=g?g:this.resampleThreshold;return d>g};EditorUi.prototype.resizeImage=function(d,g,n,q,t,v,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e.appendChild(K);e.appendChild(f);A.appendChild(e);var H=x,d,g,n=function(B,F,I,G){var S="data:"==B.substring(0,5);!b.isOffline()||S&&"undefined"===typeof chrome?0<B.length&&b.spinner.spin(document.body,mxResources.get("inserting"))?b.loadImage(B,function(U){b.spinner.stop();b.hideDialog();var N=!1===G?1:null!=F&&null!=I?Math.max(F/U.width,I/U.height):Math.min(1,Math.min(520/U.width,520/U.height));l&&(B=b.convertDataUri(B));c(B,Math.round(Number(U.width)*N),Math.round(Number(U.height)*N),H,d,g)}, function(){b.spinner.stop();c(null);b.showError(mxResources.get("error"),mxResources.get("fileNotFound"),mxResources.get("ok"))}):(b.hideDialog(),c(B,null,null,H,d,g)):(B=b.convertDataUri(B),F=null==F?120:F,I=null==I?100:I,b.hideDialog(),c(B,F,I,H,d,g))},q=function(B,F){if(null!=B){var I=k?null:D.getModel().getGeometry(D.getSelectionCell());null!=I?n(B,I.width,I.height,F):n(B,null,null,F)}else b.hideDialog(),c(null)};this.init=function(){K.focus();if(Graph.fileSupport){K.setAttribute("placeholder",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g&&!g.isRestricted());g=this.actions.get("findReplace");g.setEnabled("hidden"!=this.diagramContainer.style.visibility);g.label=mxResources.get("find")+(d.isEnabled()?"/"+mxResources.get("replace"):"");d=d.view.getState(d.getSelectionCell());this.actions.get("editShape").setEnabled(q&&null!=d&&null!=d.shape&&null!=d.shape.stencil)};var H=EditorUi.prototype.destroy;EditorUi.prototype.destroy=function(){null!=this.exportDialog&&(this.exportDialog.parentNode.removeChild(this.exportDialog),this.exportDialog= null);H.apply(this,arguments)};null!=window.ExportDialog&&(ExportDialog.showXmlOption=!1,ExportDialog.showGifOption=!1,ExportDialog.exportFile=function(d,g,n,q,t,v,B,F){var I=d.editor.graph;if("xml"==n)d.hideDialog(),d.saveData(g,"xml",mxUtils.getXml(d.editor.getGraphXml()),"text/xml");else if("svg"==n)d.hideDialog(),d.saveData(g,"svg",mxUtils.getXml(I.getSvg(q,t,v)),"image/svg+xml");else{var G=d.getFileData(!0,null,null,null,null,!0),S=I.getGraphBounds(),U=Math.floor(S.width*t/I.view.scale),N=Math.floor(S.height*
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
return O==p||0==J.length?A(M,p):T==W?D(M):E(M,p!=mxConstants.DIRECTION_NORTH&&p!=mxConstants.DIRECTION_WEST)}return S.apply(this,arguments)};g.getSubtree=function(M){var p=[M];!k(M)&&!c(M)||u(M)||g.traverse(M,!0,function(y,C){var L=null!=C&&g.isTreeEdge(C);L&&0>mxUtils.indexOf(p,C)&&p.push(C);(null==C||L)&&0>mxUtils.indexOf(p,y)&&p.push(y);return null==C||L});return p};var U=mxVertexHandler.prototype.init;mxVertexHandler.prototype.init=function(){U.apply(this,arguments);(k(this.state.cell)||c(this.state.cell))&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
P()},mxEvent.addListener(A,"scroll",t))}),n)}}))});b?this.user?F():this.updateUser(function(){F()},n,!0):this.authenticate(mxUtils.bind(this,function(){this.updateUser(function(){F()},n,!0)}),n)};GitLabClient.prototype.logout=function(){this.ui.editor.loadUrl(this.redirectUri+"?doLogout=1&state="+encodeURIComponent("cId="+this.clientId+"&domain="+window.location.host));this.clearPersistentToken();this.setUser(null);b=null;this.setToken(null)}})();DrawioComment=function(b,e,f,c,k,l,u){this.file=b;this.id=e;this.content=f;this.modifiedDate=c;this.createdDate=k;this.isResolved=l;this.user=u;this.replies=[]};DrawioComment.prototype.addReplyDirect=function(b){null!=b&&this.replies.push(b)};DrawioComment.prototype.addReply=function(b,e,f,c,k){e()};DrawioComment.prototype.editComment=function(b,e,f){e()};DrawioComment.prototype.deleteComment=function(b,e){b()};DriveComment=function(b,e,f,c,k,l,u,x){DrawioComment.call(this,b,e,f,c,k,l,u);this.pCommentId=x};mxUtils.extend(DriveComment,DrawioComment);DriveComment.prototype.addReply=function(b,e,f,c,k){b={content:b.content};c?b.verb="resolve":k&&(b.verb="reopen");this.file.ui.drive.executeRequest({url:"/files/"+this.file.getId()+"/comments/"+this.id+"/replies",params:b,method:"POST"},mxUtils.bind(this,function(l){e(l.replyId)}),f)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f.apply(this,arguments)};var c=Editor.prototype.updateGraphComponents;Editor.prototype.updateGraphComponents=function(){c.apply(this,arguments);this.graph.useCssTransforms=!mxClient.NO_FO&&this.isChromelessView()&&this.graph.isCssTransformsSupported();this.graph.updateCssTransform()};Editor.initMath=function(m,z){if("undefined"===typeof window.MathJax&&!mxClient.IS_IE&&!mxClient.IS_IE11){var J=function(){O=null;if(0<Editor.mathJaxQueue.length)Editor.doMathJaxRender(Editor.mathJaxQueue.shift());else Editor.onMathJaxDone()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d){return Editor.extractGraphModelFromPng(d)};EditorUi.prototype.loadImage=function(d,g,n){try{var q=new Image;q.onload=function(){q.width=0<q.width?q.width:120;q.height=0<q.height?q.height:120;g(q)};null!=n&&(q.onerror=n);q.src=d}catch(t){if(null!=n)n(t);else throw t;}};EditorUi.prototype.getDefaultSketchMode=function(){var d="1"==urlParams.sketch;return"0"!=(null!=urlParams.rough?urlParams.rough:d)};var k=EditorUi.prototype.createUi;EditorUi.prototype.createUi=function(){Editor.isSettingsEnabled()&& (this.doSetSketchMode(null!=mxSettings.settings.sketchMode&&null==urlParams.rough&&null==urlParams.sketch?mxSettings.settings.sketchMode:this.getDefaultSketchMode()),null!=mxSettings.settings.sidebarTitles&&(Sidebar.prototype.sidebarTitles=mxSettings.settings.sidebarTitles),this.formatWidth=mxSettings.getFormatWidth());k.apply(this,arguments)};var l=EditorUi.prototype.init;EditorUi.prototype.init=function(){mxStencilRegistry.allowEval=mxStencilRegistry.allowEval&&!this.isOfflineApp();var d=this,g=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
("zTXt"==z?String.fromCharCode(0):"")+O;O=4294967295;O=Editor.updateCRC(O,z,0,4);O=Editor.updateCRC(O,J,0,J.length);T+=Q(J.length)+z+J+Q(O^4294967295);T+=m.substring(X-8,m.length);break}T+=m.substring(X-8,X-4+Z);W(m,Z);W(m,4)}while(Z);return"data:image/png;base64,"+(window.btoa?btoa(T):Base64.encode(T,!0))}};if(window.ColorDialog){FilenameDialog.filenameHelpLink="https://www.drawio.com/doc/faq/save-file-formats";var x=ColorDialog.addRecentColor;ColorDialog.addRecentColor=function(m,z){x.apply(this, arguments);mxSettings.setRecentColors(ColorDialog.recentColors);mxSettings.save()};var E=ColorDialog.resetRecentColors;ColorDialog.resetRecentColors=function(){E.apply(this,arguments);mxSettings.setRecentColors(ColorDialog.recentColors);mxSettings.save()}}"undefined"!==typeof window.EditDataDialog&&(EditDataDialog.getDisplayIdForCell=function(m,z){var J=null;null!=m.editor.graph.getModel().getParent(z)?J=z.getId():null!=m.currentPage&&(J=m.currentPage.getId());return J});if(null!=window.StyleFormatPanel){var D=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DiagramFormatPanel.prototype.addOptions=function(m){m=K.apply(this,arguments);var z=this.editorUi,J=z.editor.graph;if(J.isEnabled()){var O=z.getCurrentFile();null!=O&&O.isAutosaveOptional()&&m.appendChild(this.createOption(mxResources.get("autosave"),function(){return z.editor.autosave},function(V){z.editor.setAutosave(V);z.editor.autosave&&O.isModified()&&O.fileChanged()},{install:function(V){this.listener=function(){V(z.editor.autosave)};z.editor.addListener("autosaveChanged",this.listener)},destroy:function(){z.editor.removeListener(this.listener)}}))}if(this.isMathOptionVisible()&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
F);else{var I=this[q].apply(this,F);n([I])}}else n(null,"Invalid Call: "+q+" is not found.")}catch(G){n(null,"Invalid Call: An error occurred, "+G.message)}};EditorUi.prototype.openDatabase=function(d,g){if(null==this.database){var n=window.indexedDB||window.mozIndexedDB||window.webkitIndexedDB;if(null!=n)try{var q=n.open("database",2);q.onupgradeneeded=function(t){try{var v=q.result;1>t.oldVersion&&v.createObjectStore("objects",{keyPath:"key"});2>t.oldVersion&&(v.createObjectStore("files",{keyPath:"title"}), v.createObjectStore("filesInfo",{keyPath:"title"}),EditorUi.migrateStorageFiles=isLocalStorage)}catch(B){null!=g&&g(B)}};q.onsuccess=mxUtils.bind(this,function(t){try{var v=q.result;this.database=v;EditorUi.migrateStorageFiles&&(StorageFile.migrate(v),EditorUi.migrateStorageFiles=!1);"app.diagrams.net"!=location.host||this.drawioMigrationStarted||(this.drawioMigrationStarted=!0,this.getDatabaseItem(".drawioMigrated3",mxUtils.bind(this,function(B){if(!B||"1"==urlParams.forceMigration){var F=document.createElement("iframe");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"data:action/json,"+JSON.stringify(q)}}catch(F){}return g};EditorUi.prototype.isRemoteVisioFormat=function(d){return/(\.v(sd|dx))($|\?)/i.test(d)||/(\.vs(s|x))($|\?)/i.test(d)};EditorUi.prototype.importVisio=function(d,g,n,q,t){var v=mxUtils.bind(this,function(B){this.loadingExtensions=!1;null!=n?n(B):this.handleError(B)});this.createTimeout(null,mxUtils.bind(this,function(B){q=null!=q?q:d.name;var F=mxUtils.bind(this,function(G){B.clear()&&v(G)}),I=mxUtils.bind(this,function(){this.loadingExtensions=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ab,Wa,0,Na,Ya,$a);La.pageSelector=!1;La.mathEnabled=!1;da.checked&&(La.isCellVisible=function(Za){return Aa.isCellSelected(Za)});Na=m.getCurrentFile();null!=Na&&(La.title=Na.getTitle());var hb=La.writeHead;La.writeHead=function(Za){hb.apply(this,arguments);mxClient.IS_GC&&(Za.writeln('<style type="text/css">'),Za.writeln("@media print {"),Za.writeln(".MathJax svg { shape-rendering: crispEdges; }"),Za.writeln("}"),Za.writeln("</style>"));null!=m.editor.fontCss&&(Za.writeln('<style type="text/css">'),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
B);window.setTimeout(mxUtils.bind(this,function(){M()}),S)});mxEvent.addListener(U,"click",mxUtils.bind(this,function(y){var C=mxEvent.getSource(y);C!=P&&C!=R?(null!=n&&n(),M(),mxEvent.consume(y)):p()}));window.setTimeout(mxUtils.bind(this,function(){mxUtils.setPrefixedStyle(U.style,"transform",F)}),S/2);window.setTimeout(p,t?4E3:3E4);G=!0}return G};EditorUi.prototype.setCurrentFile=function(d){null!=d&&(d.opened=new Date);this.currentFile=d};EditorUi.prototype.getCurrentFile=function(){return this.currentFile};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.selectUnlockedLayer=function(){if(null==this.defaultParent){var m=this.model.getChildCount(this.model.root),z=0;do var J=this.model.getChildAt(this.model.root,z);while(z++<m&&"1"==mxUtils.getValue(this.getCellStyle(J),"locked","0"));null!=J&&this.setDefaultParent(J)}};mxStencilRegistry.libraries.mockup=[SHAPES_PATH+"/mockup/mxMockupButtons.js"];mxStencilRegistry.libraries.arrows2=[SHAPES_PATH+"/mxArrows.js"];mxStencilRegistry.libraries.atlassian=[STENCIL_PATH+"/atlassian.xml",SHAPES_PATH+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d?d:"",extras:JSON.stringify(t),scale:B,border:F,w:U&&isFinite(U)?U:null,h:N&&isFinite(N)?N:null}};EditorUi.prototype.setMode=function(d,g){this.mode=d};EditorUi.prototype.getDiagramId=function(){var d=window.location.hash;null!=d&&0<d.length&&(d=d.substring(1));if(null!=d&&1<d.length){var g=d.indexOf("#");0<=g&&(d=d.substring(0,g))}return d};EditorUi.prototype.getHashObject=function(){var d=window.location.hash,g={};if(null!=d&&0<d.length){var n=d.lastIndexOf("#");if(0<n){d=decodeURIComponent(d.substring(n+ 1));try{g=JSON.parse(d)}catch(q){}}}return g};EditorUi.prototype.updateHashObject=function(){if(null!=this.currentFile&&""!=this.currentFile.getHash()&&null!=this.currentPage&&0<this.getSelectedPageIndex()){var d=this.getHashObject();d.pageId=this.currentPage.getId();this.setHashObject(d)}else this.setHashObject(null)};EditorUi.prototype.setHashObject=function(d){if(Editor.enableHashObjects){var g=window.location.hash;if(null==g||""==g)g="#";var n=g.lastIndexOf("#");0<n&&(g=g.substring(0,n));try{null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,f){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,f,c,k,l){DrawioFile.call(this,b,e);this.title=f;this.mode=c?null:App.MODE_DEVICE;this.fileHandle=k;this.desc=l};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"/pid2/mxPidInstruments.js"];mxStencilRegistry.libraries.pid2misc=[SHAPES_PATH+"/pid2/mxPidMisc.js",STENCIL_PATH+"/pid/misc.xml"];mxStencilRegistry.libraries.pid2valves=[SHAPES_PATH+"/pid2/mxPidValves.js"];mxStencilRegistry.libraries.pidFlowSensors=[STENCIL_PATH+"/pid/flow_sensors.xml"];mxMarker.getPackageForType=function(m){var z=null;null!=m&&0<m.length&&("ER"==m.substring(0,2)?z="mxgraph.er":"sysML"==m.substring(0,5)&&(z="mxgraph.sysml"));return z};var M=mxMarker.createMarker;mxMarker.createMarker=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
6),m.setAttribute("height",parseInt(m.getAttribute("height"))+6),z=m.getAttribute("viewBox"),null!=z&&0<z.length&&(z=z.split(" "),3<z.length&&(w=parseFloat(z[2])+6,h=parseFloat(z[3])+6,m.setAttribute("viewBox",z[0]+" "+z[1]+" "+w+" "+h))))));return W};Graph.prototype.setShadowVisible=function(m,z){mxClient.IS_SVG&&!mxClient.IS_SF&&(z=null!=z?z:!0,(this.shadowVisible=m)?this.view.getDrawPane().setAttribute("filter","url(#"+this.shadowId+")"):this.view.getDrawPane().removeAttribute("filter"),z&&this.fireEvent(new mxEventObject("shadowVisibleChanged")))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.ui.showDialog(B.container,300,80,!0,!1);B.init()}))),mxUtils.br(x));for(var v=0;v<t.length;v++)mxUtils.bind(this,function(B){x.appendChild(E(B.name,mxUtils.bind(this,function(){b?(f=B.id,A()):(this.ui.hideDialog(),e(B.id))})))})(t[v]);100==t.length&&(x.appendChild(K),H=function(){x.scrollTop>=x.scrollHeight-x.offsetHeight&&n()},mxEvent.addListener(x,"scroll",H))}}),mxUtils.bind(this,function(t){401==t.status?this.authenticate(q,D,!0):null!=D&&D({message:t.responseText})}))});q()});d()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"all",k,"local",l,"applied",u,"immediate",c)}return k};DrawioFileSync.prototype.isRealtimeActive=function(){return this.ui.editor.autosave};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
x?mxUtils.button(mxResources.get("ignore"),x):null;null!=x&&(x.className="geBtn");b.editor.cancelFirst?(d.appendChild(f),null!=x&&d.appendChild(x),d.appendChild(u),d.appendChild(l)):(d.appendChild(l),d.appendChild(u),null!=x&&d.appendChild(x),d.appendChild(f));D.appendChild(d);D.appendChild(g);this.container=D},FindWindow=function(b,e,f,c,k,l){function u(L,m,z,J){if("object"===typeof m.value&&null!=m.value.attributes){m=m.value.attributes;for(var O=0;O<m.length;O++)if("label"!=m[O].nodeName){var T= mxUtils.trim(m[O].nodeValue.replace(/[\x00-\x1F\x7F-\x9F]|\s+/g," ")).toLowerCase();if(null==L&&(J&&0<=T.indexOf(z)||!J&&T.substring(0,z.length)===z)||null!=L&&L.test(T))return!0}}return!1}function x(){d?(p.removeAttribute("disabled"),y.removeAttribute("disabled")):(p.setAttribute("disabled","disabled"),y.setAttribute("disabled","disabled"));F.value?C.removeAttribute("disabled"):C.setAttribute("disabled","disabled")}function E(L,m,z){R.innerText="";var J=A.model.getDescendants(A.model.getRoot()),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
{fill:"#ffcc99",stroke:"#36393d"},{fill:"#cce5ff",stroke:"#36393d"},{fill:"#ffff88",stroke:"#36393d"},{fill:"#cdeb8b",stroke:"#36393d"},{fill:"#ffcccc",stroke:"#36393d"}]];StyleFormatPanel.prototype.customColorSchemes=null;StyleFormatPanel.prototype.findCommonProperties=function(m,z,J){if(null!=z){var O=function(W){if(null!=W)if(J)for(var V=0;V<W.length;V++)z[W[V].name]=W[V];else for(var Q in z){var X=!1;for(V=0;V<W.length;V++)if(W[V].name==Q&&W[V].type==z[Q].type){X=!0;break}X||delete z[Q]}},T=this.editorUi.editor.graph.view.getState(m);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"') "+(f?" and (title contains '"+f+"')":"")+(c?" and (modifiedDate > '"+c.toISOString()+"')":"")+(k?" and ('me' in owners)":""))+"&orderBy=modifiedDate desc,title"},l,u)};DriveClient.prototype.getCustomProperty=function(f,c){f=f.properties;var k=null;if(null!=f)for(var l=0;l<f.length;l++)if(f[l].key==c){k=f[l].value;break}return k};DriveClient.prototype.getFile=function(f,c,k,l,u){l=null!=l?l:!1;u=null!=u?u:!1;null!=urlParams.rev?this.executeRequest({url:"/files/"+f+"/revisions/"+urlParams.rev+"?supportsAllDrives=true"},
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ia()},ia=function(){T=ja;la.className="geTempDlgCreateBtn";fa&&(ya.className="geTempDlgOpenBtn")},ja=T;T=null;"boolean"!==typeof fa&&(fa=ja.isExternal&&K);1==ka?D(ja.url,ja):fa?(ya.className="geTempDlgOpenBtn geTempDlgBtnDisabled geTempDlgBtnBusy",ma()):(la.className="geTempDlgCreateBtn geTempDlgBtnDisabled geTempDlgBtnBusy",ka=null==b.mode||b.mode==App.MODE_GOOGLE||b.mode==App.MODE_BROWSER?mxResources.get("diagramName"):mxResources.get("filename"),ka=new FilenameDialog(b,b.defaultFilename+".drawio",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ra,ua,Ga,Ea,Qa,Ha){if(0<Ea){var Ra=Array(Ea);ra=null!=ra?ra.split(","):[];for(var Ia=0;Ia<Ea;Ia++)Ra[Ia]=null!=ra[Ia]?ra[Ia]:null!=Ga?Ga:"";ca.push({name:pa,values:Ra,type:ua,defVal:Ga,parentRow:Qa,flipBkg:Ha,size:Ea})}return document.createElement("div")}function X(pa,ra,ua){var Ga=document.createElement("input");Ga.type="checkbox";Ga.checked="1"==ra;mxEvent.addListener(Ga,"change",function(){O(pa,Ga.checked?"1":"0",ua)});return Ga}function Z(pa,ra,ua,Ga,Ea){var Qa=ua.dispName,Ha=ua.type,Ra=document.createElement("tr");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
W[V];W.stroke!=mxConstants.NONE&&null!=W.stroke||delete this.nextShape.options.stroke;W.filled||delete this.nextShape.options.fill;this.passThrough=!0;this.rc.draw(this.nextShape);this.passThrough=!1}};m.prototype.stroke=function(){this.passThrough?this.originalStroke.apply(this.canvas,arguments):this.drawPath(this.getStyle(!0,!1))};m.prototype.fill=function(){this.passThrough?this.originalFill.apply(this.canvas,arguments):this.drawPath(this.getStyle(!1,!0))};m.prototype.fillAndStroke=function(){this.passThrough?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!navigator.onLine||!d&&("1"==urlParams.stealth||"1"==urlParams.lockdown)};EditorUi.prototype.isExternalDataComms=function(){return"1"!=urlParams.offline&&!this.isOffline()&&!this.isOfflineApp()};EditorUi.prototype.createSpinner=function(d,g,n){var q=null==d||null==g;n=null!=n?n:24;var t=new Spinner({lines:12,length:n,width:Math.round(n/3),radius:Math.round(n/2),rotate:0,color:Editor.isDarkMode()?"#c0c0c0":"#000",speed:1.5,trail:60,shadow:!1,hwaccel:!1,zIndex:2E9}),v=t.spin;t.spin=function(F,I){var G= !1;this.active||(v.call(this,F),this.active=!0,null!=I&&(q&&(g=Math.max(document.body.clientHeight||0,document.documentElement.clientHeight||0)/2,d=document.body.clientWidth/2-2),G=document.createElement("div"),G.style.position="absolute",G.style.whiteSpace="nowrap",G.style.background="#4B4243",G.style.color="white",G.style.fontFamily=Editor.defaultHtmlFont,G.style.fontSize="9pt",G.style.padding="6px",G.style.paddingLeft="10px",G.style.paddingRight="10px",G.style.zIndex=2E9,G.style.left=Math.max(0, d)+"px",G.style.top=Math.max(0,g+70)+"px",mxUtils.setPrefixedStyle(G.style,"borderRadius","6px"),mxUtils.setPrefixedStyle(G.style,"transform","translate(-50%,-50%)"),Editor.isDarkMode()||mxUtils.setPrefixedStyle(G.style,"boxShadow","2px 2px 3px 0px #ddd"),"..."!=I.substring(I.length-3,I.length)&&"!"!=I.charAt(I.length-1)&&(I+="..."),G.innerHTML=I,F.appendChild(G),t.status=G),this.pause=mxUtils.bind(this,function(){var S=function(){};this.active&&(S=mxUtils.bind(this,function(){this.spin(F,I)}));this.stop(); return S}),G=!0);return G};var B=t.stop;t.stop=function(){B.call(this);this.active=!1;null!=t.status&&null!=t.status.parentNode&&t.status.parentNode.removeChild(t.status);t.status=null};t.pause=function(){return function(){}};return t};EditorUi.prototype.isCompatibleString=function(d){try{var g=mxUtils.parseXml(d),n=this.editor.extractGraphModel(g.documentElement,!0);return null!=n&&0==n.getElementsByTagName("parsererror").length}catch(q){}return!1};EditorUi.prototype.isVisioData=function(d){return 8<
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g(B)}}),g)};EditorUi.prototype.getDatabaseItemKeys=function(d,g,n){this.openDatabase(mxUtils.bind(this,function(q){try{n=n||"objects";var t=q.transaction([n],"readonly").objectStore(n).getAllKeys();t.onsuccess=function(){d(t.result)};t.onerror=g}catch(v){null!=g&&g(v)}}),g)};EditorUi.prototype.commentsSupported=function(){var d=this.getCurrentFile();return null!=d?d.commentsSupported():!1};EditorUi.prototype.commentsRefreshNeeded=function(){var d=this.getCurrentFile();return null!=d?d.commentsRefreshNeeded():
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(0!=g.getStatus()?": "+g.getStatus():"")}))}));EditorUi.debug("DrawioFileSync.fileSaved",[this],"from",E,"to",D,"etag",this.file.getCurrentEtag(),"diff",A,K.length,"bytes","checksum",l)}else this.notify(x),null!=f&&f(),EditorUi.debug("DrawioFileSync.fileSaved",[this],"from",E,"to",D,"etag",this.file.getCurrentEtag())}this.file.setShadowPages(b);this.scheduleCleanup()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
wa.innerText=ja;ia.appendChild(wa);qa.appendChild(ia);mxEvent.addListener(ia,"click",function(){function Ka(){var Aa=Ja.querySelector(".geTemplateDrawioCatLink");null!=Aa?Aa.click():setTimeout(Ka,200)}ca=!0;var Ja=C.querySelector(".geTemplatesList");Ja.style.display="block";Ba.style.width="";Ca.style.display="";Ca.value="";Y=null;Ka()});da.style.display=ka.length<=ma?"none":""}function U(ka,fa,ma){function na(Oa,Xa){Oa=mxResources.get(Oa,null,Oa.substring(0,1).toUpperCase()+Oa.substring(1));var Sa= Oa+" ("+Xa.length+")",Ta=Oa=mxUtils.htmlEntities(Oa);15<Oa.length&&(Oa=Oa.substring(0,15)+"&hellip;");return{lbl:Oa+" ("+Xa.length+")",fullLbl:Sa,lblOnly:Ta}}function oa(Oa,Xa,Sa,Ta,Pa){mxEvent.addListener(Sa,"click",function(){z!=Sa&&(null!=z?(z.style.fontWeight="normal",z.style.textDecoration="none"):(ha.style.display="none",ea.style.minHeight="100%"),z=Sa,z.style.fontWeight="bold",z.style.textDecoration="underline",Ba.scrollTop=0,L&&(m=!0),sa.innerHTML=Xa,za.style.display="none",G(Pa?fa[Oa]:Ta?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m.prototype.lineTo=function(W,V){this.passThrough?this.originalLineTo.apply(this.canvas,arguments):(this.addOp(this.lineOp,W,V),this.lastX=W,this.lastY=V)};m.prototype.moveTo=function(W,V){this.passThrough?this.originalMoveTo.apply(this.canvas,arguments):(this.addOp(this.moveOp,W,V),this.lastX=W,this.lastY=V,this.firstX=W,this.firstY=V)};m.prototype.close=function(){this.passThrough?this.originalClose.apply(this.canvas,arguments):this.addOp(this.closeOp)};m.prototype.quadTo=function(W,V,Q,X){this.passThrough? this.originalQuadTo.apply(this.canvas,arguments):(this.addOp(this.quadOp,W,V,Q,X),this.lastX=Q,this.lastY=X)};m.prototype.curveTo=function(W,V,Q,X,Z,Y){this.passThrough?this.originalCurveTo.apply(this.canvas,arguments):(this.addOp(this.curveOp,W,V,Q,X,Z,Y),this.lastX=Z,this.lastY=Y)};m.prototype.arcTo=function(W,V,Q,X,Z,Y,aa){if(this.passThrough)this.originalArcTo.apply(this.canvas,arguments);else{var ca=mxUtils.arcToCurves(this.lastX,this.lastY,W,V,Q,X,Z,Y,aa);if(null!=ca)for(var da=0;da<ca.length;da+=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d||mxUtils.isEmptyObject(d)||(g=g+"#"+encodeURIComponent(JSON.stringify(d)))}catch(q){}window.location.hash=g}};EditorUi.prototype.loadDescriptor=function(d,g,n){var q=window.location.hash,t=mxUtils.bind(this,function(B){var F=null!=d.data?d.data:"";null!=B&&0<B.length&&(0<F.length&&(F+="\n"),F+=B);B=new LocalFile(this,"csv"!=d.format&&0<F.length?F:this.emptyDiagramXml,null!=urlParams.title?decodeURIComponent(urlParams.title):this.defaultFilename,!0);B.getHash=function(){return q};this.fileLoaded(B);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.isRevisionHistoryEnabled=function(){var d=this.getCurrentFile();return null!=d&&(d.constructor==DriveFile&&d.isEditable()||d.constructor==DropboxFile)};EditorUi.prototype.getServiceName=function(){return"draw.io"};EditorUi.prototype.addRemoteServiceSecurityCheck=function(d){d.setRequestHeader("Content-Language","da, mi, en, de-DE")};EditorUi.prototype.loadUrl=function(d,g,n,q,t,v,B,F){EditorUi.logEvent("SHOULD NOT BE CALLED: loadUrl");return this.editor.loadUrl(d,g,n,q,t,v,B,F)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d)}),c,this.ui.getCurrentFile()!=e?e.getData():null,H.scale,H.border)}else A(e.meta.sha,Base64.encode(e.getData()))});k?this.getSha(u,x,D,E,mxUtils.bind(this,function(H){e.meta.sha=H;K()}),c):K()};GitHubClient.prototype.pickLibrary=function(e){this.pickFile(e)};GitHubClient.prototype.pickFolder=function(e){this.showGitHubDialog(!1,e,!0)};GitHubClient.prototype.pickFile=function(e){e=null!=e?e:mxUtils.bind(this,function(f){this.ui.loadFile("H"+encodeURIComponent(f))});this.showGitHubDialog(!0,e)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
gridSize:parseFloat(b.getAttribute("gridSize"))||mxGraph.prototype.gridSize,guidesEnabled:"0"!=b.getAttribute("guides"),foldingEnabled:"0"!=b.getAttribute("fold"),shadowVisible:"1"==b.getAttribute("shadow"),pageVisible:this.isLightboxView()?!1:null!=e?"0"!=e:this.defaultPageVisible,background:null!=l&&0<l.length?l:null,backgroundImage:u,pageScale:isNaN(f)?mxGraph.prototype.pageScale:f,pageFormat:isNaN(c)||isNaN(k)?"undefined"===typeof mxSettings||null!=this.defaultPageFormat?mxGraph.prototype.pageFormat: mxSettings.getPageFormat():new mxRectangle(0,0,c,k),tooltips:"0"!=b.getAttribute("tooltips"),connect:"0"!=b.getAttribute("connect"),arrows:"0"!=b.getAttribute("arrows"),mathEnabled:"1"==b.getAttribute("math"),selectionCells:null,defaultParent:null,scrollbars:this.defaultScrollbars,scale:1,hiddenTags:[],extFonts:x||[]}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(e,f){try{var c=JSON.parse(e.getText());null!=c&&null!=c.message&&(f=c.message)}catch(k){}return f};GitHubClient.prototype.showAuthorizeDialog=function(e,f){this.ui.showError(mxResources.get("accessDenied"),mxResources.get("authorizationRequired"),mxResources.get("help"),mxUtils.bind(this,function(){this.ui.openLink("https://www.drawio.com/blog/single-repository-diagrams")}),e,mxResources.get("authorize"),mxUtils.bind(this,function(){this.ui.openLink("test.draw.io"==window.location.hostname? "https://github.com/apps/diagrams-net-app-test":"https://github.com/apps/draw-io-app")}),mxResources.get("cancel"),f,480,null,!1)};GitHubClient.prototype.executeRequest=function(e,f,c,k,l){var u=mxUtils.bind(this,function(E){var D=!0,A=window.setTimeout(mxUtils.bind(this,function(){D=!1;c({code:App.ERROR_TIMEOUT,retry:x})}),this.ui.timeout),K=this.authToken+" "+b;e.setRequestHeaders=function(H,d){H.setRequestHeader("Authorization",K)};e.send(mxUtils.bind(this,function(){window.clearTimeout(A);var H=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Menus.prototype.init=function(){function f(p,y,C){this.ui=p;this.previousExtFonts=this.extFonts=y;this.prevCustomFonts=this.customFonts=C}e.apply(this,arguments);var c=this.editorUi,k=c.editor.graph,l=mxUtils.bind(k,k.isEnabled),u=("1"!=urlParams.embed&&"0"!=urlParams.gapi||"1"==urlParams.embed&&"1"==urlParams.gapi)&&mxClient.IS_SVG&&isLocalStorage&&(null==document.documentMode||10<=document.documentMode),x=("1"!=urlParams.embed&&"0"!=urlParams.db||"1"==urlParams.embed&&"1"==urlParams.db)&&mxClient.IS_SVG&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=v&&(this.diagramContainer.style.width=Math.max(20,F+mxEvent.getClientX(G)-v)+"px",S=!0);null!=B&&(this.diagramContainer.style.height=Math.max(20,I+mxEvent.getClientY(G)-B)+"px",S=!0);S&&((window.opener||window.parent).postMessage(JSON.stringify({event:"resize",fullscreen:Editor.inlineFullscreen,rect:this.diagramContainer.getBoundingClientRect()}),"*"),this.inlineSizeChanged(),this.refresh())}),function(G){null==v&&null==B||mxEvent.consume(G);B=v=null});document.body.style.backgroundColor="transparent";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
46;EditorUi.prototype.footerHeight=0;Graph.prototype.editAfterInsert=!mxClient.IS_IOS&&!mxClient.IS_ANDROID;Editor.styleElt=document.createElement("style");Editor.styleElt.type="text/css";Editor.styleElt.innerHTML=Editor.createMinimalCss();document.getElementsByTagName("head")[0].appendChild(Editor.styleElt);Editor.prototype.isChromelessView=function(){return!1};Graph.prototype.isLightboxView=function(){return!1};var k=EditorUi.prototype.refresh;EditorUi.prototype.refresh=function(H){k.apply(this, arguments);null!=this.tabContainer&&(this.tabContainer.style.right="62px",this.diagramContainer.style.bottom=this.tabContainerHeight+"px")};var l=EditorUi.prototype.updateActionStates;EditorUi.prototype.updateActionStates=function(){l.apply(this,arguments);this.menus.get("save").setEnabled(null!=this.getCurrentFile()||"1"==urlParams.embed)};var u=Menus.prototype.addShortcut;Menus.prototype.addShortcut=function(H,d){null!=d.shortcut&&900>c&&!mxClient.IS_IOS?H.firstChild.nextSibling.setAttribute("title",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DropboxFile.prototype.getRevisions=function(b,e){var f=this.ui.dropbox.client.filesListRevisions({path:this.stat.path_lower,limit:100});f.then(mxUtils.bind(this,function(c){try{for(var k=[],l=c.entries.length-1;0<=l;l--)mxUtils.bind(this,function(u){k.push({modifiedDate:u.client_modified,fileSize:u.size,getXml:mxUtils.bind(this,function(x,E){this.ui.dropbox.readFile({path:this.stat.path_lower,rev:u.rev},x,E)}),getUrl:mxUtils.bind(this,function(x){return this.ui.getUrl(window.location.pathname+"?rev="+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.isObjectEqual=function(b,e,f){if(null==b&&null==e)return!0;if(null!=b?null==e:null!=e)return!1;var c=function(k,l){return null==f||f[k]!=l?!0===l?1:l:void 0};return JSON.stringify(b,c)==JSON.stringify(e,c)};var mxSettings={currentVersion:18,defaultFormatWidth:600>screen.width?"0":"240",key:Editor.settingsKey,getLanguage:function(){return mxSettings.settings.language},setLanguage:function(b){mxSettings.settings.language=b},isMainSettings:function(){return".drawio-config"==mxSettings.key},getMainSettings:function(){var b=localStorage.getItem(".drawio-config");null==b?(b=mxSettings.getDefaults(),delete b.isNew):(b=JSON.parse(b),b.version=mxSettings.currentVersion);return b},getUi:function(){return mxSettings.isMainSettings()?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m.setAttribute("title",mxResources.get("preview"));m.className="geActiveButton";m.style.position="absolute";m.style.cursor="default";m.style.padding="8px";m.style.right="0px";m.style.top="0px";var z=!1,J=null,O=!1;if(K||H){var T=[],W=null,V=null,Q=null,X=function(fa){L.setAttribute("disabled","disabled");for(var ma=0;ma<T.length;ma++)T[ma].className=ma==fa?"geBtn gePrimaryBtn":"geBtn"};R=!0;n=document.createElement("div");n.style.whiteSpace="nowrap";n.style.height="30px";P.appendChild(n);N=mxUtils.button(mxResources.get("Templates",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
U();this.refreshComments=U;F=mxUtils.bind(this,function(){function N(y){var C=R[y.id];if(null!=C)for(E(y,C),C=0;null!=y.replies&&C<y.replies.length;C++)N(y.replies[C])}if(this.window.isVisible()){for(var P=v.querySelectorAll(".geCommentDate"),R={},M=0;M<P.length;M++){var p=P[M];R[p.getAttribute("data-commentId")]=p}for(M=0;M<S.length;M++)N(S[M])}});setInterval(F,6E4);this.refreshCommentsTime=F;this.window=new mxWindow(mxResources.get("comments"),q,e,f,c,k,!0,!0);this.window.minimumSize=new mxRectangle(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxAsyncCanvas.prototype.setFontFamily=function(b){this.state.fontFamily=b};mxAsyncCanvas.prototype.setFontStyle=function(b){this.state.fontStyle=b};mxAsyncCanvas.prototype.rect=function(b,e,f,c){};mxAsyncCanvas.prototype.roundrect=function(b,e,f,c,k,l){};mxAsyncCanvas.prototype.ellipse=function(b,e,f,c){};mxAsyncCanvas.prototype.rewriteImageSource=function(b){if("http://"==b.substring(0,7)||"https://"==b.substring(0,8))b="/proxy?url="+encodeURIComponent(b);return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g(B)}}),g)};EditorUi.prototype.getDatabaseItemKeys=function(d,g,n){this.openDatabase(mxUtils.bind(this,function(q){try{n=n||"objects";var t=q.transaction([n],"readonly").objectStore(n).getAllKeys();t.onsuccess=function(){d(t.result)};t.onerror=g}catch(v){null!=g&&g(v)}}),g)};EditorUi.prototype.commentsSupported=function(){var d=this.getCurrentFile();return null!=d?d.commentsSupported():!1};EditorUi.prototype.commentsRefreshNeeded=function(){var d=this.getCurrentFile();return null!=d?d.commentsRefreshNeeded():
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
161==d.charCodeAt(4)&&177==d.charCodeAt(5)&&26==d.charCodeAt(6)&&225==d.charCodeAt(7)||60==d.charCodeAt(0)&&63==d.charCodeAt(1)&&120==d.charCodeAt(2)&&109==d.charCodeAt(3)&&108==d.charCodeAt(3))};var b=EditorUi.prototype.createKeyHandler;EditorUi.prototype.createKeyHandler=function(d){var g=b.apply(this,arguments);if(!this.editor.chromeless||this.editor.editable){var n=g.getFunction,q=this.editor.graph,t=this;g.getFunction=function(v){if(q.isSelectionEmpty()&&null!=t.pages&&0<t.pages.length){var B= t.getSelectedPageIndex();if(mxEvent.isShiftDown(v)){if(37==v.keyCode)return function(){0<B&&t.movePage(B,B-1)};if(38==v.keyCode)return function(){0<B&&t.movePage(B,0)};if(39==v.keyCode)return function(){B<t.pages.length-1&&t.movePage(B,B+1)};if(40==v.keyCode)return function(){B<t.pages.length-1&&t.movePage(B,t.pages.length-1)}}else if(mxEvent.isControlDown(v)||mxClient.IS_MAC&&mxEvent.isMetaDown(v)){if(37==v.keyCode)return function(){0<B&&t.selectNextPage(!1)};if(38==v.keyCode)return function(){0< B&&t.selectPage(t.pages[0])};if(39==v.keyCode)return function(){B<t.pages.length-1&&t.selectNextPage(!0)};if(40==v.keyCode)return function(){B<t.pages.length-1&&t.selectPage(t.pages[t.pages.length-1])}}}return!(65<=v.keyCode&&90>=v.keyCode)||q.isSelectionEmpty()||mxEvent.isAltDown(v)||mxEvent.isShiftDown(v)||mxEvent.isControlDown(v)||mxClient.IS_MAC&&mxEvent.isMetaDown(v)?n.apply(this,arguments):null}}return g};var e=EditorUi.prototype.extractGraphModelFromHtml;EditorUi.prototype.extractGraphModelFromHtml=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
x=document.createElement("div");x.style.height="300px";x.style.width="300px";x.style.display="inline-flex";x.style.justifyContent="center";x.style.alignItems="center";x.style.position="absolute";var E=document.createElement("img");E.onload=function(){function G(){A.model.setStyle(d,g+k())}A=new Graph(D);A.autoExtend=!1;A.autoScroll=!1;A.setGridEnabled(!1);A.setEnabled(!0);A.setPanning(!1);A.setConnectable(!1);A.getRubberband().setEnabled(!1);A.graphHandler.allowLivePreview=!1;var S=A.createVertexHandler;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments);k()};k();var H=document.createElement("canvas");H.width=K.offsetWidth;H.height=K.offsetHeight;K.style.overflow="hidden";H.style.position="relative";K.appendChild(H);var d=H.getContext("2d");this.ui=b;var g=b.editor.graph;this.graph=g;this.container=K;this.canvas=H;var n=function(B,F,I,G,S){B=Math.round(B);F=Math.round(F);I=Math.round(I);G=Math.round(G);d.beginPath();d.moveTo(B+.5,F+.5);d.lineTo(I+.5,G+.5);d.stroke();S&&(f?(d.save(),d.translate(B,F),d.rotate(-Math.PI/2),d.fillText(S,0,0), d.restore()):d.fillText(S,B,F))},q=function(){d.clearRect(0,0,H.width,H.height);d.beginPath();d.lineWidth=.7;d.strokeStyle=A.strokeClr;d.setLineDash([]);d.font="9px Arial";d.textAlign="center";var B=g.view.scale,F=g.view.getBackgroundPageBounds(),I=g.view.translate,G=g.pageVisible;I=G?E+(f?F.y-g.container.scrollTop:F.x-g.container.scrollLeft):E+(f?I.y*B-g.container.scrollTop:I.x*B-g.container.scrollLeft);var S=0;G&&(S=g.getPageLayout(),S=f?S.y*g.pageFormat.height:S.x*g.pageFormat.width);var U;switch(D.unit){case mxConstants.POINTS:var N=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments);mxSettings.setRecentColors(ColorDialog.recentColors);mxSettings.save()};var E=ColorDialog.resetRecentColors;ColorDialog.resetRecentColors=function(){E.apply(this,arguments);mxSettings.setRecentColors(ColorDialog.recentColors);mxSettings.save()}}"undefined"!==typeof window.EditDataDialog&&(EditDataDialog.getDisplayIdForCell=function(m,z){var J=null;null!=m.editor.graph.getModel().getParent(z)?J=z.getId():null!=m.currentPage&&(J=m.currentPage.getId());return J});if(null!=window.StyleFormatPanel){var D=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Math.round(25*Math.random()))):/\s/.test(t)?n.push(" "):n.push("?"):n.push(g?"0":Math.round(9*Math.random()))}return n.join("")};EditorUi.prototype.anonymizePatch=function(d){if(null!=d[EditorUi.DIFF_INSERT])for(var g=0;g<d[EditorUi.DIFF_INSERT].length;g++)try{var n=mxUtils.parseXml(d[EditorUi.DIFF_INSERT][g].data).documentElement.cloneNode(!1);null!=n.getAttribute("name")&&n.setAttribute("name",this.anonymizeString(n.getAttribute("name")));d[EditorUi.DIFF_INSERT][g].data=mxUtils.getXml(n)}catch(v){d[EditorUi.DIFF_INSERT][g].data= v.message}if(null!=d[EditorUi.DIFF_UPDATE]){for(var q in d[EditorUi.DIFF_UPDATE]){var t=d[EditorUi.DIFF_UPDATE][q];null!=t.name&&(t.name=this.anonymizeString(t.name));null!=t.cells&&(g=mxUtils.bind(this,function(v){var B=t.cells[v];if(null!=B){for(var F in B)null!=B[F].value&&(B[F].value="["+B[F].value.length+"]"),null!=B[F].xmlValue&&(B[F].xmlValue="["+B[F].xmlValue.length+"]"),null!=B[F].style&&(B[F].style="["+B[F].style.length+"]"),mxUtils.isEmptyObject(B[F])&&delete B[F];mxUtils.isEmptyObject(B)&& delete t.cells[v]}}),g(EditorUi.DIFF_INSERT),g(EditorUi.DIFF_UPDATE),mxUtils.isEmptyObject(t.cells)&&delete t.cells);mxUtils.isEmptyObject(t)&&delete d[EditorUi.DIFF_UPDATE][q]}mxUtils.isEmptyObject(d[EditorUi.DIFF_UPDATE])&&delete d[EditorUi.DIFF_UPDATE]}return d};EditorUi.prototype.anonymizeAttributes=function(d,g){if(null!=d.attributes)for(var n=0;n<d.attributes.length;n++)"as"!=d.attributes[n].name&&d.setAttribute(d.attributes[n].name,this.anonymizeString(d.attributes[n].value,g));if(null!=d.childNodes)for(n=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D)}};GitLabClient.prototype.saveFile=function(e,f,c,k,l){var u=e.meta.org,x=e.meta.repo,E=e.meta.ref,D=e.meta.path,A=mxUtils.bind(this,function(H,d){this.writeFile(u,x,E,D,l,d,H,mxUtils.bind(this,function(g){delete e.meta.isNew;this.getFile(u+"/"+x+"/"+E+"/"+D,mxUtils.bind(this,function(n){n.getData()==e.getData()?f(n.getCurrentEtag()):f({content:e.getCurrentEtag()})}),c,null,null,e.meta.refPos)}),c)}),K=mxUtils.bind(this,function(){if(this.ui.useCanvasForExport&&/(\.png)$/i.test(D)){var H=this.ui.getPngFileProperties(this.ui.fileNode);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
N=parseFloat(p[0].getAttribute("height")))}n(I.result,U,N)}catch(y){q(y)}};S.src=I.result};I.onerror=function(G){q(G)}}else q(F)};B.onerror=function(F){q(F)};B.send()};EditorUi.prototype.insertAsPreText=function(d,g,n){var q=this.editor.graph,t=null;q.getModel().beginUpdate();try{t=q.insertVertex(null,null,"<pre>"+d+"</pre>",g,n,1,1,"text;html=1;align=left;verticalAlign=top;"),q.updateCellSize(t,!0)}finally{q.getModel().endUpdate()}return t};EditorUi.prototype.insertTextAt=function(d,g,n,q,t,v,B,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
J+8,T=(z.y+C.lastCursor.y)*J-12,W=C.cursor.getElementsByTagName("img")[0];L?(mxUtils.setPrefixedStyle(C.cursor.style,"transition","all 900ms ease-out"),mxUtils.setPrefixedStyle(W.style,"transition","all 900ms ease-out"),window.setTimeout(m,0)):(mxUtils.setPrefixedStyle(C.cursor.style,"transition",null),mxUtils.setPrefixedStyle(W.style,"transition",null),m())}}function u(C,L){try{var m=function(){if(null==g[J]){var Y=B[J];null==Y&&(Y=K%d.length,B[J]=Y,K++);var aa=d[Y];Y=11<Y?"black":"white";g[J]={cursor:document.createElement("div"), color:aa,selection:{}};t[L]=J;O=g[J].cursor;O.style.pointerEvents="none";O.style.position="absolute";O.style.display="none";O.style.opacity="0.9";var ca=document.createElement("img");mxUtils.setPrefixedStyle(ca.style,"transform","rotate(-45deg)translateX(-14px)");ca.setAttribute("src",Graph.createSvgImage(8,12,'<path d="M 4 0 L 8 12 L 4 10 L 0 12 Z" stroke="'+aa+'" fill="'+aa+'"/>').src);ca.style.width="10px";O.appendChild(ca);ca=document.createElement("div");ca.style.backgroundColor=aa;ca.style.color= Y;ca.style.fontSize="9pt";ca.style.padding="3px 7px";ca.style.marginTop="8px";ca.style.borderRadius="10px";ca.style.maxWidth="100px";ca.style.overflow="hidden";ca.style.textOverflow="ellipsis";ca.style.whiteSpace="nowrap";mxUtils.write(ca,z);O.appendChild(ca);b.diagramContainer.appendChild(O)}else O=g[J].cursor;T=g[J].selection};if(!N){C=JSON.parse(C);null!=C.bytes&&(C=e.stringToObject(C.bytes));P&&"cursor"!=C.type&&EditorUi.debug("P2PCollab: msg received",[C]);if(null!=L){if(C.from==F||q[C.from]>=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
G[C].destroyed?(G[C]=m,v[C]=!0,EditorUi.debug("P2PCollab: p2p socket connected",C)):(m.noP2PMapDel=!0,m.destroy(),EditorUi.debug("P2PCollab: p2p socket duplicate",C))});m.on("close",function(){m.noP2PMapDel||(EditorUi.debug("P2PCollab: p2p socket closed",C),D(t[C]),delete G[C])});m.on("data",u);return I[C]=m}}function E(C,L){D(L||t[C]);null!=C&&(delete t[C],v[C]=!1)}function D(C){var L=g[C];if(null!=L){var m=L.selection,z;for(z in m)null!=m[z]&&m[z].destroy();null!=L.cursor&&null!=L.cursor.parentNode&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d,g,n){var q=new XMLHttpRequest;q.open("POST",OPEN_URL);q.setRequestHeader("Content-Type","application/x-www-form-urlencoded");q.onreadystatechange=function(){g(q)};q.send("format=xml&filename="+encodeURIComponent(n)+"&data="+encodeURIComponent(d));try{EditorUi.logEvent({category:"GLIFFY-IMPORT-FILE",action:"size_"+file.size})}catch(t){}};EditorUi.prototype.isResampleImageSize=function(d,g){g=null!=g?g:this.resampleThreshold;return d>g};EditorUi.prototype.resizeImage=function(d,g,n,q,t,v, B){t=null!=t?t:this.maxImageSize;var F=Math.max(1,d.width),I=Math.max(1,d.height);if(q&&this.isResampleImageSize(null!=B?B:g.length,v))try{var G=Math.max(F/t,I/t);if(1<G){var S=Math.round(F/G),U=Math.round(I/G),N=document.createElement("canvas");N.width=S;N.height=U;N.getContext("2d").drawImage(d,0,0,S,U);var P=N.toDataURL();if(P.length<g.length){var R=document.createElement("canvas");R.width=S;R.height=U;var M=R.toDataURL();P!==M&&(g=P,F=S,I=U)}}}catch(p){}n(g,F,I)};EditorUi.prototype.extractGraphModelFromPng=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.parseXml(z).documentElement;return"mxfile"==J.nodeName||"mxGraphModel"==J.nodeName}}catch(O){}return!1};Editor.prototype.extractGraphModel=function(m,z,J){return Editor.extractGraphModel.apply(this,arguments)};var f=Editor.prototype.resetGraph;Editor.prototype.resetGraph=function(){this.graph.mathEnabled="1"==urlParams.math;this.graph.view.x0=null;this.graph.view.y0=null;this.graph.useCssTransforms=!mxClient.NO_FO&&this.isChromelessView()&&this.graph.isCssTransformsSupported();this.graph.updateCssTransform(); f.apply(this,arguments)};var c=Editor.prototype.updateGraphComponents;Editor.prototype.updateGraphComponents=function(){c.apply(this,arguments);this.graph.useCssTransforms=!mxClient.NO_FO&&this.isChromelessView()&&this.graph.isCssTransformsSupported();this.graph.updateCssTransform()};Editor.initMath=function(m,z){if("undefined"===typeof window.MathJax&&!mxClient.IS_IE&&!mxClient.IS_IE11){var J=function(){O=null;if(0<Editor.mathJaxQueue.length)Editor.doMathJaxRender(Editor.mathJaxQueue.shift());else Editor.onMathJaxDone()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
JSON.stringify(c)+"\r\n---------314159265358979323846\r\nContent-Type: application/octect-stream\r\nContent-Transfer-Encoding: base64\r\n\r\n"+(null!=k?u?k:!window.btoa||mxClient.IS_IE||mxClient.IS_IE11?Base64.encode(k):Graph.base64EncodeUnicode(k):"")+"\r\n---------314159265358979323846--"};l||(f.fullUrl+="&newRevision=false");E&&(f.fullUrl+="&pinned=true");return f};DriveClient.prototype.createLinkPicker=function(){var f=e.linkPicker;if(null==f||e.linkPickerToken!=b){e.linkPickerToken=b;f=(new google.picker.DocsView(google.picker.ViewId.FOLDERS)).setParent("root").setIncludeFolders(!0).setSelectFolderEnabled(!0); var c=(new google.picker.DocsView).setIncludeFolders(!0).setSelectFolderEnabled(!0),k=(new google.picker.DocsView).setIncludeFolders(!0).setEnableDrives(!0).setSelectFolderEnabled(!0);f=(new google.picker.PickerBuilder).setAppId(this.appId).setLocale(mxLanguage).setOAuthToken(e.linkPickerToken).enableFeature(google.picker.Feature.SUPPORT_DRIVES).addView(f).addView(c).addView(k).addView(google.picker.ViewId.RECENTLY_PICKED)}return f};DriveClient.prototype.pickFile=function(f,c,k){this.filePickerCallback=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
[this],"time",Date.now()-p+" ms","args",arguments);return y});null!=B?(c.diffPages=B,B=null):(B=c.diffPages,c.diffPages=function(){var p=Date.now(),y=B.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.diffPages",[this],"time",Date.now()-p+" ms","args",arguments);return y});null!=F?(c.patchPages=F,F=null):(F=c.patchPages,c.patchPages=function(){var p=Date.now(),y=F.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.patchPages",[this],"time",Date.now()-p+" ms","args",arguments);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
method:"PUT",contentType:"application/json; charset=UTF-8",params:c}};DriveClient.prototype.getLibrary=function(f,c,k){return this.getFile(f,c,k,!0,!0)};DriveClient.prototype.loadDescriptor=function(f,c,k,l){this.executeRequest({url:"/files/"+f+"?supportsAllDrives=true&fields="+(null!=l?l:this.allFields)},c,k)};DriveClient.prototype.listFiles=function(f,c,k,l,u){this.executeRequest({url:"/files?supportsAllDrives=true&includeItemsFromAllDrives=true&q="+encodeURIComponent("(mimeType contains '"+this.xmlMimeType+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.recentCustomFonts[O]=T,z=document.getElementsByTagName("head")[0],null!=J&&("link"==T.elt.nodeName.toLowerCase()?(T.elt.onload=J,T.elt.onerror=J):J()),null!=z&&z.appendChild(T.elt)):null!=J&&J()}else null!=J&&J()}else null!=J&&J();return m};Graph.getFontUrl=function(m,z){m=Graph.customFontElements[m.toLowerCase()];null!=m&&(z=m.url);return z};Graph.processFontAttributes=function(m){m=m.getElementsByTagName("*");for(var z=0;z<m.length;z++){var J=m[z].getAttribute("data-font-src");if(null!=J){var O= "FONT"==m[z].nodeName?m[z].getAttribute("face"):m[z].style.fontFamily;null!=O&&Graph.addFont(O,J)}}};Graph.processFontStyle=function(m){if(null!=m){var z=mxUtils.getValue(m,"fontSource",null);if(null!=z){var J=mxUtils.getValue(m,mxConstants.STYLE_FONTFAMILY,null);null!=J&&Graph.addFont(J,decodeURIComponent(z))}}return m};Graph.prototype.defaultThemeName="default-style2";Graph.prototype.lastPasteXml=null;Graph.prototype.pasteCounter=0;Graph.prototype.defaultScrollbars="0"!=urlParams.sb;Graph.prototype.defaultPageVisible=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
allowedDomains:["app.diagrams.net"]},setMigratedFlag:{isAsync:!1,allowedDomains:["app.diagrams.net"]}};EditorUi.prototype.remoteInvokeCallbacks=[];EditorUi.prototype.remoteInvokeQueue=[];EditorUi.prototype.handleRemoteInvokeReady=function(d){this.remoteWin=d;for(var g=0;g<this.remoteInvokeQueue.length;g++)d.postMessage(this.remoteInvokeQueue[g],"*");this.remoteInvokeQueue=[]};EditorUi.prototype.handleRemoteInvokeResponse=function(d){var g=d.msgMarkers,n=this.remoteInvokeCallbacks[g.callbackId];if(null== n)throw Error("No callback for "+(null!=g?g.callbackId:"null"));d.error?n.error&&n.error(d.error.errResp):n.callback&&n.callback.apply(this,d.resp);this.remoteInvokeCallbacks[g.callbackId]=null};EditorUi.prototype.remoteInvoke=function(d,g,n,q,t){var v=!0,B=window.setTimeout(mxUtils.bind(this,function(){v=!1;t({code:App.ERROR_TIMEOUT,message:mxResources.get("timeout")})}),this.timeout),F=mxUtils.bind(this,function(){window.clearTimeout(B);v&&q.apply(this,arguments)}),I=mxUtils.bind(this,function(){window.clearTimeout(B);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"4px");null!=Y&&da.setAttribute("title",Y);null!=aa&&(Q=function(){aa.isEnabled()?(da.removeAttribute("disabled"),da.style.cursor="pointer"):(da.setAttribute("disabled","disabled"),da.style.cursor="default")},aa.addListener("stateChanged",Q),B.addListener("enabledChanged",Q),Q());return da}function g(Q,X,Z){Z=document.createElement("div");Z.className="geMenuItem";Z.style.display="inline-block";Z.style.verticalAlign="top";Z.style.marginRight="6px";Z.style.padding="0 4px 0 4px";Z.style.height="30px"; Z.style.position="relative";Z.style.top="0px";for(var Y=0;Y<Q.length;Y++)null!=Q[Y]&&(Q[Y].style.margin="0px",Q[Y].style.boxShadow="none",Z.appendChild(Q[Y]));null!=X&&mxUtils.setOpacity(Z,X);null!=v.statusContainer?F.insertBefore(Z,v.statusContainer):F.appendChild(Z);return Z}function n(){for(var Q=F.firstChild;null!=Q;){var X=Q.nextSibling;"geMenuItem"!=Q.className&&"geItem"!=Q.className||Q.parentNode.removeChild(Q);Q=X}I=F.firstChild;c=window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
A.code=null);D(A)})))};GitHubClient.prototype.checkExists=function(e,f,c){var k=e.split("/"),l=k[0],u=k[1],x=k[2];e=k.slice(3,k.length).join("/");this.getSha(l,u,e,x,mxUtils.bind(this,function(E){if(f){var D=this.ui.spinner.pause();this.ui.confirm(mxResources.get("replaceIt",[e]),function(){D();c(!0,E)},function(){D();c(!1)})}else this.ui.spinner.stop(),this.ui.showError(mxResources.get("error"),mxResources.get("fileExists"),mxResources.get("ok"),function(){c(!1)})}),mxUtils.bind(this,function(E){c(!0)}), !0)};GitHubClient.prototype.saveFile=function(e,f,c,k,l){var u=e.meta.org,x=e.meta.repo,E=e.meta.ref,D=e.meta.path,A=mxUtils.bind(this,function(H,d){this.writeFile(u,x,E,D,l,d,H,mxUtils.bind(this,function(g){delete e.meta.isNew;f(JSON.parse(g.getText()).content.sha)}),mxUtils.bind(this,function(g){c(g)}))}),K=mxUtils.bind(this,function(){if(this.ui.useCanvasForExport&&/(\.png)$/i.test(D)){var H=this.ui.getPngFileProperties(this.ui.fileNode);this.ui.getEmbeddedPng(mxUtils.bind(this,function(d){A(e.meta.sha,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(P){A=P};this.setAutoScroll=function(P){K=P};this.setOpenFill=function(P){H=P};this.setStopClickEnabled=function(P){n=P};this.setSelectInserted=function(P){q=P};this.setSmoothing=function(P){f=P};this.setPerfectFreehandMode=function(P){v=P};this.isPerfectFreehandMode=function(){return v};this.setBrushSize=function(P){t.size=P};this.getBrushSize=function(){return t.size};var B=function(P){g=P;b.getRubberband().setEnabled(!P);b.graphHandler.setSelectEnabled(!P);b.graphHandler.setMoveEnabled(!P); b.container.style.cursor=P?"crosshair":"";b.fireEvent(new mxEventObject("freehandStateChanged"))};this.startDrawing=function(){B(!0)};this.isDrawing=function(){return g};var F=mxUtils.bind(this,function(P){if(c){var R=x.length,M=n&&0<u.length&&null!=x&&2>x.length;M||u.push.apply(u,x);x=[];u.push(null);k.push(c);c=null;(M||A)&&this.stopDrawing();A&&(!M||2<=R)&&this.startDrawing();mxEvent.consume(P)}}),I=new mxCell;I.edge=!0;var G=function(){var P=b.getCurrentCellStyle(I);P=mxUtils.getValue(b.currentVertexStyle,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){b.spinner.stop();if(null==b.linkPicker){var B=b.drive.createLinkPicker();b.linkPicker=B.setCallback(function(F){LinkDialog.filePicked(F)}).build()}b.linkPicker.setVisible(!0)}))});"undefined"!=typeof Dropbox&&"undefined"!=typeof Dropbox.choose&&x(IMAGE_PATH+"/dropbox-logo.svg",mxResources.get("dropbox"),function(){Dropbox.choose({linkType:"direct",cancel:function(){},success:function(B){A.value=B[0].link;A.focus()}})});null!=b.oneDrive&&x(IMAGE_PATH+"/onedrive-logo.svg",mxResources.get("oneDrive"),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
return O};Editor.getDiagramNodeXml=function(m){var z=mxUtils.getTextContent(m),J=null;0<z.length?J=Graph.decompress(z):null!=m.firstChild&&(J=mxUtils.getXml(m.firstChild));return J};Editor.extractGraphModelFromPdf=function(m){m=m.substring(m.indexOf(",")+1);m=window.atob&&!mxClient.IS_SF?atob(m):Base64.decode(m,!0);if("%PDF-1.7"==m.substring(0,8)){var z=m.indexOf("EmbeddedFile");if(-1<z){var J=m.indexOf("stream",z)+9;if(0<m.substring(z,J).indexOf("application#2Fvnd.jgraph.mxfile"))return z=m.indexOf("endstream", J-1),pako.inflateRaw(Graph.stringToArrayBuffer(m.substring(J,z)),{to:"string"})}return null}J=null;z="";for(var O=0,T=0,W=[],V=null;T<m.length;){var Q=m.charCodeAt(T);T+=1;10!=Q&&(z+=String.fromCharCode(Q));Q=="/Subject (%3Cmxfile".charCodeAt(O)?O++:O=0;if(19==O){var X=m.indexOf("%3C%2Fmxfile%3E)",T)+15;T-=9;if(X>T){J=m.substring(T,X);break}}10==Q&&("endobj"==z?V=null:"obj"==z.substring(z.length-3,z.length)||"xref"==z||"trailer"==z?(V=[],W[z.split(" ")[0]]=V):null!=V&&V.push(z),z="")}null==J&&(J= Editor.extractGraphModelFromXref(W));null!=J&&(J=decodeURIComponent(J.replace(/\\\(/g,"(").replace(/\\\)/g,")")));return J};Editor.extractGraphModelFromXref=function(m){var z=m.trailer,J=null;null!=z&&(z=/.* \/Info (\d+) (\d+) R/g.exec(z.join("\n")),null!=z&&0<z.length&&(z=m[z[1]],null!=z&&(z=/.* \/Subject (\d+) (\d+) R/g.exec(z.join("\n")),null!=z&&0<z.length&&(m=m[z[1]],null!=m&&(m=m.join("\n"),J=m.substring(1,m.length-1))))));return J};Editor.extractParserError=function(m,z){var J=null;m=null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
[C],[L])):this.joinFile(!0)}catch(m){p=m,e.file.fireEvent(new mxEventObject("realtimeStateChanged")),EditorUi.debug("P2PCollab:","sendReply error",arguments,m)}});this.sendMessage=c;this.sendDiff=function(C){this.sendMessage("diff",{diff:C})};this.sendNotification=function(C){this.sendMessage("notify",{msg:C})};this.getState=function(){return null!=H?H.readyState:3};this.getLastError=function(){return p};this.mouseListeners={startX:0,startY:0,scrollLeft:0,scrollTop:0,mouseDown:function(C,L){},mouseMove:function(C,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(m,z){Graph.addFont(m,z);document.execCommand("fontname",!1,m);if(null!=z){var J=this.cellEditor.textarea.getElementsByTagName("font");z=Graph.getFontUrl(m,z);for(var O=0;O<J.length;O++)J[O].getAttribute("face")==m&&J[O].getAttribute("data-font-src")!=z&&J[O].setAttribute("data-font-src",z)}};var v=Graph.prototype.isFastZoomEnabled;Graph.prototype.isFastZoomEnabled=function(){return v.apply(this,arguments)&&(!this.shadowVisible||!mxClient.IS_SF)};Graph.prototype.updateGlobalUrlVariables=function(){this.globalVars= Editor.globalVars;if(null!=urlParams.vars)try{this.globalVars=null!=this.globalVars?mxUtils.clone(this.globalVars):{};var m=JSON.parse(decodeURIComponent(urlParams.vars));if(null!=m)for(var z in m)this.globalVars[z]=m[z]}catch(J){null!=window.console&&console.log("Error in vars URL parameter: "+J)}};Graph.prototype.getExportVariables=function(){return null!=this.globalVars?mxUtils.clone(this.globalVars):{}};var B=Graph.prototype.getGlobalVariable;Graph.prototype.getGlobalVariable=function(m){var z=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"cells",[N]))}finally{I.getModel().endUpdate()}I.setSelectionCell(N)}))}else{d=Graph.zapGremlins(mxUtils.trim(d));if(this.isCompatibleString(d))return this.importXml(d,g,n,v,null,F);if(0<d.length)if(this.isLucidChartData(d))this.convertLucidChart(d,mxUtils.bind(this,function(N){this.editor.graph.setSelectionCells(this.importXml(N,g,n,v,null,F))}),mxUtils.bind(this,function(N){this.handleError(N)}));else{I=this.editor.graph;t=null;I.getModel().beginUpdate();try{t=I.insertVertex(I.getDefaultParent(),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
StorageFile.insertFile=function(b,e,f,c,k){var l=mxUtils.bind(this,function(u){var x=function(){var E=new StorageFile(b,f,e);E.saveFile(e,!1,function(){c(E)},k)};u?b.confirm(mxResources.get("replaceIt",[e]),x,k):x()});StorageFile.getFileContent(b,e,function(u){l(null!=u)},function(){l(!1)})};StorageFile.getFileContent=function(b,e,f,c){b.getDatabaseItem(e,function(k){f(null!=k?k.data:null)},mxUtils.bind(this,function(){null==b.database?b.getLocalData(e,f):null!=c&&c()}),"files")};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
typeof mxMermaidToDrawio)ea=da=va;va=m.cloneNode(!0);na.appendChild(va);Ma=function(Pa){O=null!=b.sidebar.tooltip&&"none"!=b.sidebar.tooltip.style.display};Oa=function(Pa){O||B(Ta,mxEvent.getClientX(Pa),mxEvent.getClientY(Pa),Sa,Da)};mxEvent.addGestureListeners(Sa,Ma,null,Oa);mxEvent.addGestureListeners(va,Ma,null,Oa)},function(va){b.handleError(va)})});Ka.setAttribute("disabled","disabled");Ka.className="geBtn gePrimaryBtn";oa=function(){window.setTimeout(function(){""!=ma.value?Ka.removeAttribute("disabled"):
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function AspectDialog(b,e,f,c,k){this.aspect={pageId:e||(b.pages?b.pages[0].getId():null),layerIds:f||[]};e=document.createElement("div");var l=document.createElement("h5");l.style.margin="0 0 10px";mxUtils.write(l,mxResources.get("pages"));e.appendChild(l);f=document.createElement("div");f.className="geAspectDlgList";e.appendChild(f);l=document.createElement("h5");l.style.margin="0 0 10px";mxUtils.write(l,mxResources.get("layers"));e.appendChild(l);l=document.createElement("div");l.className="geAspectDlgList";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
window.console&&console.error(J,C,L)}}function k(C){if(b.shareCursorPosition&&!A.isMouseDown){var L=mxUtils.getOffset(A.container),m=A.view.translate,z=A.view.scale,J=null!=b.currentPage?b.currentPage.getId():null;c("cursor",{pageId:J,x:Math.round((C.getX()-L.x+A.container.scrollLeft)/z-m.x),y:Math.round((C.getY()-L.y+A.container.scrollTop)/z-m.y)})}}function l(C,L){var m=null!=b.currentPage?b.currentPage.getId():null;if(null!=C&&null!=C.cursor&&null!=C.lastCursor)if(null!=C.lastCursor.hide||!b.isShowRemoteCursors()||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.isExportToCanvas=function(){return this.editor.isExportToCanvas()};EditorUi.prototype.createImageDataUri=function(d,g,n,q){d=d.toDataURL("image/"+n);if(null!=d&&6<d.length)null!=g&&(d=Editor.writeGraphModelToPng(d,"tEXt","mxfile",encodeURIComponent(g))),0<q&&(d=Editor.writeGraphModelToPng(d,"pHYs","dpi",q));else throw{message:mxResources.get("unknownError")};return d};EditorUi.prototype.saveCanvas=function(d,g,n,q,t){var v="jpeg"==n?"jpg":n;q=this.getBaseFilename(q)+(null!=g?".drawio": "")+"."+v;d=this.createImageDataUri(d,g,n,t);this.saveData(q,v,d.substring(d.lastIndexOf(",")+1),"image/"+n,!0)};EditorUi.prototype.isLocalFileSave=function(){return"remote"!=urlParams.save&&(mxClient.IS_IE||"undefined"!==typeof window.Blob&&"undefined"!==typeof window.URL)&&9!=document.documentMode&&8!=document.documentMode&&7!=document.documentMode||this.isOfflineApp()||mxClient.IS_IOS};EditorUi.prototype.showTextDialog=function(d,g){d=new TextareaDialog(this,d,g,null,null,mxResources.get("close"));
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"geCommentActionLnk";mxUtils.write(Z,W);X.appendChild(Z);mxEvent.addListener(Z,"click",function(Y){V(Y,N);Y.preventDefault();mxEvent.consume(Y)});T.appendChild(X);Q&&(X.style.display="none")}function C(){function W(X){V.push(Q);if(null!=X.replies)for(var Z=0;Z<X.replies.length;Z++)Q=Q.nextSibling,W(X.replies[Z])}var V=[],Q=m;W(N);return{pdiv:Q,replies:V}}function L(W,V,Q,X,Z){function Y(){D(ba);N.addReply(da,function(sa){da.id=sa;N.replies.push(da);K(ba);Q&&Q()},function(sa){aa();A(ba);b.handleError(sa,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d){return 1!=d};EditorUi.prototype.getEditBlankXml=function(){return this.getFileData(!0)};EditorUi.prototype.exportFile=function(d,g,n,q,t,v){};EditorUi.prototype.getServiceForName=function(d){return null};EditorUi.prototype.getTitleForService=function(d){return mxResources.get(d)};EditorUi.prototype.pickFolder=function(d,g,n){g(null)};EditorUi.prototype.exportSvg=function(d,g,n,q,t,v,B,F,I,G,S,U,N,P){if(this.spinner.spin(document.body,mxResources.get("export")))try{var R=this.editor.graph.isSelectionEmpty();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"10px";A.style.resize="none";A.style.height="150px";A.style.width="440px";A.style.border="1px solid gray";A.value=mxResources.get("updatingDocument");c.appendChild(A);mxUtils.br(c);this.init=function(){window.setTimeout(function(){5E5>e.length?(A.value=e,A.focus(),mxClient.IS_GC||mxClient.IS_FF||5<=document.documentMode?A.select():document.execCommand("selectAll",!1,null)):(A.setAttribute("readonly","true"),A.value=mxResources.get("tooLargeUseDownload"))},0)};l=document.createElement("div");l.style.position=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var k=document.createElement("img");mxUtils.setOpacity(k,50);k.style.height="16px";k.style.width="16px";k.setAttribute("border","0");k.setAttribute("valign","bottom");k.setAttribute("src",Editor.helpImage);c.appendChild(k);mxEvent.addGestureListeners(c,mxUtils.bind(this,function(l){this.editorUi.hideCurrentMenu();this.editorUi.openLink(f);mxEvent.consume(l)}));return c};Menus.prototype.addLinkToItem=function(f,c){null!=f&&f.firstChild.nextSibling.appendChild(this.createHelpLink(c))};var e=Menus.prototype.init;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
b.container.style.cursor=P?"crosshair":"";b.fireEvent(new mxEventObject("freehandStateChanged"))};this.startDrawing=function(){B(!0)};this.isDrawing=function(){return g};var F=mxUtils.bind(this,function(P){if(c){var R=x.length,M=n&&0<u.length&&null!=x&&2>x.length;M||u.push.apply(u,x);x=[];u.push(null);k.push(c);c=null;(M||A)&&this.stopDrawing();A&&(!M||2<=R)&&this.startDrawing();mxEvent.consume(P)}}),I=new mxCell;I.edge=!0;var G=function(){var P=b.getCurrentCellStyle(I);P=mxUtils.getValue(b.currentVertexStyle,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable