code stringlengths 14 2.05k | label int64 0 1 | programming_language stringclasses 7 values | cwe_id stringlengths 6 14 | cwe_name stringlengths 5 98 ⌀ | description stringlengths 36 379 ⌀ | url stringlengths 36 48 ⌀ | label_name stringclasses 2 values |
|---|---|---|---|---|---|---|---|
this.createImageDataUri(O,Q,"png");G(O)}),null,null,null,mxUtils.bind(this,function(O){A({message:mxResources.get("unknownError")})}),null,!0,k?2:1,null,e,null,null,Editor.defaultBorder);else if(e=this.getFileData(!0),C.width*C.height<=MAX_AREA&&e.length<=MAX_REQUEST_SIZE){var S="";k&&(S="&w="+Math.round(2*C.width)+"&h="+Math.round(2*C.height));var N=new mxXmlRequest(EXPORT_URL,"format=png&base64=1&embedXml="+(n?"1":"0")+S+"&xml="+encodeURIComponent(e));N.send(mxUtils.bind(this,function(){200<=N.getStatus()&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
v,"image(s) from",H.length,"cell(s): ",[H,B])}finally{q.model.endUpdate()}}));d.actions.addAction("testInspect",mxUtils.bind(this,function(){console.log(d,q.getModel())}));d.actions.addAction("testXmlImageExport",mxUtils.bind(this,function(){var m=new mxImageExport,v=q.getGraphBounds(),B=q.view.scale,H=mxUtils.createXmlDocument(),g=H.createElement("output");H.appendChild(g);H=new mxXmlCanvas2D(g);H.translate(Math.floor((1-v.x)/B),Math.floor((1-v.y)/B));H.scale(1/B);var x=0,F=H.save;H.save=function(){x++;
F.apply(this,arguments)};var M=H.restore;H.restore=function(){x--;M.apply(this,arguments)};var P=m.drawShape;m.drawShape=function(T){mxLog.debug("entering shape",T,x);P.apply(this,arguments);mxLog.debug("leaving shape",T,x)};m.drawState(q.getView().getState(q.model.root),H);mxLog.show();mxLog.debug(mxUtils.getXml(g));mxLog.debug("stateCounter",x)}));d.actions.addAction("testShowConsole",function(){mxLog.isVisible()?mxLog.window.fit():mxLog.show();mxLog.window.div.style.zIndex=mxPopupMenu.prototype.zIndex- | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null==H.getTerminal(g[x],!0)){H.setTerminal(g[x],J,!0);var F=e.getCellGeometry(g[x]);F.points=null;null!=F.getTerminalPoint(!0)&&F.setTerminalPoint(null,!0)}}finally{H.endUpdate()}return g}}var G={67:c.actions.get("selectChildren"),88:c.actions.get("selectDescendants"),80:c.actions.get("selectParent"),83:c.actions.get("selectSiblings")},C=c.onKeyDown;c.onKeyDown=function(J){try{var m=e.getSelectionCell();if(e.isEnabled()&&!e.isEditing()&&null!=m){var v=mxEvent.isAltDown(J)&&mxEvent.isShiftDown(J)?
G[J.keyCode]:null;null!=v?(v.funct(J),mxEvent.consume(J)):d(m)&&(v=null,0<e.getIncomingTreeEdges(m).length&&(9==J.which?v=mxEvent.isShiftDown(J)?K(m):E(m):13==J.which&&(v=L(m,!mxEvent.isShiftDown(J)))),null!=v&&0<v.length?(1==v.length&&e.model.isEdge(v[0])?e.setSelectionCell(e.model.getTerminal(v[0],!1)):e.setSelectionCell(v[v.length-1]),null!=c.hoverIcons&&c.hoverIcons.update(e.view.getState(m)),e.startEditingAtCell(m),mxEvent.consume(J)):37==J.keyCode?(I(m,mxConstants.DIRECTION_WEST),mxEvent.consume(J)):
38==J.keyCode?(I(m,mxConstants.DIRECTION_NORTH),mxEvent.consume(J)):39==J.keyCode?(I(m,mxConstants.DIRECTION_EAST),mxEvent.consume(J)):40==J.keyCode&&(I(m,mxConstants.DIRECTION_SOUTH),mxEvent.consume(J)))}}catch(B){c.handleError(B)}mxEvent.isConsumed(J)||C.apply(this,arguments)};var V=e.connectVertex;e.connectVertex=function(J,m,v,B,H,g,x){var F=e.getIncomingTreeEdges(J);if(d(J)){var M=D(J),P=M==mxConstants.DIRECTION_EAST||M==mxConstants.DIRECTION_WEST,T=m==mxConstants.DIRECTION_EAST||m==mxConstants.DIRECTION_WEST; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c.shortcut):z.apply(this,arguments)};EditorUi.prototype.toggleFormatPanel=function(I){null!=this.formatWindow?this.formatWindow.window.setVisible(null!=I?I:!this.formatWindow.window.isVisible()):b(this)};EditorUi.prototype.isFormatPanelVisible=function(){return null!=this.formatWindow&&this.formatWindow.window.isVisible()||null==this.formatWindow&&0<this.formatWidth};DiagramFormatPanel.prototype.isMathOptionVisible=function(){return!0};var D=EditorUi.prototype.destroy;EditorUi.prototype.destroy=function(){this.destroyWindows(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(O){E=O};this.setAutoScroll=function(O){R=O};this.setOpenFill=function(O){I=O};this.setStopClickEnabled=function(O){k=O};this.setSelectInserted=function(O){n=O};this.setSmoothing=function(O){l=O};this.setPerfectFreehandMode=function(O){t=O};this.isPerfectFreehandMode=function(){return t};this.setBrushSize=function(O){p.size=O};this.getBrushSize=function(){return p.size};var y=function(O){e=O;b.getRubberband().setEnabled(!O);b.graphHandler.setSelectEnabled(!O);b.graphHandler.setMoveEnabled(!O);
b.container.style.cursor=O?"crosshair":"";b.fireEvent(new mxEventObject("freehandStateChanged"))};this.startDrawing=function(){y(!0)};this.isDrawing=function(){return e};var A=mxUtils.bind(this,function(O){if(d){var Q=D.length,J=k&&0<z.length&&null!=D&&2>D.length;J||z.push.apply(z,D);D=[];z.push(null);q.push(d);d=null;(J||E)&&this.stopDrawing();E&&(!J||2<=Q)&&this.startDrawing();mxEvent.consume(O)}}),G=new mxCell;G.edge=!0;var C=function(){var O=b.getCurrentCellStyle(G);O=mxUtils.getValue(b.currentVertexStyle, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(c){return 1!=c};EditorUi.prototype.getEditBlankXml=function(){return this.getFileData(!0)};EditorUi.prototype.exportFile=function(c,e,k,n,p,t){};EditorUi.prototype.getServiceForName=function(c){return null};EditorUi.prototype.getTitleForService=function(c){return mxResources.get(c)};EditorUi.prototype.pickFolder=function(c,e,k){e(null)};EditorUi.prototype.exportSvg=function(c,e,k,n,p,t,y,A,G,C,V,S,N,O){if(this.spinner.spin(document.body,mxResources.get("export")))try{var Q=this.editor.graph.isSelectionEmpty(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
console.log("Error in MathJax.typeset: "+U.toString())}};window.MathJax=null!=x?x:{options:{skipHtmlTags:{"[+]":["text"]}},loader:{load:["html"==urlParams["math-output"]?"output/chtml":"output/svg","input/tex","input/asciimath","ui/safe"]},startup:{pageReady:function(){for(var W=0;W<Editor.mathJaxQueue.length;W++)Editor.doMathJaxRender(Editor.mathJaxQueue[W])}}};Editor.MathJaxRender=function(W){"undefined"!==typeof MathJax&&"function"===typeof MathJax.typeset?Editor.doMathJaxRender(W):Editor.mathJaxQueue.push(W)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
ia[la]=ma),ma.push(oa))}ka=ka.nextSibling}S(Da,Ta,Ia)}})}function O(ka){z&&(Ba.scrollTop=0,aa.innerText="",Ga.spin(aa),g=!1,H=!0,ra.innerText=mxResources.get("recentDiag"),Y=null,z(Va,function(){k(mxResources.get("cannotLoad"));Va([])},ka?null:u))}function Q(ka){if(""==ka)null!=F&&(F.click(),F=null);else{if(null==TemplatesDialog.tagsList[d]){var da={};for(Ja in Da)for(var la=Da[Ja],ma=0;ma<la.length;ma++){var oa=la[ma];if(null!=oa.tags)for(var ia=oa.tags.toLowerCase().split(";"),ja=0;ja<ia.length;ja++)null==
da[ia[ja]]&&(da[ia[ja]]=[]),da[ia[ja]].push(oa)}TemplatesDialog.tagsList[d]=da}var va=ka.toLowerCase().split(" ");da=TemplatesDialog.tagsList[d];if(0<Ia&&null==da.__tagsList__){for(Ja in Ta)for(la=Ta[Ja],ma=0;ma<la.length;ma++)for(oa=la[ma],ia=oa.title.split(" "),ia.push(Ja),ja=0;ja<ia.length;ja++){var wa=ia[ja].toLowerCase();null==da[wa]&&(da[wa]=[]);da[wa].push(oa)}da.__tagsList__=!0}var Ja=[];la={};for(ma=ia=0;ma<va.length;ma++)if(0<va[ma].length){wa=da[va[ma]];var Ha={};Ja=[];if(null!=wa)for(ja=
0;ja<wa.length;ja++)oa=wa[ja],0==ia==(null==la[oa.url])&&(Ha[oa.url]=!0,Ja.push(oa));la=Ha;ia++}0==Ja.length?ra.innerText=mxResources.get("noResultsFor",[ka]):C(Ja,!0)}}function J(ka){if(Y!=ka||W!=ba)n(),Ba.scrollTop=0,aa.innerText="",ra.innerText=mxResources.get("searchResults")+' "'+ka+'"',Ua=null,fa?Q(ka):D&&(ka?(Ga.spin(aa),g=!1,H=!0,D(ka,Va,function(){k(mxResources.get("searchFailed"));Va([])},W?null:u)):O(W)),Y=ka,ba=W}function m(ka){null!=Ua&&clearTimeout(Ua);13==ka.keyCode?J(Fa.value):Ua= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(){null!=t&&(t(),t=null);b.showImageDialog(mxResources.get("addImageUrl"),"",function(V,S,N){A=!1;if(null!=V){if("data:image/"==V.substring(0,11)){var O=V.indexOf(",");0<O&&(V=V.substring(0,O)+";base64,"+V.substring(O+1))}D(V,null,0,0,S,N);c.scrollTop=c.scrollHeight}})});f.setAttribute("id","btnAddImageUrl");f.className="geBtn";d.appendChild(f);this.saveBtnClickHandler=function(V,S,N,O){b.saveLibrary(V,S,N,O)};f=mxUtils.button(mxResources.get("save"),mxUtils.bind(this,function(){null!=t&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"xlink:href");F("img","src");0==P&&x(g)};Editor.base64Encode=function(g){for(var x="",F=0,M=g.length,P,T,W;F<M;){P=g.charCodeAt(F++)&255;if(F==M){x+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt(P>>2);x+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((P&3)<<4);x+="==";break}T=g.charCodeAt(F++);if(F==M){x+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt(P>>2);x+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((P&
3)<<4|(T&240)>>4);x+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((T&15)<<2);x+="=";break}W=g.charCodeAt(F++);x+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt(P>>2);x+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((P&3)<<4|(T&240)>>4);x+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt((T&15)<<2|(W&192)>>6);x+="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/".charAt(W&63)}return x}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null==this.cachedGoogleFonts[U]?(M++,this.loadUrl(U,mxUtils.bind(this,function(X){this.cachedGoogleFonts[U]=X;F.push(X+"\n");M--;P()}),mxUtils.bind(this,function(X){M--;F.push("@import url("+U+");\n");P()}))):F.push(this.cachedGoogleFonts[U]+"\n"):F.push('@font-face {font-family: "'+W+'";src: url("'+U+'")}\n')})(x[T].name,x[T].url);P()}else g()};Editor.prototype.addMathCss=function(g){g=g.getElementsByTagName("defs");if(null!=g&&0<g.length)for(var x=document.getElementsByTagName("style"),F=0;F<x.length;F++){var M=
mxUtils.getTextContent(x[F]);0>M.indexOf("mxPageSelector")&&0<M.indexOf("MathJax")&&g[0].appendChild(x[F].cloneNode(!0))}};Editor.prototype.addFontCss=function(g,x){x=null!=x?x:this.absoluteCssFonts(this.fontCss);if(null!=x){var F=g.getElementsByTagName("defs"),M=g.ownerDocument;0==F.length?(F=null!=M.createElementNS?M.createElementNS(mxConstants.NS_SVG,"defs"):M.createElement("defs"),null!=g.firstChild?g.insertBefore(F,g.firstChild):g.appendChild(F)):F=F[0];g=null!=M.createElementNS?M.createElementNS(mxConstants.NS_SVG, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
2});var p=null,t=null,y=null,A=null,G=null,C=null,V=null;d.actions.addAction("testPerformance",mxUtils.bind(this,function(){null!=p?(q.view.revalidate=p,p=null):(p=q.view.revalidate,q.view.revalidate=function(){var m=Date.now(),v=p.apply(this,arguments);EditorUi.debug("[Performance] mxGraphView.revalidate",[this],"time",Date.now()-m+" ms","args",arguments);return v});null!=t?(d.selectPage=t,t=null):(t=d.selectPage,d.selectPage=function(){var m=Date.now(),v=t.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.selectPage",
[this],"time",Date.now()-m+" ms","args",arguments);return v});null!=y?(d.diffPages=y,y=null):(y=d.diffPages,d.diffPages=function(){var m=Date.now(),v=y.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.diffPages",[this],"time",Date.now()-m+" ms","args",arguments);return v});null!=A?(d.patchPages=A,A=null):(A=d.patchPages,d.patchPages=function(){var m=Date.now(),v=A.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.patchPages",[this],"time",Date.now()-m+" ms","args",arguments); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxResources.get("errorLoadingFile"),mxUtils.bind(this,function(){var c=this.getCurrentFile();window.location.hash=null!=c?c.getHash():""}));else{var I=b.charAt(0);b=decodeURIComponent(b.substring(1));K.getFile(b,mxUtils.bind(this,function(c){this.spinner.stop();this.fileLoaded(c);var e=this.getCurrentFile();null==e?(window.location.hash="",this.showSplash()):this.editor.chromeless&&!this.editor.editable?(e.getHash=function(){return I+b},window.location.hash="#"+e.getHash()):c==e&&null==c.getMode()&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.graph.shadowVisible?"1":"0");null!=this.graph.extFonts&&0<this.graph.extFonts.length&&(M=this.graph.extFonts.map(function(P){return P.name+"^"+P.url}),F.setAttribute("extFonts",M.join("|")));return F};Editor.prototype.isDataSvg=function(g){try{var x=mxUtils.parseXml(g).documentElement.getAttribute("content");if(null!=x&&(null!=x&&"<"!=x.charAt(0)&&"%"!=x.charAt(0)&&(x=unescape(window.atob?atob(x):Base64.decode(cont,x))),null!=x&&"%"==x.charAt(0)&&(x=decodeURIComponent(x)),null!=x&&0<x.length)){var F=
mxUtils.parseXml(x).documentElement;return"mxfile"==F.nodeName||"mxGraphModel"==F.nodeName}}catch(M){}return!1};Editor.prototype.extractGraphModel=function(g,x,F){return Editor.extractGraphModel.apply(this,arguments)};var l=Editor.prototype.resetGraph;Editor.prototype.resetGraph=function(){this.graph.mathEnabled="1"==urlParams.math;this.graph.view.x0=null;this.graph.view.y0=null;this.graph.useCssTransforms=!mxClient.NO_FO&&this.isChromelessView()&&this.graph.isCssTransformsSupported();this.graph.updateCssTransform(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
[this],"time",Date.now()-m+" ms","args",arguments);return v});null!=y?(d.diffPages=y,y=null):(y=d.diffPages,d.diffPages=function(){var m=Date.now(),v=y.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.diffPages",[this],"time",Date.now()-m+" ms","args",arguments);return v});null!=A?(d.patchPages=A,A=null):(A=d.patchPages,d.patchPages=function(){var m=Date.now(),v=A.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.patchPages",[this],"time",Date.now()-m+" ms","args",arguments);
return v});null!=G?(d.clonePages=G,G=null):(G=d.clonePages,d.clonePages=function(){var m=Date.now(),v=G.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.clonePages",[this],"time",Date.now()-m+" ms","args",arguments);return v});null!=C?(d.getHashValueForPages=C,C=null):(C=d.getHashValueForPages,d.getHashValueForPages=function(){var m=Date.now(),v=C.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.getHashValueForPages",[this],"time",Date.now()-m+" ms","args",arguments);return v}); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(){window.clearTimeout(M);F&&x(Editor.svgBrokenImage.src)});else{var P=new Image;this.crossOriginImages&&(P.crossOrigin="anonymous");P.onload=function(){window.clearTimeout(M);if(F)try{var T=document.createElement("canvas"),W=T.getContext("2d");T.height=P.height;T.width=P.width;W.drawImage(P,0,0);x(T.toDataURL())}catch(U){x(Editor.svgBrokenImage.src)}};P.onerror=function(){window.clearTimeout(M);F&&x(Editor.svgBrokenImage.src)};P.src=g}}catch(T){x(Editor.svgBrokenImage.src)}};Editor.prototype.convertImages= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
var g=0,x=0;q.view.states.visit(function(F,M){F=!0;m(M.shape)||(console.log("invalid shape",M.cell.id,M.shape),F=!1);m(M.text)||(console.log("invalid text",M.cell.id,M.text),F=!1);F||g++;x++});console.log("states checked",x,"invalid",g)}));d.actions.addAction("testCheckFile",mxUtils.bind(this,function(){var m=null!=d.pages&&null!=d.getCurrentFile()?d.getCurrentFile().getAnonymizedXmlForPages(d.pages):"";m=new TextareaDialog(d,"Paste Data:",m,function(v){if(0<v.length)try{var B=function(M){function P(aa){if(null==
ca[aa]){if(ca[aa]=!0,null!=U[aa]){for(;0<U[aa].length;){var ra=U[aa].pop();P(ra)}delete U[aa]}}else mxLog.debug(T+": Visited: "+aa)}var T=M.parentNode.id,W=M.childNodes;M={};for(var U={},X=null,Z={},Y=0;Y<W.length;Y++){var ba=W[Y];if(null!=ba.id&&0<ba.id.length)if(null==M[ba.id]){M[ba.id]=ba.id;var fa=ba.getAttribute("parent");null==fa?null!=X?mxLog.debug(T+": Multiple roots: "+ba.id):X=ba.id:(null==U[fa]&&(U[fa]=[]),U[fa].push(ba.id))}else Z[ba.id]=ba.id}W=Object.keys(Z);0<W.length?(W=T+": "+W.length+
" Duplicates: "+W.join(", "),mxLog.debug(W+" (see console)")):mxLog.debug(T+": Checked");var ca={};null==X?mxLog.debug(T+": No root"):(P(X),Object.keys(ca).length!=Object.keys(M).length&&(mxLog.debug(T+": Invalid tree: (see console)"),console.log(T+": Invalid tree",U)))};"<"!=v.charAt(0)&&(v=Graph.decompress(v),mxLog.debug("See console for uncompressed XML"),console.log("xml",v));var H=mxUtils.parseXml(v),g=d.getPagesForNode(H.documentElement,"mxGraphModel");if(null!=g&&0<g.length)try{var x=d.getHashValueForPages(g); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
46;EditorUi.prototype.footerHeight=0;Graph.prototype.editAfterInsert=!mxClient.IS_IOS&&!mxClient.IS_ANDROID;Editor.styleElt=document.createElement("style");Editor.styleElt.type="text/css";Editor.styleElt.innerHTML=Editor.createMinimalCss();document.getElementsByTagName("head")[0].appendChild(Editor.styleElt);Editor.prototype.isChromelessView=function(){return!1};Graph.prototype.isLightboxView=function(){return!1};var q=EditorUi.prototype.refresh;EditorUi.prototype.refresh=function(I){q.apply(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
ba=Array(Y.length);for(var fa=0;fa<Y.length;fa++)ba[fa]=String.fromCharCode(Y[fa]);ba=ba.join("")}T=null!=T?T:"data:image/png;base64,";ba=T+Editor.base64Encode(ba)}x(ba)}}else null!=F&&(0==Y.getStatus()?F({message:mxResources.get("accessDenied")},Y):404==Y.getStatus()?F({message:mxResources.get("fileNotFound"),code:Y.getStatus()},Y):F({message:this.getErrorMessage(Y)},Y))}),function(Y){null!=F&&F({message:mxResources.get("error")+" "+Y.getStatus()})},X,this.timeout,function(){P&&null!=F&&F({code:App.ERROR_TIMEOUT,
retry:Z})},U)});Z()}catch(Y){null!=F&&F(Y)}};Editor.prototype.getErrorMessage=function(g){var x=mxResources.get("error")+" "+g.getStatus();try{var F=g.getText(),M=JSON.parse(F);null!=M&&null!=M.error&&null!=M.error.message&&(x=M.error.message+" ("+x+")")}catch(P){}return x};Editor.prototype.absoluteCssFonts=function(g){var x=null;if(null!=g){var F=g.split("url(");if(0<F.length){x=[F[0]];g=window.location.pathname;var M=null!=g?g.lastIndexOf("/"):-1;0<=M&&(g=g.substring(0,M+1));M=document.getElementsByTagName("base"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"22px";y.style.width="22px";y.style.position="relative";y.style.top=mxClient.IS_IE||mxClient.IS_IE11||mxClient.IS_EDGE?"6px":"1px";y.className="geColorBtn";c.appendChild(y);mxUtils.br(c);return{getColor:function(){return t},getTarget:function(){return n.value},focus:function(){n.focus()}}};EditorUi.prototype.createUrlParameters=function(c,e,k,n,p,t,y){y=null!=y?y:[];n&&("https://viewer.diagrams.net"==EditorUi.lightboxHost&&"1"!=urlParams.dev||y.push("lightbox=1"),"auto"!=c&&y.push("target="+c),null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return M==m||0==F.length?E(J,m):P==T?K(J):L(J,m!=mxConstants.DIRECTION_NORTH&&m!=mxConstants.DIRECTION_WEST)}return V.apply(this,arguments)};e.getSubtree=function(J){var m=[J];!q(J)&&!d(J)||z(J)||e.traverse(J,!0,function(v,B){var H=null!=B&&e.isTreeEdge(B);H&&0>mxUtils.indexOf(m,B)&&m.push(B);(null==B||H)&&0>mxUtils.indexOf(m,v)&&m.push(v);return null==B||H});return m};var S=mxVertexHandler.prototype.init;mxVertexHandler.prototype.init=function(){S.apply(this,arguments);(q(this.state.cell)||d(this.state.cell))&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.chromelessWindowResize=function(){};var K=Menus.prototype.init;Menus.prototype.init=function(){K.apply(this,arguments);var I=this.editorUi;EditorUi.enablePlantUml&&!I.isOffline()&&I.actions.put("plantUml",new Action(mxResources.get("plantUml")+"...",function(){var k=new ParseDialog(I,mxResources.get("plantUml")+"...","plantUml");I.showDialog(k.container,620,420,!0,!1);k.init()}));I.actions.put("mermaid",new Action(mxResources.get("mermaid")+"...",function(){var k=new ParseDialog(I, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.isRevisionHistoryEnabled=function(){var c=this.getCurrentFile();return null!=c&&(c.constructor==DriveFile&&c.isEditable()||c.constructor==DropboxFile)};EditorUi.prototype.getServiceName=function(){return"draw.io"};EditorUi.prototype.addRemoteServiceSecurityCheck=function(c){c.setRequestHeader("Content-Language","da, mi, en, de-DE")};EditorUi.prototype.loadUrl=function(c,e,k,n,p,t,y,A){EditorUi.logEvent("SHOULD NOT BE CALLED: loadUrl");return this.editor.loadUrl(c,e,k,n,p,t,y,A)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g+'";\nsrc: url("'+x+'");\n}'),g=document.createElement("style"),mxUtils.write(g,F));return g};Graph.addFont=function(g,x,F){if(null!=g&&0<g.length&&null!=x&&0<x.length){var M=g.toLowerCase();if("helvetica"!=M&&"arial"!=g&&"sans-serif"!=M){var P=Graph.customFontElements[M];null!=P&&P.url!=x&&(P.elt.parentNode.removeChild(P.elt),P=null);null==P?(P=x,"http:"==x.substring(0,5)&&(P=PROXY_URL+"?url="+encodeURIComponent(x)),P={name:g,url:x,elt:Graph.createFontElement(g,P)},Graph.customFontElements[M]=P,
Graph.recentCustomFonts[M]=P,x=document.getElementsByTagName("head")[0],null!=F&&("link"==P.elt.nodeName.toLowerCase()?(P.elt.onload=F,P.elt.onerror=F):F()),null!=x&&x.appendChild(P.elt)):null!=F&&F()}else null!=F&&F()}else null!=F&&F();return g};Graph.getFontUrl=function(g,x){g=Graph.customFontElements[g.toLowerCase()];null!=g&&(x=g.url);return x};Graph.processFontAttributes=function(g){g=g.getElementsByTagName("*");for(var x=0;x<g.length;x++){var F=g[x].getAttribute("data-font-src");if(null!=F){var M= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
p,mxResources.get("ok"),function(A){null!=A?p=A:t.value="blank"},mxResources.get("url"),null,null,null,null,function(){t.value="blank"});this.showDialog(y.container,300,80,!0,!1);y.init()}}));mxEvent.addListener(k,"change",mxUtils.bind(this,function(){k.checked&&(null==e||e.checked)?t.removeAttribute("disabled"):t.setAttribute("disabled","disabled")}));mxUtils.br(c);return{getLink:function(){return k.checked?"blank"===t.value?"_blank":p:null},getEditInput:function(){return k},getEditSelect:function(){return t}}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
b.installResizeHandler(this,!1)},TagsWindow=function(b,f,l,d,q){var u=b.editor.graph,z=null;if(!b.isOffline()||mxClient.IS_CHROMEAPP)z=b.menus.createHelpLink("https://www.drawio.com/blog/tags-in-diagrams"),z.style.marginLeft="8px";var D=b.editor.graph.createTagsDialog(mxUtils.bind(this,function(){return this.window.isVisible()}),null,function(L,K){if(u.isEnabled()){var E=new FilenameDialog(b,"",mxResources.get("add"),function(R){b.hideDialog();if(null!=R&&0<R.length){R=R.split(" ");for(var I=[],c=
0;c<R.length;c++){var e=mxUtils.trim(R[c]);""!=e&&0>mxUtils.indexOf(L,e)&&I.push(e)}0<I.length&&(u.isSelectionEmpty()?K(L.concat(I)):u.addTagsForCells(u.getSelectionCells(),I))}},mxResources.get("enterValue")+" ("+mxResources.get("tags")+")");b.showDialog(E.container,300,80,!0,!0);E.init()}},z);z=D.div;this.window=new mxWindow(mxResources.get("tags"),z,f,l,d,q,!0,!0);this.window.minimumSize=new mxRectangle(0,0,212,120);this.window.destroyOnClose=!1;this.window.setMaximizable(!1);this.window.setResizable(!0);
this.window.setClosable(!0);this.window.addListener("show",mxUtils.bind(this,function(){D.refresh();this.window.fit()}));b.installResizeHandler(this,!0)},AuthDialog=function(b,f,l,d){var q=document.createElement("div");q.style.textAlign="center";var u=document.createElement("p");u.style.fontSize="16pt";u.style.padding="0px";u.style.margin="0px";u.style.color="gray";mxUtils.write(u,mxResources.get("authorizationRequired"));var z="Unknown",D=document.createElement("img");D.setAttribute("border","0"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g[x[F][P]];null!=T?""!=T&&M.push(T):M.push(x[F][P])}x[F]=M}};Graph.prototype.getCellsForAction=function(g,x){x=this.getCellsById(g.cells).concat(this.getCellsForTags(g.tags,null,x));if(null!=g.excludeCells){for(var F=[],M=0;M<x.length;M++)0>g.excludeCells.indexOf(x[M].id)&&F.push(x[M]);x=F}return x};Graph.prototype.getCellsById=function(g){var x=[];if(null!=g)for(var F=0;F<g.length;F++)if("*"==g[F]){var M=this.model.getRoot();x=x.concat(this.model.filterDescendants(function(T){return T!=M},M))}else{var P= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!1,!0)}finally{G.model.endUpdate()}}}catch(H){if(p)throw H;this.handleError(H)}return A};EditorUi.prototype.updatePageLinks=function(c,e){for(var k=0;k<e.length;k++)this.updatePageLinksForCell(c,e[k].root),null!=e[k].viewState&&this.updateBackgroundPageLink(c,e[k].viewState.backgroundImage)};EditorUi.prototype.updateBackgroundPageLink=function(c,e){try{if(null!=e&&Graph.isPageLink(e.originalSrc)){var k=c[e.originalSrc.substring(e.originalSrc.indexOf(",")+1)];null!=k&&(e.originalSrc="data:page/id,"+
k)}}catch(n){}};EditorUi.prototype.updatePageLinksForCell=function(c,e){var k=document.createElement("div"),n=this.editor.graph,p=n.getLinkForCell(e);null!=p&&n.setLinkForCell(e,this.updatePageLink(c,p));if(n.isHtmlLabel(e)){k.innerHTML=Graph.sanitizeHtml(n.getLabel(e));for(var t=k.getElementsByTagName("a"),y=!1,A=0;A<t.length;A++)p=t[A].getAttribute("href"),null!=p&&(t[A].setAttribute("href",this.updatePageLink(c,p)),y=!0);y&&n.labelChanged(e,k.innerHTML)}for(A=0;A<n.model.getChildCount(e);A++)this.updatePageLinksForCell(c, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null==H.getTerminal(g[x],!0)){H.setTerminal(g[x],J,!0);var F=e.getCellGeometry(g[x]);F.points=null;null!=F.getTerminalPoint(!0)&&F.setTerminalPoint(null,!0)}}finally{H.endUpdate()}return g}}var G={67:c.actions.get("selectChildren"),88:c.actions.get("selectDescendants"),80:c.actions.get("selectParent"),83:c.actions.get("selectSiblings")},C=c.onKeyDown;c.onKeyDown=function(J){try{var m=e.getSelectionCell();if(e.isEnabled()&&!e.isEditing()&&null!=m){var v=mxEvent.isAltDown(J)&&mxEvent.isShiftDown(J)? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g.prototype.lineTo=function(T,W){this.passThrough?this.originalLineTo.apply(this.canvas,arguments):(this.addOp(this.lineOp,T,W),this.lastX=T,this.lastY=W)};g.prototype.moveTo=function(T,W){this.passThrough?this.originalMoveTo.apply(this.canvas,arguments):(this.addOp(this.moveOp,T,W),this.lastX=T,this.lastY=W,this.firstX=T,this.firstY=W)};g.prototype.close=function(){this.passThrough?this.originalClose.apply(this.canvas,arguments):this.addOp(this.closeOp)};g.prototype.quadTo=function(T,W,U,X){this.passThrough?
this.originalQuadTo.apply(this.canvas,arguments):(this.addOp(this.quadOp,T,W,U,X),this.lastX=U,this.lastY=X)};g.prototype.curveTo=function(T,W,U,X,Z,Y){this.passThrough?this.originalCurveTo.apply(this.canvas,arguments):(this.addOp(this.curveOp,T,W,U,X,Z,Y),this.lastX=Z,this.lastY=Y)};g.prototype.arcTo=function(T,W,U,X,Z,Y,ba){if(this.passThrough)this.originalArcTo.apply(this.canvas,arguments);else{var fa=mxUtils.arcToCurves(this.lastX,this.lastY,T,W,U,X,Z,Y,ba);if(null!=fa)for(var ca=0;ca<fa.length;ca+= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(g){var x="1"==mxUtils.getValue(g.style,"enumerate",0);x&&null==g.secondLabel?(g.secondLabel=new mxText("",new mxRectangle,mxConstants.ALIGN_LEFT,mxConstants.ALIGN_BOTTOM),g.secondLabel.size=12,g.secondLabel.state=g,g.secondLabel.dialect=mxConstants.DIALECT_STRICTHTML,this.graph.cellRenderer.initializeLabel(g,g.secondLabel)):x||null==g.secondLabel||(g.secondLabel.destroy(),g.secondLabel=null);x=g.secondLabel;if(null!=x){var F=g.view.scale,M=this.createEnumerationValue(g);g=this.graph.model.isVertex(g.cell)?
new mxRectangle(g.x+g.width-4*F,g.y+4*F,0,0):mxRectangle.fromPoint(g.view.getPoint(g));x.bounds.equals(g)&&x.value==M&&x.scale==F||(x.bounds=g,x.value=M,x.scale=F,x.redraw())}};var S=mxGraphView.prototype.validateBackgroundPage;mxGraphView.prototype.validateBackgroundPage=function(){S.apply(this,arguments);if(mxClient.IS_GC&&null!=this.getDrawPane()){var g=this.getDrawPane().parentNode;!this.graph.mathEnabled||mxClient.NO_FO||null!=this.webKitForceRepaintNode&&null!=this.webKitForceRepaintNode.parentNode|| | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
q,z=0;8>z;z++)u=1==(u&1)?3988292384^u>>>1:u>>>1,Editor.crcTable[q]=u;Editor.updateCRC=function(g,x,F,M){for(var P=0;P<M;P++)g=Editor.crcTable[(g^x.charCodeAt(F+P))&255]^g>>>8;return g};Editor.crc32=function(g){for(var x=-1,F=0;F<g.length;F++)x=x>>>8^Editor.crcTable[(x^g.charCodeAt(F))&255];return(x^-1)>>>0};Editor.writeGraphModelToPng=function(g,x,F,M,P){function T(Y,ba){var fa=X;X+=ba;return Y.substring(fa,X)}function W(Y){Y=T(Y,4);return Y.charCodeAt(3)+(Y.charCodeAt(2)<<8)+(Y.charCodeAt(1)<<16)+
(Y.charCodeAt(0)<<24)}function U(Y){return String.fromCharCode(Y>>24&255,Y>>16&255,Y>>8&255,Y&255)}g=g.substring(g.indexOf(",")+1);g=window.atob?atob(g):Base64.decode(g,!0);var X=0;if(T(g,8)!=String.fromCharCode(137)+"PNG"+String.fromCharCode(13,10,26,10))null!=P&&P();else if(T(g,4),"IHDR"!=T(g,4))null!=P&&P();else{T(g,17);P=g.substring(0,X);do{var Z=W(g);if("IDAT"==T(g,4)){P=g.substring(0,X-8);"pHYs"==x&&"dpi"==F?(F=Math.round(M/.0254),F=U(F)+U(F)+String.fromCharCode(1)):F=F+String.fromCharCode(0)+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
X||(ba.style.backgroundImage="url("+mxWindow.prototype.normalizeImage+")",ba.style.backgroundPosition="right 6px center",ba.style.backgroundRepeat="no-repeat",ba.style.paddingRight="22px");return ba}function c(U,X,Z,Y,ba,fa){var ca=document.createElement("a");ca.className="geMenuItem";ca.style.display="inline-block";ca.style.boxSizing="border-box";ca.style.height="30px";ca.style.padding="6px";ca.style.position="relative";ca.style.verticalAlign="top";ca.style.top="0px";null!=t.statusContainer?A.insertBefore(ca,
t.statusContainer):A.appendChild(ca);null!=fa?(ca.style.backgroundImage="url("+fa+")",ca.style.backgroundPosition="center center",ca.style.backgroundRepeat="no-repeat",ca.style.backgroundSize="24px 24px",ca.style.width="34px"):mxUtils.write(ca,U);mxEvent.addListener(ca,mxClient.IS_POINTER?"pointerdown":"mousedown",mxUtils.bind(this,function(aa){aa.preventDefault()}));mxEvent.addListener(ca,"click",function(aa){"disabled"!=ca.getAttribute("disabled")&&X(aa);mxEvent.consume(aa)});null==Z&&(ca.style.marginRight=
"4px");null!=Y&&ca.setAttribute("title",Y);null!=ba&&(U=function(){ba.isEnabled()?(ca.removeAttribute("disabled"),ca.style.cursor="pointer"):(ca.setAttribute("disabled","disabled"),ca.style.cursor="default")},ba.addListener("stateChanged",U),y.addListener("enabledChanged",U),U());return ca}function e(U,X,Z){Z=document.createElement("div");Z.className="geMenuItem";Z.style.display="inline-block";Z.style.verticalAlign="top";Z.style.marginRight="6px";Z.style.padding="0 4px 0 4px";Z.style.height="30px"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0,260,200);this.window.destroyOnClose=!1;this.window.setMaximizable(!1);this.window.setResizable(!0);this.window.setClosable(!0);this.window.setVisible(!0);this.window.addListener(mxEvent.SHOW,mxUtils.bind(this,function(){this.window.fit()}));b.installResizeHandler(this,!0)},ConfirmDialog=function(b,f,l,d,q,u,z,D,L,K,E){var R=document.createElement("div");R.style.textAlign="center";E=null!=E?E:44;var I=document.createElement("div");I.style.padding="6px";I.style.overflow="auto";I.style.maxHeight=E+
"px";I.style.lineHeight="1.2em";mxUtils.write(I,f);R.appendChild(I);null!=K&&(I=document.createElement("div"),I.style.padding="6px 0 6px 0",f=document.createElement("img"),f.setAttribute("src",K),I.appendChild(f),R.appendChild(I));K=document.createElement("div");K.style.textAlign="center";K.style.whiteSpace="nowrap";var c=document.createElement("input");c.setAttribute("type","checkbox");u=mxUtils.button(u||mxResources.get("cancel"),function(){b.hideDialog();null!=d&&d(c.checked)});u.className="geBtn";
null!=D&&(u.innerHTML=D+"<br>"+u.innerHTML,u.style.paddingBottom="8px",u.style.paddingTop="8px",u.style.height="auto",u.style.width="40%");b.editor.cancelFirst&&K.appendChild(u);var e=mxUtils.button(q||mxResources.get("ok"),function(){b.hideDialog();null!=l&&l(c.checked)});K.appendChild(e);null!=z?(e.innerHTML=z+"<br>"+e.innerHTML+"<br>",e.style.paddingBottom="8px",e.style.paddingTop="8px",e.style.height="auto",e.className="geBtn",e.style.width="40%"):e.className="geBtn gePrimaryBtn";b.editor.cancelFirst||
K.appendChild(u);R.appendChild(K);L?(K.style.marginTop="10px",I=document.createElement("p"),I.style.marginTop="20px",I.style.marginBottom="0px",I.appendChild(c),q=document.createElement("span"),mxUtils.write(q," "+mxResources.get("rememberThisSetting")),I.appendChild(q),R.appendChild(I),mxEvent.addListener(q,"click",function(k){c.checked=!c.checked;mxEvent.consume(k)})):K.style.marginTop="12px";this.init=function(){e.focus()};this.container=R},HeadlessEditorUi=function(){EditorUi.call(this,new Editor(!0), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.addLinkSection=function(c,e){function k(){var A=document.createElement("div");A.style.width="100%";A.style.height="100%";A.style.boxSizing="border-box";null!=t&&t!=mxConstants.NONE?(A.style.border="1px solid black",A.style.backgroundColor=t):(A.style.backgroundPosition="center center",A.style.backgroundRepeat="no-repeat",A.style.backgroundImage="url('"+Dialog.prototype.closeImage+"')");y.innerText="";y.appendChild(A)}mxUtils.write(c,mxResources.get("links")+":");var n=document.createElement("select"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
[Q],"{1} ago"));O.setAttribute("title",N.toLocaleDateString()+" "+N.toLocaleTimeString())}function K(N){var O=document.createElement("img");O.className="geCommentBusyImg";O.src=IMAGE_PATH+"/spin.gif";N.appendChild(O);N.busyImg=O}function E(N){N.style.border="1px solid red";N.removeChild(N.busyImg)}function R(N){N.style.border="";N.removeChild(N.busyImg)}function I(N,O,Q,J,m){function v(T,W,U){var X=document.createElement("li");X.className="geCommentAction";var Z=document.createElement("a");Z.className= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"checked"):(I=parseInt(m[5]),y.value=I,n.setAttribute("checked","checked"),t.style.visibility="visible"):k.setAttribute("checked","checked")):l=null}else l=null}catch(P){}c.style=e+(l?l:q());c.vertex=!0;E.addCell(c,null,null,null,null);E.selectAll();E.addListener(mxEvent.CELLS_MOVED,C);E.addListener(mxEvent.CELLS_RESIZED,C);var x=E.graphHandler.mouseUp,F=E.graphHandler.mouseDown;E.graphHandler.mouseUp=function(){x.apply(this,arguments);K.style.backgroundColor="#fff9"};E.graphHandler.mouseDown=function(){F.apply(this,
arguments);K.style.backgroundColor=""};E.dblClick=function(){};var M=E.getSelectionModel().changeSelection;E.getSelectionModel().changeSelection=function(){M.call(this,[c],[c])}};L.onerror=function(){L.onload=null;L.src=Editor.errorImage};L.setAttribute("src",f);L.style.maxWidth="300px";L.style.maxHeight="300px";D.appendChild(L);z.appendChild(D);var K=document.createElement("div");K.style.width="300px";K.style.height="300px";K.style.overflow="hidden";K.style.backgroundColor="#fff9";z.appendChild(K); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
ba=Array(Y.length);for(var fa=0;fa<Y.length;fa++)ba[fa]=String.fromCharCode(Y[fa]);ba=ba.join("")}T=null!=T?T:"data:image/png;base64,";ba=T+Editor.base64Encode(ba)}x(ba)}}else null!=F&&(0==Y.getStatus()?F({message:mxResources.get("accessDenied")},Y):404==Y.getStatus()?F({message:mxResources.get("fileNotFound"),code:Y.getStatus()},Y):F({message:this.getErrorMessage(Y)},Y))}),function(Y){null!=F&&F({message:mxResources.get("error")+" "+Y.getStatus()})},X,this.timeout,function(){P&&null!=F&&F({code:App.ERROR_TIMEOUT, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.model.getCell(g[F]);null!=P&&x.push(P)}return x};var Q=Graph.prototype.isCellVisible;Graph.prototype.isCellVisible=function(g){return Q.apply(this,arguments)&&!this.isAllTagsHidden(this.getTagsForCell(g))};Graph.prototype.setHiddenTags=function(g){this.hiddenTags=g;this.fireEvent(new mxEventObject("hiddenTagsChanged"))};Graph.prototype.toggleHiddenTag=function(g){var x=mxUtils.indexOf(this.hiddenTags,g);0>x?this.hiddenTags.push(g):0<=x&&this.hiddenTags.splice(x,1);this.fireEvent(new mxEventObject("hiddenTagsChanged"))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"keys",Ea,"values",Ta,"cells",ba.getSelectionCells()))}finally{ba.getModel().endUpdate()}}function P(qa,sa,ta){var Da=mxUtils.getOffset(g,!0),Ea=mxUtils.getOffset(qa,!0);sa.style.position="absolute";sa.style.left=Ea.x-Da.x+"px";sa.style.top=Ea.y-Da.y+"px";sa.style.width=qa.offsetWidth+"px";sa.style.height=qa.offsetHeight-(ta?4:0)+"px";sa.style.zIndex=5}function T(qa,sa,ta){var Da=document.createElement("div");Da.style.width="32px";Da.style.height="4px";Da.style.margin="2px";Da.style.border="1px solid black";
Da.style.background=sa&&"none"!=sa?sa:"url('"+Dialog.prototype.noColorImage+"')";btn=mxUtils.button("",mxUtils.bind(Y,function(Ea){this.editorUi.pickColor(sa,function(Ta){Da.style.background="none"==Ta?"url('"+Dialog.prototype.noColorImage+"')":Ta;M(qa,Ta,ta)});mxEvent.consume(Ea)}));btn.style.height="12px";btn.style.width="40px";btn.className="geColorBtn";btn.appendChild(Da);return btn}function W(qa,sa,ta,Da,Ea,Ta,Ka){null!=sa&&(sa=sa.split(","),fa.push({name:qa,values:sa,type:ta,defVal:Da,countProperty:Ea, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.reload(f,l,d,null,q))}catch(A){null!=l&&l(A)}}else null!=l&&l()}),l)}else null!=l&&l()});window.setTimeout(R,this.cacheReadyDelay)}else this.reload(f,l,d,null,q)}else null!=l&&l()}};DrawioFileSync.prototype.reload=function(b,f,l,d,q){EditorUi.debug("DrawioFileSync.reload",[this],"immediate",q);this.file.updateFile(mxUtils.bind(this,function(){this.lastModified=this.file.getLastModifiedDate();this.updateStatus();this.start();null!=b&&b()}),mxUtils.bind(this,function(u){null!=f&&f(u)}),l,d,q)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l?E=new mxHierarchicalLayout(u,mxConstants.DIRECTION_WEST):"circle"==l?E=new mxCircleLayout(u):(E=new mxFastOrganicLayout(u,!1),E.forceConstant=80);if(null!=E){var R=function(k,n){u.getModel().beginUpdate();try{null!=k&&k(),E.execute(u.getDefaultParent(),K)}catch(p){throw p;}finally{k=new mxMorphing(u),k.addListener(mxEvent.DONE,mxUtils.bind(this,function(){u.getModel().endUpdate();null!=n&&n()})),k.startAnimation()}},I=mxEdgeHandler.prototype.connect;mxEdgeHandler.prototype.connect=function(k,n, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
e&&!e.isRestricted());e=this.actions.get("findReplace");e.setEnabled("hidden"!=this.diagramContainer.style.visibility);e.label=mxResources.get("find")+(c.isEnabled()?"/"+mxResources.get("replace"):"");c=c.view.getState(c.getSelectionCell());this.actions.get("editShape").setEnabled(n&&null!=c&&null!=c.shape&&null!=c.shape.stencil)};var I=EditorUi.prototype.destroy;EditorUi.prototype.destroy=function(){null!=this.exportDialog&&(this.exportDialog.parentNode.removeChild(this.exportDialog),this.exportDialog=
null);I.apply(this,arguments)};null!=window.ExportDialog&&(ExportDialog.showXmlOption=!1,ExportDialog.showGifOption=!1,ExportDialog.exportFile=function(c,e,k,n,p,t,y,A){var G=c.editor.graph;if("xml"==k)c.hideDialog(),c.saveData(e,"xml",mxUtils.getXml(c.editor.getGraphXml()),"text/xml");else if("svg"==k)c.hideDialog(),c.saveData(e,"svg",mxUtils.getXml(G.getSvg(n,p,t)),"image/svg+xml");else{var C=c.getFileData(!0,null,null,null,null,!0),V=G.getGraphBounds(),S=Math.floor(V.width*p/G.view.scale),N=Math.floor(V.height* | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c+(null!=k?"&mime="+k:"")+(null!=p?"&format="+p:"")+(null!=t?"&base64="+t:"")+(null!=e?"&filename="+encodeURIComponent(e):"")+(n?"&binary=1":""))};EditorUi.prototype.base64ToBlob=function(c,e){e=e||"";c=atob(c);for(var k=c.length,n=Math.ceil(k/1024),p=Array(n),t=0;t<n;++t){for(var y=1024*t,A=Math.min(y+1024,k),G=Array(A-y),C=0;y<A;++C,++y)G[C]=c[y].charCodeAt(0);p[t]=new Uint8Array(G)}return new Blob(p,{type:e})};EditorUi.prototype.saveLocalFile=function(c,e,k,n,p,t,y,A){t=null!=t?t:!1;y=null!=y? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
2});var p=null,t=null,y=null,A=null,G=null,C=null,V=null;d.actions.addAction("testPerformance",mxUtils.bind(this,function(){null!=p?(q.view.revalidate=p,p=null):(p=q.view.revalidate,q.view.revalidate=function(){var m=Date.now(),v=p.apply(this,arguments);EditorUi.debug("[Performance] mxGraphView.revalidate",[this],"time",Date.now()-m+" ms","args",arguments);return v});null!=t?(d.selectPage=t,t=null):(t=d.selectPage,d.selectPage=function(){var m=Date.now(),v=t.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.selectPage", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(ja?"geTempDlgRadioBtnLarge":"geTempDlgRadioBtnSmall");B.querySelector("."+da).src="/images/"+la+"-sel.svg";B.querySelector("."+oa).src="/images/"+ia+".svg";return!0}function t(ka,da,la,ma){function oa(wa,Ja){null==ja?(wa=/^https?:\/\//.test(wa)&&!b.editor.isCorsEnabledForUrl(wa)?PROXY_URL+"?url="+encodeURIComponent(wa):TEMPLATE_PATH+"/"+wa,mxUtils.get(wa,mxUtils.bind(this,function(Ha){200<=Ha.getStatus()&&299>=Ha.getStatus()&&(ja=Ha.getText());Ja(ja)}))):Ja(ja)}function ia(wa,Ja,Ha){if(null!=wa&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(O){E=O};this.setAutoScroll=function(O){R=O};this.setOpenFill=function(O){I=O};this.setStopClickEnabled=function(O){k=O};this.setSelectInserted=function(O){n=O};this.setSmoothing=function(O){l=O};this.setPerfectFreehandMode=function(O){t=O};this.isPerfectFreehandMode=function(){return t};this.setBrushSize=function(O){p.size=O};this.getBrushSize=function(){return p.size};var y=function(O){e=O;b.getRubberband().setEnabled(!O);b.graphHandler.setSelectEnabled(!O);b.graphHandler.setMoveEnabled(!O); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxResources.get("ok"),la,ka,function(va){var wa=null!=va&&0<va.length;return wa&&e?(la(va),!1):wa},null,null,null,ia,c?null:[]),b.showDialog(ka.container,350,80,!0,!0),ka.init())}}function G(ka){na.innerText=mxResources.get(fa||ka?"create":"copy");ka=ka?"none":"";R&&(Aa.style.display=ka);for(var da=B.querySelectorAll(".geTempDlgLinkToDiagram"),la=0;la<da.length;la++)da[la].style.display=ka}function C(ka,da,la,ma,oa){oa||(aa.innerText="",y(),X=ka,Z=ma);var ia=null;if(la){ia=document.createElement("table"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g.ownerSVGElement.parentNode.insertBefore(this.webKitForceRepaintNode,g.ownerSVGElement))}};var N=Graph.prototype.refresh;Graph.prototype.refresh=function(){N.apply(this,arguments);this.refreshBackgroundImage()};Graph.prototype.refreshBackgroundImage=function(){null!=this.backgroundImage&&null!=this.backgroundImage.originalSrc&&(this.setBackgroundImage(this.backgroundImage),this.view.validateBackgroundImage())};var O=Graph.prototype.loadStylesheet;Graph.prototype.loadStylesheet=function(){O.apply(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
y);ImageDialog.filePicked=function(J){J.action==google.picker.Action.PICKED&&null!=J.docs[0].thumbnails&&(J=J.docs[0].thumbnails[J.docs[0].thumbnails.length-1],null!=J&&(I.value=J.url,y()));I.focus()};D.appendChild(R);D.appendChild(c);mxUtils.br(D);mxUtils.br(D);K?(R.setAttribute("checked","checked"),R.checked=!0):(E.setAttribute("checked","checked"),E.checked=!0);!L&&R.checked&&(mxUtils.write(n,mxResources.get("pageNotFound")),n.setAttribute("disabled","disabled"),n.setAttribute("selected","selected"), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"6px"):mxClient.IS_FF&&(y.style.paddingTop="0px",y.style.marginTop="-2px");if(null!=k)for(R=0;R<k.length;R++)mxUtils.br(y),mxUtils.write(y,k[R]);if(null!=e&&null==b[e]){A.style.visibility="hidden";mxUtils.setOpacity(y,10);var G=new Spinner({lines:12,length:12,width:5,radius:10,rotate:0,color:Editor.isDarkMode()?"#c0c0c0":"#000",speed:1.5,trail:60,shadow:!1,hwaccel:!1,top:"40%",zIndex:2E9});G.spin(t);var C=window.setTimeout(function(){null==b[e]&&(G.stop(),t.style.display="none")},3E4);b.addListener("clientLoaded",
mxUtils.bind(this,function(V,S){null!=b[e]&&S.getProperty("client")==b[e]&&(window.clearTimeout(C),mxUtils.setOpacity(y,100),A.style.visibility="",G.stop(),p(),"drive"==e&&null!=K.parentNode&&K.parentNode.removeChild(K))}))}else p();L.appendChild(t)}l=null!=l?l:2;var q=document.createElement("div");q.style.textAlign="center";q.style.whiteSpace="nowrap";q.style.paddingTop="0px";q.style.paddingBottom="20px";var u=document.createElement("div");u.style.border="1px solid #d3d3d3";u.style.borderWidth="1px 0px 1px 0px"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!1,!0)}finally{G.model.endUpdate()}}}catch(H){if(p)throw H;this.handleError(H)}return A};EditorUi.prototype.updatePageLinks=function(c,e){for(var k=0;k<e.length;k++)this.updatePageLinksForCell(c,e[k].root),null!=e[k].viewState&&this.updateBackgroundPageLink(c,e[k].viewState.backgroundImage)};EditorUi.prototype.updateBackgroundPageLink=function(c,e){try{if(null!=e&&Graph.isPageLink(e.originalSrc)){var k=c[e.originalSrc.substring(e.originalSrc.indexOf(",")+1)];null!=k&&(e.originalSrc="data:page/id,"+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
e.parentNode&&e.parentNode.removeChild(e)}))};var E=!1;EditorUi.prototype.initFormatWindow=function(){if(!E&&null!=this.formatWindow){E=!0;var I=this.formatWindow.window.toggleMinimized,c=240;this.formatWindow.window.toggleMinimized=function(){I.apply(this,arguments);this.minimized?(c=parseInt(this.div.style.width),this.div.style.width="140px",this.table.style.width="140px",this.div.style.left=parseInt(this.div.style.left)+c-140+"px"):(this.div.style.width=c+"px",this.table.style.width=this.div.style.width,
this.div.style.left=Math.max(0,parseInt(this.div.style.left)-c+140)+"px");this.fit()};mxEvent.addListener(this.formatWindow.window.title,"dblclick",mxUtils.bind(this,function(e){mxEvent.getSource(e)==this.formatWindow.window.title&&this.formatWindow.window.toggleMinimized()}))}};var R=EditorUi.prototype.init;EditorUi.prototype.init=function(){function I(U,X,Z){var Y=t.menus.get(U),ba=C.addMenu(mxResources.get(U),mxUtils.bind(this,function(){Y.funct.apply(this,arguments)}),G);ba.className="geMenuItem"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(g,x,F,M,P,T,W,U,X,Z){if(null!=F&&null==mxMarker.markers[F]){var Y=this.getPackageForType(F);null!=Y&&mxStencilRegistry.getStencil(Y)}return J.apply(this,arguments)};var m=mxStencil.prototype.drawShape;mxStencil.prototype.drawShape=function(g,x,F,M,P,T){"1"==mxUtils.getValue(x.style,"lineShape",null)&&g.setFillColor(mxUtils.getValue(x.style,mxConstants.STYLE_STROKECOLOR,this.stroke));return m.apply(this,arguments)};PrintDialog.prototype.create=function(g,x){function F(){fa.value=Math.max(1,
Math.min(U,Math.max(parseInt(fa.value),parseInt(ba.value))));ba.value=Math.max(1,Math.min(U,Math.min(parseInt(fa.value),parseInt(ba.value))))}function M(Ta){function Ka(ya,La,Ca,ua){var Ma=ya.useCssTransforms,Oa=ya.currentTranslate,Xa=ya.currentScale,Qa=ya.view.translate,Ra=ya.view.scale;ya.useCssTransforms&&(ya.useCssTransforms=!1,ya.currentTranslate=new mxPoint(0,0),ya.currentScale=1,ya.view.translate=new mxPoint(0,0),ya.view.scale=1);var Pa=ya.getGraphBounds(),Na=0,Ya=0,Wa=Da.get(),ab=1/ya.pageScale, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return V}),C=!0);return C};var y=p.stop;p.stop=function(){y.call(this);this.active=!1;null!=p.status&&null!=p.status.parentNode&&p.status.parentNode.removeChild(p.status);p.status=null};p.pause=function(){return function(){}};return p};EditorUi.prototype.isCompatibleString=function(c){try{var e=mxUtils.parseXml(c),k=this.editor.extractGraphModel(e.documentElement,!0);return null!=k&&0==k.getElementsByTagName("parsererror").length}catch(n){}return!1};EditorUi.prototype.isVisioData=function(c){return 8< | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
var SaveDialog=function(b,f,l,d,q){function u(y,A,G,C,V,S){V=null!=V?V:b.getTitleForService(y);var N=null;if(0<=mxUtils.indexOf(p,y)||null!=b.getServiceForName(y)){N=document.createElement("option");if(S)N.innerHTML=mxUtils.htmlEntities(V)+" – "+mxUtils.htmlEntities(mxResources.get("pickFolder"))+"...",N.setAttribute("value","pickFolder-"+y),N.setAttribute("title",V+" - "+mxResources.get("pickFolder")+"...");else{S=y+(null!=G?"-"+G:"");var O=t[S];null!=O&&null!=O.option&&
O.option.parentNode.removeChild(O.option);O=null;if(null!=A){"/"==A.charAt(A.length-1)&&(A=A.substring(0,A.length-1));"/"==A.charAt(0)&&(A=A.substring(1));O=A;var Q=O.lastIndexOf("/");0<=Q&&(O=O.substring(Q+1));25<O.length&&(O=O.substring(0,25)+"...")}N.innerHTML=(null!=O?mxUtils.htmlEntities(O)+" – ":"")+mxUtils.htmlEntities(V);N.setAttribute("title",V+(null!=A?" ("+A+")":"")+(null!=G&&decodeURIComponent(G)!=A?" ["+G+"]":""));N.setAttribute("value",S);t[S]={option:N,mode:y,
path:A,id:G};null==C&&null==G&&(C=b.mode==y);C&&N.setAttribute("selected","selected")}k.appendChild(N)}return N}function z(y){b.pickFolder(y,function(A){var G=null;y==App.MODE_GOOGLE&&null!=A.docs&&0<A.docs.length?G={mode:y,path:A.docs[0].name,id:A.docs[0].id}:y==App.MODE_ONEDRIVE&&null!=A.value&&0<A.value.length?G={mode:y,path:A.value[0].name,id:A.value[0].id}:(y==App.MODE_GITHUB||y==App.MODE_GITLAB)&&null!=A&&0<A.length&&(G={mode:y,path:decodeURIComponent(A),id:A});null!=G&&(n.style.display="", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
e.getCurrentCellStyle(J).treeMoving);return m}function u(J){var m=!1;null!=J&&(J=k.getParent(J),m=e.view.getState(J),m="tree"==(null!=m?m.style:e.getCellStyle(J)).containerType);return m}function z(J){var m=!1;null!=J&&(J=k.getParent(J),m=e.view.getState(J),e.view.getState(J),m=null!=(null!=m?m.style:e.getCellStyle(J)).childLayout);return m}function D(J){J=e.view.getState(J);if(null!=J){var m=e.getIncomingTreeEdges(J.cell);if(0<m.length&&(m=e.view.getState(m[0]),null!=m&&(m=m.absolutePoints,null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(c,e,k){var n=window.open("about:blank");null==n||null==n.document?mxUtils.popup(c,!0):("image/svg+xml"!=e||mxClient.IS_SVG?"image/svg+xml"!=e||k?(c=k?c:btoa(unescape(encodeURIComponent(c))),n.document.write('<html><img style="max-width:100%;" src="data:'+e+";base64,"+c+'"/></html>')):n.document.write("<html>"+c+"</html>"):n.document.write("<html><pre>"+mxUtils.htmlEntities(c,!1)+"</pre></html>"),n.document.close())};var d=EditorUi.prototype.addChromelessToolbarItems;EditorUi.prototype.isChromelessImageExportEnabled= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0>Z&&(Z=P.strokeWidth/2);g.setStrokeAlpha(g.state.fillAlpha);g.setStrokeColor(P.fill||"");g.setStrokeWidth(Z);g.setDashed(!1);this._drawToContext(F,M,P);g.setDashed(X);g.setStrokeWidth(W);g.setStrokeColor(T);g.setStrokeAlpha(U)};x._drawToContext=function(F,M,P){F.begin();for(var T=0;T<M.ops.length;T++){var W=M.ops[T],U=W.data;switch(W.op){case "move":F.moveTo(U[0],U[1]);break;case "bcurveTo":F.curveTo(U[0],U[1],U[2],U[3],U[4],U[5]);break;case "lineTo":F.lineTo(U[0],U[1])}}F.end();"fillPath"===M.type&&
P.filled?F.fill():F.stroke()};return x};(function(){function g(T,W,U){this.canvas=T;this.rc=W;this.shape=U;this.canvas.setLineJoin("round");this.canvas.setLineCap("round");this.originalBegin=this.canvas.begin;this.canvas.begin=mxUtils.bind(this,g.prototype.begin);this.originalEnd=this.canvas.end;this.canvas.end=mxUtils.bind(this,g.prototype.end);this.originalRect=this.canvas.rect;this.canvas.rect=mxUtils.bind(this,g.prototype.rect);this.originalRoundrect=this.canvas.roundrect;this.canvas.roundrect= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"#000000")),xa=mxUtils.setStyle(xa,mxConstants.STYLE_GRADIENTCOLOR,mxUtils.getValue(qa,mxConstants.STYLE_GRADIENTCOLOR,null)),M.getModel().isVertex(Aa[Fa])&&(xa=mxUtils.setStyle(xa,mxConstants.STYLE_FONTCOLOR,mxUtils.getValue(qa,mxConstants.STYLE_FONTCOLOR,null))));M.getModel().setStyle(Aa[Fa],xa)}}finally{M.getModel().endUpdate()}}));ea.className="geStyleButton";ea.style.width="36px";ea.style.height=10>=this.defaultColorSchemes.length?"24px":"30px";ea.style.margin="0px 6px 6px 0px";if(null!=Ba){var ha=
Editor.isDarkMode()?"2px solid":"1px solid";null!=Ba.border&&(ha=Ba.border);null!=Ba.gradient?mxClient.IS_IE&&10>document.documentMode?ea.style.filter="progid:DXImageTransform.Microsoft.Gradient(StartColorStr='"+Ba.fill+"', EndColorStr='"+Ba.gradient+"', GradientType=0)":ea.style.backgroundImage="linear-gradient("+Ba.fill+" 0px,"+Ba.gradient+" 100%)":Ba.fill==mxConstants.NONE?ea.style.background="url('"+Dialog.prototype.noColorImage+"')":ea.style.backgroundColor=""==Ba.fill?mxUtils.getValue(M.defaultVertexStyle,
mxConstants.STYLE_FILLCOLOR,Editor.isDarkMode()?Editor.darkColor:"#ffffff"):Ba.fill||mxUtils.getValue(M.defaultVertexStyle,mxConstants.STYLE_FILLCOLOR,Editor.isDarkMode()?Editor.darkColor:"#ffffff");ea.style.border=Ba.stroke==mxConstants.NONE?ha+" transparent":""==Ba.stroke?ha+" "+mxUtils.getValue(M.defaultVertexStyle,mxConstants.STYLE_STROKECOLOR,Editor.isDarkMode()?"#ffffff":Editor.darkColor):ha+" "+(Ba.stroke||mxUtils.getValue(M.defaultVertexStyle,mxConstants.STYLE_STROKECOLOR,Editor.isDarkMode()?
"#ffffff":Editor.darkColor));null!=Ba.title&&ea.setAttribute("title",Ba.title)}else{ha=mxUtils.getValue(M.defaultVertexStyle,mxConstants.STYLE_FILLCOLOR,"#ffffff");var pa=mxUtils.getValue(M.defaultVertexStyle,mxConstants.STYLE_STROKECOLOR,"#000000");ea.style.backgroundColor=ha;ea.style.border="1px solid "+pa}ea.style.borderRadius="0";P.appendChild(ea)});P.innerText="";for(var za=0;za<aa.length;za++)0<za&&0==mxUtils.mod(za,4)&&mxUtils.br(P),ra(aa[za])});null==this.format.currentScheme?Y(Math.min(U.length- | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxEvent.getClientX(J),mxEvent.getClientY(J),this.graph.getSubtree(this.state.cell));this.graph.graphHandler.cellWasClicked=!0;this.graph.isMouseTrigger=mxEvent.isMouseEvent(J);this.graph.isMouseDown=!0;c.hoverIcons.reset();mxEvent.consume(J)})))};var N=mxVertexHandler.prototype.redrawHandles;mxVertexHandler.prototype.redrawHandles=function(){N.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.style.left=this.state.x+this.state.width+(40>this.state.width?10:0)+2+"px",this.moveHandle.style.top=
this.state.y+this.state.height+(40>this.state.height?10:0)+2+"px")};var O=mxVertexHandler.prototype.setHandlesVisible;mxVertexHandler.prototype.setHandlesVisible=function(J){O.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.style.display=J?"":"none")};var Q=mxVertexHandler.prototype.destroy;mxVertexHandler.prototype.destroy=function(J,m){Q.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.parentNode.removeChild(this.moveHandle),this.moveHandle=null)}};if("undefined"!==typeof Sidebar){var l= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.isDarkMode()?{outBkgClr:Editor.darkColor,cornerClr:Editor.darkColor,strokeClr:"#505759",fontClr:"#BBBBBB",guideClr:"#0088cf"}:{outBkgClr:"#e8e9ed",cornerClr:"#fbfbfb",strokeClr:"#dadce0",fontClr:"#BBBBBB",guideClr:"#0000BB"};R.style[l?"borderRight":"borderBottom"]="0.5px solid "+E.strokeClr;R.style.borderLeft="0.5px solid "+E.strokeClr});this.updateStyle();b.diagramContainer.appendChild(R);mxEvent.disableContextMenu(R);this.editorUiRefresh=b.refresh;b.refresh=function(y){K.editorUiRefresh.apply(b,
arguments);q()};q();var I=document.createElement("canvas");I.width=R.offsetWidth;I.height=R.offsetHeight;R.style.overflow="hidden";I.style.position="relative";R.appendChild(I);var c=I.getContext("2d");this.ui=b;var e=b.editor.graph;this.graph=e;this.container=R;this.canvas=I;var k=function(y,A,G,C,V){y=Math.round(y);A=Math.round(A);G=Math.round(G);C=Math.round(C);c.beginPath();c.moveTo(y+.5,A+.5);c.lineTo(G+.5,C+.5);c.stroke();V&&(l?(c.save(),c.translate(y,A),c.rotate(-Math.PI/2),c.fillText(V,0,0), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
arguments);q()};q();var I=document.createElement("canvas");I.width=R.offsetWidth;I.height=R.offsetHeight;R.style.overflow="hidden";I.style.position="relative";R.appendChild(I);var c=I.getContext("2d");this.ui=b;var e=b.editor.graph;this.graph=e;this.container=R;this.canvas=I;var k=function(y,A,G,C,V){y=Math.round(y);A=Math.round(A);G=Math.round(G);C=Math.round(C);c.beginPath();c.moveTo(y+.5,A+.5);c.lineTo(G+.5,C+.5);c.stroke();V&&(l?(c.save(),c.translate(y,A),c.rotate(-Math.PI/2),c.fillText(V,0,0),
c.restore()):c.fillText(V,y,A))},n=function(){c.clearRect(0,0,I.width,I.height);c.beginPath();c.lineWidth=.7;c.strokeStyle=E.strokeClr;c.setLineDash([]);c.font="9px Arial";c.textAlign="center";var y=e.view.scale,A=e.view.getBackgroundPageBounds(),G=e.view.translate,C=e.pageVisible;G=C?L+(l?A.y-e.container.scrollTop:A.x-e.container.scrollLeft):L+(l?G.y*y-e.container.scrollTop:G.x*y-e.container.scrollLeft);var V=0;C&&(V=e.getPageLayout(),V=l?V.y*e.pageFormat.height:V.x*e.pageFormat.width);var S;switch(K.unit){case mxConstants.POINTS:var N= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c.shortcut):z.apply(this,arguments)};EditorUi.prototype.toggleFormatPanel=function(I){null!=this.formatWindow?this.formatWindow.window.setVisible(null!=I?I:!this.formatWindow.window.isVisible()):b(this)};EditorUi.prototype.isFormatPanelVisible=function(){return null!=this.formatWindow&&this.formatWindow.window.isVisible()||null==this.formatWindow&&0<this.formatWidth};DiagramFormatPanel.prototype.isMathOptionVisible=function(){return!0};var D=EditorUi.prototype.destroy;EditorUi.prototype.destroy=function(){this.destroyWindows(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
y);window.setTimeout(mxUtils.bind(this,function(){J()}),V)});mxEvent.addListener(S,"click",mxUtils.bind(this,function(v){var B=mxEvent.getSource(v);B!=O&&B!=Q?(null!=k&&k(),J(),mxEvent.consume(v)):m()}));window.setTimeout(mxUtils.bind(this,function(){mxUtils.setPrefixedStyle(S.style,"transform",A)}),V/2);window.setTimeout(m,p?4E3:3E4);C=!0}return C};EditorUi.prototype.setCurrentFile=function(c){null!=c&&(c.opened=new Date);this.currentFile=c};EditorUi.prototype.getCurrentFile=function(){return this.currentFile}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
v.init()}else{var B=function(H){return{id:H.id,isExt:!0,url:H.downloadUrl,title:H.title,imgUrl:H.thumbnailLink,changedBy:H.lastModifyingUserName,lastModifiedOn:H.modifiedDate}};m=new TemplatesDialog(d,function(H,g,x){var F=x.libs,M=x.clibs;d.pickFolder(d.mode,function(P){d.createFile(g,H,null!=F&&0<F.length?F:null,null,function(){d.hideDialog()},null,P,null,null!=M&&0<M.length?M:null)},null==d.stateArg||null==d.stateArg.folderId)},null,null,null,"user",function(H,g,x){var F=new Date;F.setDate(F.getDate()- | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g.ownerSVGElement.parentNode.insertBefore(this.webKitForceRepaintNode,g.ownerSVGElement))}};var N=Graph.prototype.refresh;Graph.prototype.refresh=function(){N.apply(this,arguments);this.refreshBackgroundImage()};Graph.prototype.refreshBackgroundImage=function(){null!=this.backgroundImage&&null!=this.backgroundImage.originalSrc&&(this.setBackgroundImage(this.backgroundImage),this.view.validateBackgroundImage())};var O=Graph.prototype.loadStylesheet;Graph.prototype.loadStylesheet=function(){O.apply(this,
arguments);this.currentStyle="default-style2"};Graph.prototype.handleCustomLink=function(g){"data:action/json,"==g.substring(0,17)&&(g=JSON.parse(g.substring(17)),null!=g.actions&&this.executeCustomActions(g.actions))};Graph.prototype.executeCustomActions=function(g,x){if(this.executingCustomActions)this.stoppingCustomActions=!0,null!=this.pendingWaitThread&&window.clearTimeout(this.pendingWaitThread),null!=this.pendingExecuteNextAction&&this.pendingExecuteNextAction(),this.fireEvent(new mxEventObject("stopExecutingCustomActions")); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
delete D[R];return z};EditorUi.prototype.patchViewState=function(b,f){if(null!=b.viewState&&null!=f){b==this.currentPage&&(b.viewState=this.editor.graph.getViewState());for(var l in f)try{this.patchViewStateProperty(b,f,l)}catch(d){}b==this.currentPage&&this.editor.graph.setViewState(b.viewState,!0)}};EditorUi.prototype.patchViewStateProperty=function(b,f,l){b.viewState[l]=JSON.parse(f[l])}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
M.substring(0,19)||mxClient.IS_CHROMEAPP||(M=x.apply(this,arguments)):M=PROXY_URL+"?url="+encodeURIComponent(M)}return M};return g};Editor.createSvgDataUri=function(g){return"data:image/svg+xml;base64,"+btoa(unescape(encodeURIComponent(g)))};Editor.prototype.convertImageToDataUri=function(g,x){try{var F=!0,M=window.setTimeout(mxUtils.bind(this,function(){F=!1;x(Editor.svgBrokenImage.src)}),this.timeout);if(/(\.svg)$/i.test(g))mxUtils.get(g,mxUtils.bind(this,function(T){window.clearTimeout(M);F&&x(Editor.createSvgDataUri(T.getText()))}), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null!=wa&&null!=wa.originalSrc&&(wa=g.createImageForPageLink(wa.originalSrc,ja));ka.background=va;ka.backgroundImage=null!=wa?new mxImage(wa.src,wa.width,wa.height,wa.x,wa.y):null;ka.pageVisible=da;ka.mathEnabled=oa;var Ja=ka.getGraphBounds;ka.getGraphBounds=function(){var ya=Ja.apply(this,arguments),La=this.backgroundImage;if(null!=La&&null!=La.width&&null!=La.height){var Ca=this.view.translate,ua=this.view.scale;ya=mxRectangle.fromRectangle(ya);ya.add(new mxRectangle((Ca.x+La.x)*ua,(Ca.y+La.y)*
ua,La.width*ua,La.height*ua))}return ya};var Ha=ka.getGlobalVariable;ka.getGlobalVariable=function(ya){return"page"==ya?ja.getName():"pagenumber"==ya?ia+1:"pagecount"==ya?null!=g.pages?g.pages.length:1:Ha.apply(this,arguments)};document.body.appendChild(ka.container);g.updatePageRoot(ja);ka.model.setRoot(ja.root)}ma=Ka(ka,ma,ia!=la,ja.getId());ka!=P&&ka.container.parentNode.removeChild(ka.container)}}else ma=Ka(P);null==ma||null==ma.wnd?g.handleError({message:mxResources.get("errorUpdatingPreview")}): | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
t.scrollCellToVisible(t.getSelectionCell())}}}else{Q=function(B){var H=m[B];null==H&&(H=new mxCell(B,new mxGeometry(0,0,80,30),"whiteSpace=wrap;html=1;"),H.vertex=!0,m[B]=H,C.push(H));return H};var m={};C=[];for(A=0;A<n.length;A++)if(";"!=n[A].charAt(0)){var v=n[A].split("->");2<=v.length&&(O=Q(v[0]),J=Q(v[v.length-1]),v=new mxCell(2<v.length?v[1]:"",new mxGeometry),v.edge=!0,O.insertEdge(v,!0),J.insertEdge(v,!1),C.push(v))}if(0<C.length){n=document.createElement("div");n.style.visibility="hidden"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c?c:"",extras:JSON.stringify(p),scale:y,border:A,w:S&&isFinite(S)?S:null,h:N&&isFinite(N)?N:null}};EditorUi.prototype.setMode=function(c,e){this.mode=c};EditorUi.prototype.getDiagramId=function(){var c=window.location.hash;null!=c&&0<c.length&&(c=c.substring(1));if(null!=c&&1<c.length){var e=c.indexOf("#");0<=e&&(c=c.substring(0,e))}return c};EditorUi.prototype.getHashObject=function(){var c=window.location.hash,e={};if(null!=c&&0<c.length){var k=c.lastIndexOf("#");if(0<k){c=decodeURIComponent(c.substring(k+
1));try{e=JSON.parse(c)}catch(n){}}}return e};EditorUi.prototype.updateHashObject=function(){if(null!=this.currentFile&&""!=this.currentFile.getHash()&&null!=this.currentPage&&0<this.getSelectedPageIndex()){var c=this.getHashObject();c.pageId=this.currentPage.getId();this.setHashObject(c)}else this.setHashObject(null)};EditorUi.prototype.setHashObject=function(c){if(Editor.enableHashObjects){var e=window.location.hash;if(null==e||""==e)e="#";var k=e.lastIndexOf("#");0<k&&(e=e.substring(0,k));try{null== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"https://app.diagrams.net/";var y=c.editor.getEditBlankUrl;this.editor.getEditBlankUrl=function(B){B=null!=B?B:"";"1"==urlParams.dev&&(B+=(0<B.length?"&":"?")+"dev=1");return y.apply(this,arguments)};var A=e.addClickHandler;e.addClickHandler=function(B,H,g){var x=H;H=function(F,M){if(null==M){var P=mxEvent.getSource(F);"a"==P.nodeName.toLowerCase()&&(M=P.getAttribute("href"))}null!=M&&e.isCustomLink(M)&&(mxEvent.isTouchEvent(F)||!mxEvent.isPopupTrigger(F))&&e.customLinkClicked(M)&&mxEvent.consume(F);
null!=x&&x(F,M)};A.call(this,B,H,g)};u.apply(this,arguments);mxClient.IS_SVG&&this.editor.graph.addSvgShadow(e.view.canvas.ownerSVGElement,null,!0);if(null!=this.menus){var G=Menus.prototype.addPopupMenuItems;this.menus.addPopupMenuItems=function(B,H,g){e.isSelectionEmpty()&&"simple"==Editor.currentTheme&&this.addMenuItems(B,["zoomIn","zoomOut","-"],null,g);G.apply(this,arguments);e.isSelectionEmpty()||null==c.addSelectionToScratchpad||this.addMenuItems(B,["-","addToScratchpad"],null,g);e.isSelectionEmpty()&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0;e<this.pages.length;e++)this.updatePageRoot(this.pages[e]),this.addBasenamesForCell(this.pages[e].root,c);else this.addBasenamesForCell(this.editor.graph.model.getRoot(),c);e=[];for(var k in c)e.push(k);return e};EditorUi.prototype.addBasenamesForCell=function(c,e){function k(y){if(null!=y){var A=y.lastIndexOf(".");0<A&&(y=y.substring(A+1,y.length));null==e[y]&&(e[y]=!0)}}var n=this.editor.graph,p=n.getCellStyle(c);k(mxStencilRegistry.getBasenameForStencil(p[mxConstants.STYLE_SHAPE]));n.model.isEdge(c)&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0;za<this.customFonts.length;za++)if(this.customFonts[za].name==ca){ra=!1;break}ra&&(this.customFonts.push({name:ca,url:aa}),this.editorUi.fireEvent(new mxEventObject("customFontsChanged","customFonts",this.customFonts)))}finally{U.getModel().endUpdate()}}}));this.editorUi.showDialog(Z.container,380,Editor.enableWebFonts?250:180,!0,!0);Z.init()}),v,null,!0)})))}})();function DiagramPage(b,f){this.node=b;null!=f?this.node.setAttribute("id",f):null==this.getId()&&this.node.setAttribute("id",Editor.guid())}DiagramPage.prototype.node=null;DiagramPage.prototype.root=null;DiagramPage.prototype.viewState=null;DiagramPage.prototype.getId=function(){return this.node.getAttribute("id")};DiagramPage.prototype.getName=function(){return this.node.getAttribute("name")}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
path:A,id:G};null==C&&null==G&&(C=b.mode==y);C&&N.setAttribute("selected","selected")}k.appendChild(N)}return N}function z(y){b.pickFolder(y,function(A){var G=null;y==App.MODE_GOOGLE&&null!=A.docs&&0<A.docs.length?G={mode:y,path:A.docs[0].name,id:A.docs[0].id}:y==App.MODE_ONEDRIVE&&null!=A.value&&0<A.value.length?G={mode:y,path:A.value[0].name,id:A.value[0].id}:(y==App.MODE_GITHUB||y==App.MODE_GITLAB)&&null!=A&&0<A.length&&(G={mode:y,path:decodeURIComponent(A),id:A});null!=G&&(n.style.display="",
b.addRecent(G,"Folders"),A=u(G.mode,G.path,G.id,!0),A.parentNode.firstChild!=A&&A.parentNode.insertBefore(A,A.parentNode.firstChild))},!0,!0,!0,!0)}function D(){var y=b.getRecent("Folders");if(null!=y&&0<y.length){for(var A=0;A<y.length;A++)u(y[A].mode,y[A].path,y[A].id);n.style.display=""}else n.style.display="none";u(App.MODE_GOOGLE,mxResources.get("myDrive"));u(App.MODE_GOOGLE,null,null,null,null,!0);u(App.MODE_ONEDRIVE,mxResources.get("myFiles"));u(App.MODE_ONEDRIVE,null,null,null,null,!0);null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.pasteCells(t,k,!0,!0)),!mxEvent.isConsumed(t)){var y=e.container.scrollLeft,A=e.container.scrollTop;window.setTimeout(mxUtils.bind(this,function(){try{e.container.scrollLeft=y,e.container.scrollTop=A,Graph.removePasteFormatting(k.firstChild),this.pasteCells(t,k,!1,!0)}catch(G){this.handleError(G)}}),0)}}catch(G){this.handleError(G)}}),!0);var p=this.isSelectionAllowed;this.isSelectionAllowed=function(t){return mxEvent.getSource(t)==k?!0:p.apply(this,arguments)}};EditorUi.prototype.setCurrentTheme= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.patchPages=function(b,f,l,d,q){var u={},z=[],D={},L={},K={},E={};if(null!=d&&null!=d[EditorUi.DIFF_UPDATE])for(var R in d[EditorUi.DIFF_UPDATE])u[R]=d[EditorUi.DIFF_UPDATE][R];if(null!=f[EditorUi.DIFF_REMOVE])for(d=0;d<f[EditorUi.DIFF_REMOVE].length;d++)L[f[EditorUi.DIFF_REMOVE][d]]=!0;if(null!=f[EditorUi.DIFF_INSERT])for(d=0;d<f[EditorUi.DIFF_INSERT].length;d++)D[f[EditorUi.DIFF_INSERT][d].previous]=f[EditorUi.DIFF_INSERT][d];if(null!=f[EditorUi.DIFF_UPDATE])for(R in f[EditorUi.DIFF_UPDATE])d=
f[EditorUi.DIFF_UPDATE][R],null!=d.previous&&(E[d.previous]=R);if(null!=b){var I="";for(d=0;d<b.length;d++){var c=b[d].getId();K[c]=b[d];null!=E[I]||L[c]||null!=f[EditorUi.DIFF_UPDATE]&&null!=f[EditorUi.DIFF_UPDATE][c]&&null!=f[EditorUi.DIFF_UPDATE][c].previous||(E[I]=c);I=c}}var e={},k=mxUtils.bind(this,function(p){var t=null!=p?p.getId():"";if(null!=p&&!e[t]){e[t]=!0;z.push(p);var y=null!=f[EditorUi.DIFF_UPDATE]?f[EditorUi.DIFF_UPDATE][t]:null;null!=y&&(this.updatePageRoot(p),null!=y.name&&p.setName(y.name),
null!=y.view&&this.patchViewState(p,y.view),null!=y.cells&&this.patchPage(p,y.cells,u[p.getId()],q),!l||null==y.cells&&null==y.view||(p.needsUpdate=!0))}p=E[t];null!=p&&(delete E[t],k(K[p]));p=D[t];null!=p&&(delete D[t],n(p))}),n=mxUtils.bind(this,function(p){p=mxUtils.parseXml(p.data).documentElement;p=new DiagramPage(p);this.updatePageRoot(p);var t=K[p.getId()];null==t?k(p):(this.patchPage(t,this.diffPages([t],[p]),u[t.getId()],q),l&&(t.needsUpdate=!0))});k();for(R in E)k(K[E[R]]),delete E[R];for(R in D)n(D[R]),
delete D[R];return z};EditorUi.prototype.patchViewState=function(b,f){if(null!=b.viewState&&null!=f){b==this.currentPage&&(b.viewState=this.editor.graph.getViewState());for(var l in f)try{this.patchViewStateProperty(b,f,l)}catch(d){}b==this.currentPage&&this.editor.graph.setViewState(b.viewState,!0)}};EditorUi.prototype.patchViewStateProperty=function(b,f,l){b.viewState[l]=JSON.parse(f[l])}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.write(n,"?"),mxEvent.addGestureListeners(n,mxUtils.bind(this,function(B){this.openLink(EditorUi.scratchpadHelpLink);mxEvent.consume(B)})),V.insertBefore(n,V.firstChild))}C.appendChild(V);C.style.paddingRight=18*V.childNodes.length+"px"}};EditorUi.prototype.addLibraryEntries=function(c,e){for(var k=0;k<c.length;k++){var n=c[k],p=n.data;if(null!=p){p=this.convertDataUri(p);var t="shape=image;verticalLabelPosition=bottom;verticalAlign=top;imageAspect=0;";"fixed"==n.aspect&&(t+="aspect=fixed;");
e.appendChild(this.sidebar.createVertexTemplate(t+"image="+p,n.w,n.h,"",n.title||"",!1,null,!0))}else null!=n.xml&&(p=this.stringToCells("<"==n.xml.charAt(0)?n.xml:Graph.decompress(n.xml)),0<p.length&&e.appendChild(this.sidebar.createVertexTemplateFromCells(p,n.w,n.h,n.title||"",!0,null,!0)))}};EditorUi.prototype.getResource=function(c){return null!=c?c[mxLanguage]||c.main:null};EditorUi.prototype.footerHeight=0;"1"==urlParams.savesidebar&&(Sidebar.prototype.thumbWidth=64,Sidebar.prototype.thumbHeight= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(c){return 1!=c};EditorUi.prototype.getEditBlankXml=function(){return this.getFileData(!0)};EditorUi.prototype.exportFile=function(c,e,k,n,p,t){};EditorUi.prototype.getServiceForName=function(c){return null};EditorUi.prototype.getTitleForService=function(c){return mxResources.get(c)};EditorUi.prototype.pickFolder=function(c,e,k){e(null)};EditorUi.prototype.exportSvg=function(c,e,k,n,p,t,y,A,G,C,V,S,N,O){if(this.spinner.spin(document.body,mxResources.get("export")))try{var Q=this.editor.graph.isSelectionEmpty(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"...",c[p])})))};EditorUi.prototype.installFormatToolbar=function(I){var c=this.editor.graph,e=document.createElement("div");e.style.cssText="position:absolute;top:10px;z-index:1;border-radius:4px;box-shadow:0px 0px 3px 1px #d1d1d1;padding:6px;white-space:nowrap;background-color:#fff;transform:translate(-50%, 0);left:50%;";c.getSelectionModel().addListener(mxEvent.CHANGE,mxUtils.bind(this,function(k,n){0<c.getSelectionCount()?(I.appendChild(e),e.innerHTML="Selected: "+c.getSelectionCount()):null!=
e.parentNode&&e.parentNode.removeChild(e)}))};var E=!1;EditorUi.prototype.initFormatWindow=function(){if(!E&&null!=this.formatWindow){E=!0;var I=this.formatWindow.window.toggleMinimized,c=240;this.formatWindow.window.toggleMinimized=function(){I.apply(this,arguments);this.minimized?(c=parseInt(this.div.style.width),this.div.style.width="140px",this.table.style.width="140px",this.div.style.left=parseInt(this.div.style.left)+c-140+"px"):(this.div.style.width=c+"px",this.table.style.width=this.div.style.width, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null!=aa&&(this.shapeBackgroundColor=za,this.shapeForegroundColor=ra,this.stylesheet=aa,this.refresh());return Ba};var G=mxCellRenderer.prototype.destroy;mxCellRenderer.prototype.destroy=function(g){G.apply(this,arguments);null!=g.secondLabel&&(g.secondLabel.destroy(),g.secondLabel=null)};mxCellRenderer.prototype.getShapesForState=function(g){return[g.shape,g.text,g.secondLabel,g.control]};var C=mxGraphView.prototype.resetValidationState;mxGraphView.prototype.resetValidationState=function(){C.apply(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
JSON.parse(x.substring(17));null!=F.actions&&(this.updateCustomLinkActions(g,F.actions),x="data:action/json,"+JSON.stringify(F))}catch(M){}return x};Graph.prototype.updateCustomLinkActions=function(g,x){for(var F=0;F<x.length;F++){var M=x[F],P;for(P in M)this.updateCustomLinkAction(g,M[P],"cells"),this.updateCustomLinkAction(g,M[P],"excludeCells")}};Graph.prototype.updateCustomLinkAction=function(g,x,F){if(null!=x&&null!=x[F]){for(var M=[],P=0;P<x[F].length;P++)if("*"==x[F][P])M.push(x[F][P]);else{var T=
g[x[F][P]];null!=T?""!=T&&M.push(T):M.push(x[F][P])}x[F]=M}};Graph.prototype.getCellsForAction=function(g,x){x=this.getCellsById(g.cells).concat(this.getCellsForTags(g.tags,null,x));if(null!=g.excludeCells){for(var F=[],M=0;M<x.length;M++)0>g.excludeCells.indexOf(x[M].id)&&F.push(x[M]);x=F}return x};Graph.prototype.getCellsById=function(g){var x=[];if(null!=g)for(var F=0;F<g.length;F++)if("*"==g[F]){var M=this.model.getRoot();x=x.concat(this.model.filterDescendants(function(T){return T!=M},M))}else{var P= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0;T<W.length;T++)W[T].parentNode.removeChild(W[T]);R(g);g.style.opacity="0.5"}else{W=B(N).replies;for(T=0;T<W.length;T++)t.removeChild(W[T]);for(T=0;T<O.length;T++)if(O[T]==N){O.splice(T,1);break}y.style.display=0==t.getElementsByTagName("div").length?"block":"none"}},function(T){E(g);b.handleError(T,null,null,null,mxUtils.htmlEntities(mxResources.get("objectNotFound")))})})},N.isResolved));c||N.isLocked||0!=J||v(N.isResolved?mxResources.get("reopen"):mxResources.get("resolve"),function(T){function W(){var U=
T.target;U.innerText="";N.isResolved=!N.isResolved;mxUtils.write(U,N.isResolved?mxResources.get("reopen"):mxResources.get("resolve"));for(var X=N.isResolved?"none":"",Z=B(N).replies,Y=Editor.isDarkMode()?"transparent":N.isResolved?"ghostWhite":"white",ba=0;ba<Z.length;ba++){Z[ba].style.backgroundColor=Y;for(var fa=Z[ba].querySelectorAll(".geCommentAction"),ca=0;ca<fa.length;ca++)fa[ca]!=U.parentNode&&(fa[ca].style.display=X);C||(Z[ba].style.display="none")}z()}N.isResolved?H(mxResources.get("reOpened")+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Oa+" ("+Xa.length+")",Ra=Oa=mxUtils.htmlEntities(Oa);15<Oa.length&&(Oa=Oa.substring(0,15)+"…");return{lbl:Oa+" ("+Xa.length+")",fullLbl:Qa,lblOnly:Ra}}function oa(Oa,Xa,Qa,Ra,Pa){mxEvent.addListener(Qa,"click",function(){x!=Qa&&(null!=x?(x.style.fontWeight="normal",x.style.textDecoration="none"):(ha.style.display="none",ea.style.minHeight="100%"),x=Qa,x.style.fontWeight="bold",x.style.textDecoration="underline",Ba.scrollTop=0,H&&(g=!0),ra.innerHTML=Xa,za.style.display="none",C(Pa?da[Oa]:Ra?
Ea[Oa][Ra]:ka[Oa],Pa?!1:!0))})}var ia=B.querySelector(".geTemplatesList");if(0<la){la=document.createElement("div");la.style.cssText="font-weight: bold;background: #f9f9f9;padding: 5px 0 5px 0;text-align: center;margin-top: 10px;";mxUtils.write(la,mxResources.get("custom"));ia.appendChild(la);for(var ja in da){la=document.createElement("div");var va=da[ja];va=ma(ja,va);la.className="geTemplateCatLink";la.setAttribute("title",va.fullLbl);la.innerHTML=va.lbl;ia.appendChild(la);oa(ja,va.lblOnly,la,null, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.originalQuadTo.apply(this.canvas,arguments):(this.addOp(this.quadOp,T,W,U,X),this.lastX=U,this.lastY=X)};g.prototype.curveTo=function(T,W,U,X,Z,Y){this.passThrough?this.originalCurveTo.apply(this.canvas,arguments):(this.addOp(this.curveOp,T,W,U,X,Z,Y),this.lastX=Z,this.lastY=Y)};g.prototype.arcTo=function(T,W,U,X,Z,Y,ba){if(this.passThrough)this.originalArcTo.apply(this.canvas,arguments);else{var fa=mxUtils.arcToCurves(this.lastX,this.lastY,T,W,U,X,Z,Y,ba);if(null!=fa)for(var ca=0;ca<fa.length;ca+= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
}finally{e.getModel().endUpdate()}t&&(e.setSelectionCell(k),e.scrollCellToVisible(k))}};l=mxUtils.button(mxResources.get("preview"),function(){c(E,R,!1)});l.className="geBtn";L.appendChild(l);l=mxUtils.button(mxResources.get("apply"),function(){c(b.editor.graph,f,!0)});l.className="geBtn gePrimaryBtn";L.appendChild(l);b.editor.cancelFirst||L.appendChild(q);D.appendChild(L);z.appendChild(D);u.appendChild(z);this.container=u},CustomDialog=function(b,f,l,d,q,u,z,D,L,K,E,R){var I=document.createElement("div");
I.appendChild(f);var c=document.createElement("div");c.style.marginTop=null!=R?R:"30px";c.style.textAlign="center";null!=z&&c.appendChild(z);b.isOffline()||null==u||(f=mxUtils.button(mxResources.get("help"),function(){b.openLink(u)}),f.className="geBtn",c.appendChild(f));L=mxUtils.button(L||mxResources.get("cancel"),function(){b.hideDialog();null!=d&&d()});L.className="geBtn";D&&(L.style.display="none");b.editor.cancelFirst&&c.appendChild(L);q=mxUtils.button(q||mxResources.get("ok"),mxUtils.bind(this,
function(){K||b.hideDialog(null,null,this.container);if(null!=l){var e=l();if("string"===typeof e){b.showError(mxResources.get("error"),e);return}}K&&b.hideDialog(null,null,this.container)}));c.appendChild(q);q.className="geBtn gePrimaryBtn";b.editor.cancelFirst||c.appendChild(L);if(null!=E)for(D=0;D<E.length;D++)(function(e,k,n){e=mxUtils.button(e,function(p){k(p)});null!=n&&e.setAttribute("title",n);e.className="geBtn";c.appendChild(e)})(E[D][0],E[D][1],E[D][2]);I.appendChild(c);this.cancelBtn=
L;this.okButton=q;this.container=I},TemplatesDialog=function(b,f,l,d,q,u,z,D,L,K,E,R,I,c,e){function k(ka){xa.innerText=ka;xa.style.display="block";setTimeout(function(){xa.style.display="none"},4E3)}function n(){null!=x&&(x.style.fontWeight="normal",x.style.textDecoration="none",F=x,x=null)}function p(ka,da,la,ma,oa,ia,ja){if(-1<ka.className.indexOf("geTempDlgRadioBtnActive"))return!1;ka.className+=" geTempDlgRadioBtnActive";B.querySelector(".geTempDlgRadioBtn[data-id="+ma+"]").className="geTempDlgRadioBtn "+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Math.round(25*Math.random()))):/\s/.test(p)?k.push(" "):k.push("?"):k.push(e?"0":Math.round(9*Math.random()))}return k.join("")};EditorUi.prototype.anonymizePatch=function(c){if(null!=c[EditorUi.DIFF_INSERT])for(var e=0;e<c[EditorUi.DIFF_INSERT].length;e++)try{var k=mxUtils.parseXml(c[EditorUi.DIFF_INSERT][e].data).documentElement.cloneNode(!1);null!=k.getAttribute("name")&&k.setAttribute("name",this.anonymizeString(k.getAttribute("name")));c[EditorUi.DIFF_INSERT][e].data=mxUtils.getXml(k)}catch(t){c[EditorUi.DIFF_INSERT][e].data=
t.message}if(null!=c[EditorUi.DIFF_UPDATE]){for(var n in c[EditorUi.DIFF_UPDATE]){var p=c[EditorUi.DIFF_UPDATE][n];null!=p.name&&(p.name=this.anonymizeString(p.name));null!=p.cells&&(e=mxUtils.bind(this,function(t){var y=p.cells[t];if(null!=y){for(var A in y)null!=y[A].value&&(y[A].value="["+y[A].value.length+"]"),null!=y[A].xmlValue&&(y[A].xmlValue="["+y[A].xmlValue.length+"]"),null!=y[A].style&&(y[A].style="["+y[A].style.length+"]"),mxUtils.isEmptyObject(y[A])&&delete y[A];mxUtils.isEmptyObject(y)&&
delete p.cells[t]}}),e(EditorUi.DIFF_INSERT),e(EditorUi.DIFF_UPDATE),mxUtils.isEmptyObject(p.cells)&&delete p.cells);mxUtils.isEmptyObject(p)&&delete c[EditorUi.DIFF_UPDATE][n]}mxUtils.isEmptyObject(c[EditorUi.DIFF_UPDATE])&&delete c[EditorUi.DIFF_UPDATE]}return c};EditorUi.prototype.anonymizeAttributes=function(c,e){if(null!=c.attributes)for(var k=0;k<c.attributes.length;k++)"as"!=c.attributes[k].name&&c.setAttribute(c.attributes[k].name,this.anonymizeString(c.attributes[k].value,e));if(null!=c.childNodes)for(k= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
K.length-1);0<K.length&&za(K[E]);if(1<K.length)for(B.removeAttribute("disabled"),B.style.display="",ca=0;ca<K.length;ca++)aa=document.createElement("option"),ra=K[ca].getAttribute("name")||mxResources.get("pageWithNumber",[ca+1]),mxUtils.write(aa,ra),aa.setAttribute("title",ra+" ("+K[ca].getAttribute("id")+")"),aa.setAttribute("value",ca),ca==E&&aa.setAttribute("selected","selected"),B.appendChild(aa);H=function(){try{var ea=parseInt(B.value);E=L=ea;za(K[ea])}catch(ha){B.value=L,b.handleError(ha)}}}else Ba(ra); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null,null,null,mxUtils.htmlEntities(mxResources.get("objectNotFound")))},X,Z)}function ba(){D(ca,aa,function(ra){Y()},!0)}var fa=B().pdiv,ca=b.newComment(T,b.getCurrentUser());ca.pCommentId=N.id;null==N.replies&&(N.replies=[]);var aa=I(ca,N.replies,fa,J+1);W?ba():Y()}if(m||!N.isResolved){y.style.display="none";var g=document.createElement("div");g.className="geCommentContainer";g.setAttribute("data-commentId",N.id);g.style.marginLeft=20*J+5+"px";N.isResolved&&!Editor.isDarkMode()&&(g.style.backgroundColor= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"...",function(){var Z=[{layout:"mxOrgChartLayout",config:{branchOptimizer:parseInt(P.value),parentChildSpacing:parseInt(U.value),siblingSpacing:parseInt(X.value)}}];d.hideDialog();d.showCustomLayoutDialog(JSON.stringify(Z,null,2))});M.className="geBtn";F=new CustomDialog(d,F,function(){null==B&&(B=2);d.loadOrgChartLayouts(x)},null,null,null,M);d.showDialog(F.container,355,140,!0,!0)},v,null,u());m.addSeparator(v);m.addItem(mxResources.get("parallels"),null,mxUtils.bind(this,function(){d.tryAndHandle(mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
libs:ka.getAttribute("libs"),clibs:ka.getAttribute("clibs"),title:ka.getAttribute("title")}),ka=ka.nextSibling;V(Ka)}});var Va=function(ka,da,la){za.style.display="";Ga.stop();H=!1;if(g)g=!1;else if(da)aa.innerText=da;else{la=la||{};da=0;for(var ma in la)da+=la[ma].length;0==ka.length&&0==da?aa.innerText=mxResources.get("noDiagrams"):C(ka,!1,U,0==da?null:la)}};O(W);var Ua=null;mxEvent.addListener(Fa,"keyup",m);mxEvent.addListener(Fa,"search",m);mxEvent.addListener(Fa,"input",m);mxEvent.addListener(na, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return M};Editor.getDiagramNodeXml=function(g){var x=mxUtils.getTextContent(g),F=null;0<x.length?F=Graph.decompress(x):null!=g.firstChild&&(F=mxUtils.getXml(g.firstChild));return F};Editor.extractGraphModelFromPdf=function(g){g=g.substring(g.indexOf(",")+1);g=window.atob&&!mxClient.IS_SF?atob(g):Base64.decode(g,!0);if("%PDF-1.7"==g.substring(0,8)){var x=g.indexOf("EmbeddedFile");if(-1<x){var F=g.indexOf("stream",x)+9;if(0<g.substring(x,F).indexOf("application#2Fvnd.jgraph.mxfile"))return x=g.indexOf("endstream",
F-1),pako.inflateRaw(Graph.stringToArrayBuffer(g.substring(F,x)),{to:"string"})}return null}F=null;x="";for(var M=0,P=0,T=[],W=null;P<g.length;){var U=g.charCodeAt(P);P+=1;10!=U&&(x+=String.fromCharCode(U));U=="/Subject (%3Cmxfile".charCodeAt(M)?M++:M=0;if(19==M){var X=g.indexOf("%3C%2Fmxfile%3E)",P)+15;P-=9;if(X>P){F=g.substring(P,X);break}}10==U&&("endobj"==x?W=null:"obj"==x.substring(x.length-3,x.length)||"xref"==x||"trailer"==x?(W=[],T[x.split(" ")[0]]=W):null!=W&&W.push(x),x="")}null==F&&(F=
Editor.extractGraphModelFromXref(T));null!=F&&(F=decodeURIComponent(F.replace(/\\\(/g,"(").replace(/\\\)/g,")")));return F};Editor.extractGraphModelFromXref=function(g){var x=g.trailer,F=null;null!=x&&(x=/.* \/Info (\d+) (\d+) R/g.exec(x.join("\n")),null!=x&&0<x.length&&(x=g[x[1]],null!=x&&(x=/.* \/Subject (\d+) (\d+) R/g.exec(x.join("\n")),null!=x&&0<x.length&&(g=g[x[1]],null!=g&&(g=g.join("\n"),F=g.substring(1,g.length-1))))));return F};Editor.extractParserError=function(g,x){var F=null;g=null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Da.style.background=sa&&"none"!=sa?sa:"url('"+Dialog.prototype.noColorImage+"')";btn=mxUtils.button("",mxUtils.bind(Y,function(Ea){this.editorUi.pickColor(sa,function(Ta){Da.style.background="none"==Ta?"url('"+Dialog.prototype.noColorImage+"')":Ta;M(qa,Ta,ta)});mxEvent.consume(Ea)}));btn.style.height="12px";btn.style.width="40px";btn.className="geColorBtn";btn.appendChild(Da);return btn}function W(qa,sa,ta,Da,Ea,Ta,Ka){null!=sa&&(sa=sa.split(","),fa.push({name:qa,values:sa,type:ta,defVal:Da,countProperty:Ea,
parentRow:Ta,isDeletable:!0,flipBkg:Ka}));btn=mxUtils.button("+",mxUtils.bind(Y,function(Sa){for(var Ia=Ta,Va=0;null!=Ia.nextSibling;)if(Ia.nextSibling.getAttribute("data-pName")==qa)Ia=Ia.nextSibling,Va++;else break;var Ua={type:ta,parentRow:Ta,index:Va,isDeletable:!0,defVal:Da,countProperty:Ea};Va=Z(qa,"",Ua,0==Va%2,Ka);M(qa,Da,Ua);Ia.parentNode.insertBefore(Va,Ia.nextSibling);mxEvent.consume(Sa)}));btn.style.height="16px";btn.style.width="25px";btn.className="geColorBtn";return btn}function U(qa, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.editor.setStatus(""),c?e.reloadFile(mxUtils.bind(this,function(){e.handleFileSuccess("manual"==DrawioFile.SYNC)}),mxUtils.bind(this,function(k){e.handleFileError(k,!0)})):e.synchronizeFile(mxUtils.bind(this,function(){e.handleFileSuccess("manual"==DrawioFile.SYNC)}),mxUtils.bind(this,function(k){e.handleFileError(k,!0)}))))};EditorUi.prototype.getFileData=function(c,e,k,n,p,t,y,A,G,C,V){p=null!=p?p:!0;t=null!=t?t:!1;C=null!=C?C:!Editor.defaultCompressed;var S=this.editor.graph;if(e||!c&&null!=
G&&/(\.svg)$/i.test(G.getTitle())){var N=null!=S.themes&&"darkTheme"==S.defaultThemeName;if(N||null!=this.pages&&this.currentPage!=this.pages[0]){var O=S.getGlobalVariable;S=this.createTemporaryGraph(N?S.getDefaultStylesheet():S.getStylesheet());S.setBackgroundImage=this.editor.graph.setBackgroundImage;S.background=this.editor.graph.background;var Q=null!=this.pages?this.pages[0]:null;null==Q||this.currentPage==Q?S.setBackgroundImage(this.editor.graph.backgroundImage):null!=Q.viewState&&null!=Q.viewState&&
S.setBackgroundImage(Q.viewState.backgroundImage);S.getGlobalVariable=function(J){return"page"==J&&null!=Q?Q.getName():"pagenumber"==J?1:O.apply(this,arguments)};document.body.appendChild(S.container);null!=Q&&S.model.setRoot(Q.root)}}y=null!=y?y:this.getXmlFileData(p,t,C,V);G=null!=G?G:this.getCurrentFile();c=this.createFileData(y,S,G,window.location.href,c,e,k,n,p,A,C);S!=this.editor.graph&&S.container.parentNode.removeChild(S.container);return c};EditorUi.prototype.getHtml=function(c,e,k,n,p,t){t= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.bind(this,function(ea){4==ea.readyState&&(200<=ea.status&&299>=ea.status&&"<mxGraphModel"==ea.responseText.substring(0,13)?Ba(ea.responseText,G):this.handleError({message:413==ea.status?mxResources.get("diagramTooLarge"):mxResources.get("unknownError")}))}),""):null!=C&&"function"===typeof C.substring&&this.isLucidChartData(C)?this.convertLucidChart(C,mxUtils.bind(this,function(ea){Ba(ea)}),mxUtils.bind(this,function(ea){this.handleError(ea)})):null==C||"object"!==typeof C||null==C.format||
null==C.data&&null==C.url?(C=S(C),Ba(C,G)):this.loadDescriptor(C,mxUtils.bind(this,function(ea){Ba(za(),G)}),mxUtils.bind(this,function(ea){this.handleError(ea,mxResources.get("errorLoadingFile"))}))}}));var y=window.opener||window.parent;t="json"==urlParams.proto?JSON.stringify({event:"init"}):urlParams.ready||"ready";y.postMessage(t,"*");if("json"==urlParams.proto){var A=this.editor.graph.openLink;this.editor.graph.openLink=function(G,C,V){A.apply(this,arguments);y.postMessage(JSON.stringify({event:"openLink", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
typeof mxMermaidToDrawio)ea=ca=ua;ua=g.cloneNode(!0);ma.appendChild(ua);Ma=function(Pa){M=null!=b.sidebar.tooltip&&"none"!=b.sidebar.tooltip.style.display};Oa=function(Pa){M||y(Ra,mxEvent.getClientX(Pa),mxEvent.getClientY(Pa),Qa,Ca)};mxEvent.addGestureListeners(Qa,Ma,null,Oa);mxEvent.addGestureListeners(ua,Ma,null,Oa)},function(ua){b.handleError(ua)})});Ja.setAttribute("disabled","disabled");Ja.className="geBtn gePrimaryBtn";oa=function(){window.setTimeout(function(){""!=la.value?Ja.removeAttribute("disabled"): | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
F=[];if(0<P.length){P=P.split(" ");for(var T={},W=0;W<P.length;W++)if(null==x||null!=x[P[W]])T[P[W]]=!0,F.push(P[W]);x=T}else return[]}return F};Graph.prototype.getTagsForCells=function(g){for(var x=[],F={},M=0;M<g.length;M++){var P=this.getTagsForCell(g[M]);if(0<P.length){P=P.split(" ");for(var T=0;T<P.length;T++)null==F[P[T]]&&(F[P[T]]=!0,x.push(P[T]))}}return x};Graph.prototype.getTagsForCell=function(g){return this.getAttributeForCell(g,"tags","")};Graph.prototype.addTagsForCells=function(g,x){if(0< | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l?E=new mxHierarchicalLayout(u,mxConstants.DIRECTION_WEST):"circle"==l?E=new mxCircleLayout(u):(E=new mxFastOrganicLayout(u,!1),E.forceConstant=80);if(null!=E){var R=function(k,n){u.getModel().beginUpdate();try{null!=k&&k(),E.execute(u.getDefaultParent(),K)}catch(p){throw p;}finally{k=new mxMorphing(u),k.addListener(mxEvent.DONE,mxUtils.bind(this,function(){u.getModel().endUpdate();null!=n&&n()})),k.startAnimation()}},I=mxEdgeHandler.prototype.connect;mxEdgeHandler.prototype.connect=function(k,n, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
ia()},ia=function(){P=ja;na.className="geTempDlgCreateBtn";da&&(Aa.className="geTempDlgOpenBtn")},ja=P;P=null;"boolean"!==typeof da&&(da=ja.isExternal&&R);1==ka?K(ja.url,ja):da?(Aa.className="geTempDlgOpenBtn geTempDlgBtnDisabled geTempDlgBtnBusy",la()):(na.className="geTempDlgCreateBtn geTempDlgBtnDisabled geTempDlgBtnBusy",ka=null==b.mode||b.mode==App.MODE_GOOGLE||b.mode==App.MODE_BROWSER?mxResources.get("diagramName"):mxResources.get("filename"),ka=new FilenameDialog(b,b.defaultFilename+".drawio", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.