code stringlengths 14 2.05k | label int64 0 1 | programming_language stringclasses 7 values | cwe_id stringlengths 6 14 | cwe_name stringlengths 5 98 ⌀ | description stringlengths 36 379 ⌀ | url stringlengths 36 48 ⌀ | label_name stringclasses 2 values |
|---|---|---|---|---|---|---|---|
D=document.createElement("div");D.style.height="300px";D.style.width="300px";D.style.display="inline-flex";D.style.justifyContent="center";D.style.alignItems="center";D.style.position="absolute";var L=document.createElement("img");L.onload=function(){function C(){E.model.setStyle(c,e+q())}E=new Graph(K);E.autoExtend=!1;E.autoScroll=!1;E.setGridEnabled(!1);E.setEnabled(!0);E.setPanning(!1);E.setConnectable(!1);E.getRubberband().setEnabled(!1);E.graphHandler.allowLivePreview=!1;var V=E.createVertexHandler;
E.createVertexHandler=function(){var P=V.apply(this,arguments);P.livePreview=!1;return P};if(null!=l)try{if("inset"==l.substring(0,5)){var S=c.geometry,N=L.width,O=L.height,Q=(300-N)/2,J=(300-O)/2,m=l.match(/\(([^)]+)\)/)[1].split(/[ ,]+/),v=parseFloat(m[0]),B=parseFloat(m[1]),H=parseFloat(m[2]),g=parseFloat(m[3]);isFinite(v)&&isFinite(B)&&isFinite(H)&&isFinite(g)?(S.x=g/100*N+Q,S.y=v/100*O+J,S.width=(100-B)/100*N+Q-S.x,S.height=(100-H)/100*O+J-S.y,"round"==m[4]?"50%"==m[5]?p.setAttribute("checked",
"checked"):(I=parseInt(m[5]),y.value=I,n.setAttribute("checked","checked"),t.style.visibility="visible"):k.setAttribute("checked","checked")):l=null}else l=null}catch(P){}c.style=e+(l?l:q());c.vertex=!0;E.addCell(c,null,null,null,null);E.selectAll();E.addListener(mxEvent.CELLS_MOVED,C);E.addListener(mxEvent.CELLS_RESIZED,C);var x=E.graphHandler.mouseUp,F=E.graphHandler.mouseDown;E.graphHandler.mouseUp=function(){x.apply(this,arguments);K.style.backgroundColor="#fff9"};E.graphHandler.mouseDown=function(){F.apply(this,
arguments);K.style.backgroundColor=""};E.dblClick=function(){};var M=E.getSelectionModel().changeSelection;E.getSelectionModel().changeSelection=function(){M.call(this,[c],[c])}};L.onerror=function(){L.onload=null;L.src=Editor.errorImage};L.setAttribute("src",f);L.style.maxWidth="300px";L.style.maxHeight="300px";D.appendChild(L);z.appendChild(D);var K=document.createElement("div");K.style.width="300px";K.style.height="300px";K.style.overflow="hidden";K.style.backgroundColor="#fff9";z.appendChild(K); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(){b.spinner.stop();if(null==b.linkPicker){var y=b.drive.createLinkPicker();b.linkPicker=y.setCallback(function(A){LinkDialog.filePicked(A)}).build()}b.linkPicker.setVisible(!0)}))});"undefined"!=typeof Dropbox&&"undefined"!=typeof Dropbox.choose&&D(IMAGE_PATH+"/dropbox-logo.svg",mxResources.get("dropbox"),function(){Dropbox.choose({linkType:"direct",cancel:function(){},success:function(y){E.value=y[0].link;E.focus()}})});null!=b.oneDrive&&D(IMAGE_PATH+"/onedrive-logo.svg",mxResources.get("oneDrive"), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.useCanvasForExport||".png"!=n||(n=".drawio"),".svg"===n||".xml"===n||".html"===n||".png"===n||".drawio"===n)&&(e=k+n)}c=new LocalFile(this,c,null!=urlParams.title?decodeURIComponent(urlParams.title):e,!0);c.getHash=function(){return b};this.fileLoaded(c,!0)?null!=d&&d():R()||this.handleError({message:mxResources.get("fileNotFound")},mxResources.get("errorLoadingFile"))}else R()||this.handleError({message:mxResources.get("fileNotFound")},mxResources.get("errorLoadingFile"))}),mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
J.readAsText(Q)}else this.doImportVisio(Q,e,A,n)}catch(m){A(m)}else try{""==O.responseType||"text"==O.responseType?A({message:O.responseText}):(J=new FileReader,J.onload=function(){try{A({message:JSON.parse(J.result).Message})}catch(m){A(m)}},J.readAsText(O.response))}catch(m){A({})}});O.send(C)}else if(y.clear())try{this.doImportVisio(c,e,A,n)}catch(Q){A(Q)}}else A({message:mxResources.get("serviceUnavailableOrBlocked")})});this.doImportVisio||this.loadingExtensions||this.isOffline(!0)?G():(this.loadingExtensions= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.editor.graph.setBackgroundImage;var E=this.pages[0];this.currentPage==E?z.setBackgroundImage(D):null!=E.viewState&&null!=E.viewState&&(D=E.viewState.backgroundImage,z.setBackgroundImage(D));z.getGlobalVariable=function(S){return"page"==S?E.getName():"pagenumber"==S?1:K.apply(this,arguments)};z.getGlobalVariable=K;document.body.appendChild(z.container);z.model.setRoot(E.root)}if(mxClient.IS_CHROMEAPP||this.useCanvasForExport)this.editor.exportToCanvas(mxUtils.bind(this,function(S){try{z!=this.editor.graph&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
B,this.thumbImageCache)):B(g)});N?this.embedFonts(m,H):(this.editor.addFontCss(m),H(m))}catch(g){this.handleError(g)}};EditorUi.prototype.addRadiobox=function(c,e,k,n,p,t,y){return this.addCheckbox(c,k,n,p,t,y,!0,e)};EditorUi.prototype.addCheckbox=function(c,e,k,n,p,t,y,A){t=null!=t?t:!0;var G=document.createElement("input");G.style.marginRight="8px";G.style.marginTop="16px";G.setAttribute("type",y?"radio":"checkbox");y="geCheckbox-"+Editor.guid();G.id=y;null!=A&&G.setAttribute("name",A);k&&(G.setAttribute("checked",
"checked"),G.defaultChecked=!0);n&&G.setAttribute("disabled","disabled");t&&(c.appendChild(G),k=document.createElement("label"),mxUtils.write(k,e),k.setAttribute("for",y),c.appendChild(k),p||mxUtils.br(c));return G};EditorUi.prototype.addEditButton=function(c,e){var k=this.addCheckbox(c,mxResources.get("edit")+":",!0,null,!0);k.style.marginLeft="24px";var n=this.getCurrentFile(),p="";null!=n&&n.getMode()!=App.MODE_DEVICE&&n.getMode()!=App.MODE_BROWSER&&(p=window.location.href);var t=document.createElement("select"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.currentTheme&&"min"!=Editor.currentTheme||this.addMenuItems(m,["-","outline","fullscreen"],v)});E=this.get("layout");var k=E.funct;E.funct=function(m,v){k.apply(this,arguments);m.addItem(mxResources.get("orgChart"),null,function(){var B=null,H=20,g=20,x=function(){"undefined"!==typeof mxOrgChartLayout&&null!=B&&d.tryAndHandle(mxUtils.bind(this,function(){var Z=d.editor.graph,Y=new mxOrgChartLayout(Z,B,H,g),ba=Z.getDefaultParent();1<Z.model.getChildCount(Z.getSelectionCell())&&(ba=Z.getSelectionCell());
Y.execute(ba)}))},F=document.createElement("div"),M=document.createElement("div");M.style.marginTop="6px";M.style.display="inline-block";M.style.width="140px";mxUtils.write(M,mxResources.get("orgChartType")+": ");F.appendChild(M);var P=document.createElement("select");P.style.width="200px";P.style.boxSizing="border-box";M=[mxResources.get("linear"),mxResources.get("hanger2"),mxResources.get("hanger4"),mxResources.get("fishbone1"),mxResources.get("fishbone2"),mxResources.get("1ColumnLeft"),mxResources.get("1ColumnRight"), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.chromelessWindowResize=function(){};var K=Menus.prototype.init;Menus.prototype.init=function(){K.apply(this,arguments);var I=this.editorUi;EditorUi.enablePlantUml&&!I.isOffline()&&I.actions.put("plantUml",new Action(mxResources.get("plantUml")+"...",function(){var k=new ParseDialog(I,mxResources.get("plantUml")+"...","plantUml");I.showDialog(k.container,620,420,!0,!1);k.init()}));I.actions.put("mermaid",new Action(mxResources.get("mermaid")+"...",function(){var k=new ParseDialog(I,
mxResources.get("mermaid")+"...","mermaid");I.showDialog(k.container,620,420,!0,!1);k.init()}));var c="horizontalFlow verticalFlow - horizontalTree verticalTree radialTree - organic circle".split(" "),e=function(k,n,p,t){k.addItem(p,null,mxUtils.bind(this,function(){var y=new CreateGraphDialog(I,p,t);I.showDialog(y.container,620,420,!0,!1);y.init()}),n)};this.put("insertLayout",new Menu(mxUtils.bind(this,function(k,n){for(var p=0;p<c.length;p++)"-"==c[p]?k.addSeparator(n):e(k,n,mxResources.get(c[p])+
"...",c[p])})))};EditorUi.prototype.installFormatToolbar=function(I){var c=this.editor.graph,e=document.createElement("div");e.style.cssText="position:absolute;top:10px;z-index:1;border-radius:4px;box-shadow:0px 0px 3px 1px #d1d1d1;padding:6px;white-space:nowrap;background-color:#fff;transform:translate(-50%, 0);left:50%;";c.getSelectionModel().addListener(mxEvent.CHANGE,mxUtils.bind(this,function(k,n){0<c.getSelectionCount()?(I.appendChild(e),e.innerHTML="Selected: "+c.getSelectionCount()):null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
q,z=0;8>z;z++)u=1==(u&1)?3988292384^u>>>1:u>>>1,Editor.crcTable[q]=u;Editor.updateCRC=function(g,x,F,M){for(var P=0;P<M;P++)g=Editor.crcTable[(g^x.charCodeAt(F+P))&255]^g>>>8;return g};Editor.crc32=function(g){for(var x=-1,F=0;F<g.length;F++)x=x>>>8^Editor.crcTable[(x^g.charCodeAt(F))&255];return(x^-1)>>>0};Editor.writeGraphModelToPng=function(g,x,F,M,P){function T(Y,ba){var fa=X;X+=ba;return Y.substring(fa,X)}function W(Y){Y=T(Y,4);return Y.charCodeAt(3)+(Y.charCodeAt(2)<<8)+(Y.charCodeAt(1)<<16)+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(O){E=O};this.setAutoScroll=function(O){R=O};this.setOpenFill=function(O){I=O};this.setStopClickEnabled=function(O){k=O};this.setSelectInserted=function(O){n=O};this.setSmoothing=function(O){l=O};this.setPerfectFreehandMode=function(O){t=O};this.isPerfectFreehandMode=function(){return t};this.setBrushSize=function(O){p.size=O};this.getBrushSize=function(){return p.size};var y=function(O){e=O;b.getRubberband().setEnabled(!O);b.graphHandler.setSelectEnabled(!O);b.graphHandler.setMoveEnabled(!O); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxConstants.GUIDE_STROKEWIDTH);v.dialect=mxConstants.DIALECT_SVG;v.pointerEvents=!1;v.init(R.graph.getView().getOverlayPane());return v};V=function(v,B){if(v&&null!=R.guidesArrHor)for(v=0;v<R.guidesArrHor.length;v++)R.guidesArrHor[v].node.style.visibility="hidden";if(B&&null!=R.guidesArrVer)for(v=0;v<R.guidesArrVer.length;v++)R.guidesArrVer[v].node.style.visibility="hidden"};if(1<C&&C==n.length-1){C=[];N=R.guidesArrHor;K=[];L=0;p=n[0]==I?1:0;Q=n[p].y+n[p].height;if(0<S)for(p=0;p<n.length-1;p++)c= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
typeof mxMermaidToDrawio)ea=ca=ua;ua=g.cloneNode(!0);ma.appendChild(ua);Ma=function(Pa){M=null!=b.sidebar.tooltip&&"none"!=b.sidebar.tooltip.style.display};Oa=function(Pa){M||y(Ra,mxEvent.getClientX(Pa),mxEvent.getClientY(Pa),Qa,Ca)};mxEvent.addGestureListeners(Qa,Ma,null,Oa);mxEvent.addGestureListeners(ua,Ma,null,Oa)},function(ua){b.handleError(ua)})});Ja.setAttribute("disabled","disabled");Ja.className="geBtn gePrimaryBtn";oa=function(){window.setTimeout(function(){""!=la.value?Ja.removeAttribute("disabled"): | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"":"none";this.editor.graph.setEnabled(c);null!=this.tabContainer&&(this.tabContainer.style.visibility=c?"":"hidden");null!=this.ruler&&(this.ruler.hRuler.container.style.visibility=c?"":"hidden",this.ruler.vRuler.container.style.visibility=c?"":"hidden");c||this.hideWindows()};EditorUi.prototype.initializeEmbedMode=function(){this.setGraphEnabled(!1);if((window.opener||window.parent)!=window&&("1"!=urlParams.spin||this.spinner.spin(document.body,mxResources.get("loading")))){var c=!1;this.installMessageHandler(mxUtils.bind(this,
function(e,k,n,p){c||(c=!0,this.spinner.stop(),this.addEmbedButtons(),this.setGraphEnabled(!0));if(null==e||0==e.length)e=this.emptyDiagramXml;this.setCurrentFile(new EmbedFile(this,e,{}));this.mode=App.MODE_EMBED;this.setFileData(e);if(p)try{var t=this.editor.graph;t.setGridEnabled(!1);t.pageVisible=!1;var y=t.model.cells,A;for(A in y){var G=y[A];null!=G&&null!=G.style&&(G.style+=";sketch=1;"+(-1==G.style.indexOf("fontFamily=")||-1<G.style.indexOf("fontFamily=Helvetica;")?"fontFamily=Architects Daughter;fontSource=https%3A%2F%2Ffonts.googleapis.com%2Fcss%3Ffamily%3DArchitects%2BDaughter;":
""))}}catch(C){console.log(C)}this.editor.isChromelessView()?this.editor.graph.isLightboxView()&&this.lightboxFit():this.showLayersDialog();this.chromelessResize&&this.chromelessResize();this.editor.undoManager.clear();this.editor.modified=null!=n?n:!1;this.updateUi();window.self!==window.top&&window.focus();null!=this.format&&this.format.refresh()}))}};EditorUi.prototype.showLayersDialog=function(){1<this.editor.graph.getModel().getChildCount(this.editor.graph.getModel().getRoot())&&(null==this.actions.layersWindow? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
e.view.validate());N=H;O=B}));var Q=e.labelLinkClicked;e.labelLinkClicked=function(B,H,g){var x=H.getAttribute("href");if(null==x||!e.isCustomLink(x)||!mxEvent.isTouchEvent(g)&&mxEvent.isPopupTrigger(g))Q.apply(this,arguments);else{if(!e.isEnabled()||null!=B&&e.isCellLocked(B.cell))e.customLinkClicked(x),e.getRubberband().reset();mxEvent.consume(g)}};this.editor.getOrCreateFilename=function(){var B=c.defaultFilename,H=c.getCurrentFile();null!=H&&(B=null!=H.getTitle()?H.getTitle():B);return B};var J= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g.ownerSVGElement.parentNode.insertBefore(this.webKitForceRepaintNode,g.ownerSVGElement))}};var N=Graph.prototype.refresh;Graph.prototype.refresh=function(){N.apply(this,arguments);this.refreshBackgroundImage()};Graph.prototype.refreshBackgroundImage=function(){null!=this.backgroundImage&&null!=this.backgroundImage.originalSrc&&(this.setBackgroundImage(this.backgroundImage),this.view.validateBackgroundImage())};var O=Graph.prototype.loadStylesheet;Graph.prototype.loadStylesheet=function(){O.apply(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c?c:"",extras:JSON.stringify(p),scale:y,border:A,w:S&&isFinite(S)?S:null,h:N&&isFinite(N)?N:null}};EditorUi.prototype.setMode=function(c,e){this.mode=c};EditorUi.prototype.getDiagramId=function(){var c=window.location.hash;null!=c&&0<c.length&&(c=c.substring(1));if(null!=c&&1<c.length){var e=c.indexOf("#");0<=e&&(c=c.substring(0,e))}return c};EditorUi.prototype.getHashObject=function(){var c=window.location.hash,e={};if(null!=c&&0<c.length){var k=c.lastIndexOf("#");if(0<k){c=decodeURIComponent(c.substring(k+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
C){var Fa=Q&&this.isResampleImageSize(U.size,V)?Math.min(1,Math.min(n/na,n/Aa)):1;return p(pa,U.type,e+W*g,k+W*g,Math.round(na*Fa),Math.round(Aa*Fa),U.name)}this.handleError({message:mxResources.get("imageTooBig")});return null}))}),Q,n,V,U.size)}),mxUtils.bind(this,function(){this.handleError({message:mxResources.get("invalidOrMissingFile")})})))}else Y=Z.target.result,p(Y,U.type,e+W*g,k+W*g,240,160,U.name,function(ha){P(W,function(){return ha})},U)}catch(ha){P(W,mxUtils.bind(this,function(){return null})), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
[Q],"{1} ago"));O.setAttribute("title",N.toLocaleDateString()+" "+N.toLocaleTimeString())}function K(N){var O=document.createElement("img");O.className="geCommentBusyImg";O.src=IMAGE_PATH+"/spin.gif";N.appendChild(O);N.busyImg=O}function E(N){N.style.border="1px solid red";N.removeChild(N.busyImg)}function R(N){N.style.border="";N.removeChild(N.busyImg)}function I(N,O,Q,J,m){function v(T,W,U){var X=document.createElement("li");X.className="geCommentAction";var Z=document.createElement("a");Z.className=
"geCommentActionLnk";mxUtils.write(Z,T);X.appendChild(Z);mxEvent.addListener(Z,"click",function(Y){W(Y,N);Y.preventDefault();mxEvent.consume(Y)});P.appendChild(X);U&&(X.style.display="none")}function B(){function T(X){W.push(U);if(null!=X.replies)for(var Z=0;Z<X.replies.length;Z++)U=U.nextSibling,T(X.replies[Z])}var W=[],U=g;T(N);return{pdiv:U,replies:W}}function H(T,W,U,X,Z){function Y(){K(aa);N.addReply(ca,function(ra){ca.id=ra;N.replies.push(ca);R(aa);U&&U()},function(ra){ba();E(aa);b.handleError(ra, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
E.createVertexHandler=function(){var P=V.apply(this,arguments);P.livePreview=!1;return P};if(null!=l)try{if("inset"==l.substring(0,5)){var S=c.geometry,N=L.width,O=L.height,Q=(300-N)/2,J=(300-O)/2,m=l.match(/\(([^)]+)\)/)[1].split(/[ ,]+/),v=parseFloat(m[0]),B=parseFloat(m[1]),H=parseFloat(m[2]),g=parseFloat(m[3]);isFinite(v)&&isFinite(B)&&isFinite(H)&&isFinite(g)?(S.x=g/100*N+Q,S.y=v/100*O+J,S.width=(100-B)/100*N+Q-S.x,S.height=(100-H)/100*O+J-S.y,"round"==m[4]?"50%"==m[5]?p.setAttribute("checked", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"style"):M.createElement("style");g.setAttribute("type","text/css");mxUtils.setTextContent(g,x);F.appendChild(g)}};Editor.prototype.isExportToCanvas=function(){return mxClient.IS_CHROMEAPP||this.useCanvasForExport};Editor.prototype.getMaxCanvasScale=function(g,x,F){var M=mxClient.IS_FF?8192:16384;return Math.min(F,Math.min(M/g,M/x))};Editor.prototype.exportToCanvas=function(g,x,F,M,P,T,W,U,X,Z,Y,ba,fa,ca,aa,ra,za,Ba){try{T=null!=T?T:!0;W=null!=W?W:!0;ba=null!=ba?ba:this.graph;fa=null!=fa?fa:0;var ea= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
ra.className="gePropHeaderCell";var za=document.createElement("img");za.src=Sidebar.prototype.expandedImage;za.style.verticalAlign="middle";ra.appendChild(za);mxUtils.write(ra,mxResources.get("property"));aa.style.cursor="pointer";var Ba=function(){var qa=ca.querySelectorAll(".gePropNonHeaderRow");if(Y.editorUi.propertiesCollapsed){za.src=Sidebar.prototype.collapsedImage;var sa="none";for(var ta=g.childNodes.length-1;0<=ta;ta--)try{var Da=g.childNodes[ta],Ea=Da.nodeName.toUpperCase();"INPUT"!=Ea&&
"SELECT"!=Ea||g.removeChild(Da)}catch(Ta){}}else za.src=Sidebar.prototype.expandedImage,sa="";for(ta=0;ta<qa.length;ta++)qa[ta].style.display=sa};mxEvent.addListener(aa,"click",function(){Y.editorUi.propertiesCollapsed=!Y.editorUi.propertiesCollapsed;Ba()});aa.appendChild(ra);ra=document.createElement("th");ra.className="gePropHeaderCell";ra.innerHTML=mxResources.get("value");aa.appendChild(ra);ca.appendChild(aa);var ea=!1,ha=!1;aa=null;1==F.vertices.length&&0==F.edges.length?aa=F.vertices[0].id: | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0==F%2,aa.flipBkg),x.parentNode.insertBefore(pa,x.nextSibling),x=pa;g.appendChild(ca);Ba();return g};StyleFormatPanel.prototype.addStyles=function(g){if(null!=this.defaultColorSchemes){var x=function(aa){mxEvent.addListener(aa,"mouseenter",function(){aa.style.opacity="1"});mxEvent.addListener(aa,"mouseleave",function(){aa.style.opacity="0.5"})},F=this.editorUi,M=F.editor.graph,P=document.createElement("div");P.style.whiteSpace="nowrap";P.style.paddingLeft="24px";P.style.paddingRight="20px";g.style.paddingLeft= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
p,mxResources.get("ok"),function(A){null!=A?p=A:t.value="blank"},mxResources.get("url"),null,null,null,null,function(){t.value="blank"});this.showDialog(y.container,300,80,!0,!1);y.init()}}));mxEvent.addListener(k,"change",mxUtils.bind(this,function(){k.checked&&(null==e||e.checked)?t.removeAttribute("disabled"):t.setAttribute("disabled","disabled")}));mxUtils.br(c);return{getLink:function(){return k.checked?"blank"===t.value?"_blank":p:null},getEditInput:function(){return k},getEditSelect:function(){return t}}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.bind(this,function(){this.save(b,f)})),l.handleFileError(D,null==D||"AbortError"!=D.name))});try{b==l.getTitle()?l.save(!0,u,z):l.saveAs(b,u,z)}catch(D){z(D)}}),d)}};App.prototype.getExtensionForService=function(b){b=this.getServiceForName(b);return null!=b?b.extension:".drawio"};App.prototype.getServiceForName=function(b){return b==App.MODE_GOOGLE?this.drive:b==App.MODE_ONEDRIVE?this.oneDrive:b==App.MODE_GITHUB?this.gitHub:b==App.MODE_GITLAB?this.gitLab:b==App.MODE_TRELLO?this.trello:null}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(0!=e.getStatus()?": "+e.getStatus():"")}))}));EditorUi.debug("DrawioFileSync.fileSaved",[this],"from",L,"to",K,"etag",this.file.getCurrentEtag(),"diff",E,R.length,"bytes","checksum",u)}else this.notify(D),null!=l&&l(),EditorUi.debug("DrawioFileSync.fileSaved",[this],"from",L,"to",K,"etag",this.file.getCurrentEtag())}this.file.setShadowPages(b);this.scheduleCleanup()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
D=document.createElement("div");D.style.height="300px";D.style.width="300px";D.style.display="inline-flex";D.style.justifyContent="center";D.style.alignItems="center";D.style.position="absolute";var L=document.createElement("img");L.onload=function(){function C(){E.model.setStyle(c,e+q())}E=new Graph(K);E.autoExtend=!1;E.autoScroll=!1;E.setGridEnabled(!1);E.setEnabled(!0);E.setPanning(!1);E.setConnectable(!1);E.getRubberband().setEnabled(!1);E.graphHandler.allowLivePreview=!1;var V=E.createVertexHandler; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
va.innerText=ja;ia.appendChild(va);pa.appendChild(ia);mxEvent.addListener(ia,"click",function(){function Ja(){var ya=Ha.querySelector(".geTemplateDrawioCatLink");null!=ya?ya.click():setTimeout(Ja,200)}fa=!0;var Ha=B.querySelector(".geTemplatesList");Ha.style.display="block";Ba.style.width="";Fa.style.display="";Fa.value="";Y=null;Ja()});ca.style.display=ka.length<=la?"none":""}function S(ka,da,la){function ma(Oa,Xa){Oa=mxResources.get(Oa,null,Oa.substring(0,1).toUpperCase()+Oa.substring(1));var Qa=
Oa+" ("+Xa.length+")",Ra=Oa=mxUtils.htmlEntities(Oa);15<Oa.length&&(Oa=Oa.substring(0,15)+"…");return{lbl:Oa+" ("+Xa.length+")",fullLbl:Qa,lblOnly:Ra}}function oa(Oa,Xa,Qa,Ra,Pa){mxEvent.addListener(Qa,"click",function(){x!=Qa&&(null!=x?(x.style.fontWeight="normal",x.style.textDecoration="none"):(ha.style.display="none",ea.style.minHeight="100%"),x=Qa,x.style.fontWeight="bold",x.style.textDecoration="underline",Ba.scrollTop=0,H&&(g=!0),ra.innerHTML=Xa,za.style.display="none",C(Pa?da[Oa]:Ra? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
var CommentsWindow=function(b,f,l,d,q,u){function z(){for(var N=t.getElementsByTagName("div"),O=0,Q=0;Q<N.length;Q++)"none"!=N[Q].style.display&&N[Q].parentNode==t&&O++;y.style.display=0==O?"block":"none"}function D(N,O,Q,J){function m(){O.removeChild(H);O.removeChild(g);B.style.display="block";v.style.display="block"}k={div:O,comment:N,saveCallback:Q,deleteOnCancel:J};var v=O.querySelector(".geCommentTxt"),B=O.querySelector(".geCommentActionsList"),H=document.createElement("textarea");H.className=
"geCommentEditTxtArea";H.style.minHeight=v.offsetHeight+"px";H.value=N.content;O.insertBefore(H,v);var g=document.createElement("div");g.className="geCommentEditBtns";var x=mxUtils.button(mxResources.get("cancel"),function(){J?(O.parentNode.removeChild(O),z()):m();k=null});x.className="geCommentEditBtn";g.appendChild(x);var F=mxUtils.button(mxResources.get("save"),function(){v.innerText="";N.content=H.value;mxUtils.write(v,N.content);m();Q(N);k=null});mxEvent.addListener(H,"keydown",mxUtils.bind(this,
function(M){mxEvent.isConsumed(M)||((mxEvent.isControlDown(M)||mxClient.IS_MAC&&mxEvent.isMetaDown(M))&&13==M.keyCode?(F.click(),mxEvent.consume(M)):27==M.keyCode&&(x.click(),mxEvent.consume(M)))}));F.focus();F.className="geCommentEditBtn gePrimaryBtn";g.appendChild(F);O.insertBefore(g,v);B.style.display="none";v.style.display="none";H.focus()}function L(N,O){O.innerText="";N=new Date(N.modifiedDate);var Q=b.timeSince(N);null==Q&&(Q=mxResources.get("lessThanAMinute"));mxUtils.write(O,mxResources.get("timeAgo", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
x=/\.png$/i.test(g)||/\.pdf$/i.test(g)||x;var F="t="+(new Date).getTime();g=PROXY_URL+"?url="+encodeURIComponent(g)+"&"+F+(x?"&base64=1":"")}return g};Editor.prototype.isCorsEnabledForUrl=function(g){if(mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||g.substring(0,window.location.origin.length)==window.location.origin)return!0;null!=urlParams.cors&&null==this.corsRegExp&&(this.corsRegExp=new RegExp(decodeURIComponent(urlParams.cors)));return null!=this.corsRegExp&&this.corsRegExp.test(g)||"https://raw.githubusercontent.com/"===
g.substring(0,34)||"https://fonts.googleapis.com/"===g.substring(0,29)||"https://fonts.gstatic.com/"===g.substring(0,26)};Editor.prototype.createImageUrlConverter=function(){var g=new mxUrlConverter;g.updateBaseUrl();var x=g.convert,F=this;g.convert=function(M){if(null!=M){var P="http://"==M.substring(0,7)||"https://"==M.substring(0,8);P&&!navigator.onLine?M=Editor.svgBrokenImage.src:!P||M.substring(0,g.baseUrl.length)==g.baseUrl||F.crossOriginImages&&F.isCorsEnabledForUrl(M)?"chrome-extension://"== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
L;this.okButton=q;this.container=I},TemplatesDialog=function(b,f,l,d,q,u,z,D,L,K,E,R,I,c,e){function k(ka){xa.innerText=ka;xa.style.display="block";setTimeout(function(){xa.style.display="none"},4E3)}function n(){null!=x&&(x.style.fontWeight="normal",x.style.textDecoration="none",F=x,x=null)}function p(ka,da,la,ma,oa,ia,ja){if(-1<ka.className.indexOf("geTempDlgRadioBtnActive"))return!1;ka.className+=" geTempDlgRadioBtnActive";B.querySelector(".geTempDlgRadioBtn[data-id="+ma+"]").className="geTempDlgRadioBtn "+
(ja?"geTempDlgRadioBtnLarge":"geTempDlgRadioBtnSmall");B.querySelector("."+da).src="/images/"+la+"-sel.svg";B.querySelector("."+oa).src="/images/"+ia+".svg";return!0}function t(ka,da,la,ma){function oa(wa,Ja){null==ja?(wa=/^https?:\/\//.test(wa)&&!b.editor.isCorsEnabledForUrl(wa)?PROXY_URL+"?url="+encodeURIComponent(wa):TEMPLATE_PATH+"/"+wa,mxUtils.get(wa,mxUtils.bind(this,function(Ha){200<=Ha.getStatus()&&299>=Ha.getStatus()&&(ja=Ha.getText());Ja(ja)}))):Ja(ja)}function ia(wa,Ja,Ha){if(null!=wa&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
App.prototype.fileCreated=function(b,f,l,d,q,u){var z=window.location.pathname;null!=f&&0<f.length&&(z+="?libs="+f);null!=q&&0<q.length&&(z+="?clibs="+q);z=this.getUrl(z);b.getMode()!=App.MODE_DEVICE&&(z+="#"+b.getHash());if(this.spinner.spin(document.body,mxResources.get("inserting"))){var D=b.getData();D=0<D.length?this.editor.extractGraphModel(mxUtils.parseXml(D).documentElement,!0):null;var L=window.location.protocol+"//"+window.location.hostname+z,K=D,E=null;null!=D&&/\.svg$/i.test(b.getTitle())&&
(E=this.createTemporaryGraph(this.editor.graph.getStylesheet()),document.body.appendChild(E.container),K=this.decodeNodeIntoGraph(K,E));b.setData(this.createFileData(D,E,b,L));null!=E&&E.container.parentNode.removeChild(E.container);var R=mxUtils.bind(this,function(){this.spinner.stop()}),I=mxUtils.bind(this,function(){R();var c=this.getCurrentFile();null==l&&null!=c&&(l=!c.isModified()&&null==c.getMode());var e=mxUtils.bind(this,function(){window.openFile=null;this.fileLoaded(b,null,u);l&&b.addAllSavedStatus();
null!=f&&this.sidebar.showEntries(f);if(null!=q){for(var n=[],p=q.split(";"),t=0;t<p.length;t++)n.push(decodeURIComponent(p[t]));this.loadLibraries(n)}}),k=mxUtils.bind(this,function(){l||null==c||!c.isModified()?e():this.confirm(mxResources.get("allChangesLost"),null,e,mxResources.get("cancel"),mxResources.get("discardChanges"))});null==l||l?(null!=d&&d(),k()):(b.constructor==LocalFile&&(window.openFile=new OpenFile(function(){window.openFile=null}),window.openFile.setData(b.getData(),b.getTitle(),
null==b.getMode())),null!=d&&d(),window.openWindow(z,null,k))});b.constructor==LocalFile?I():b.saveFile(b.getTitle(),!1,mxUtils.bind(this,function(){I()}),mxUtils.bind(this,function(c){R();null!=c&&"AbortError"==c.name||this.handleError(c)}))}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"none",c.style.display="none");var n=document.createElement("option"),p=!1,t=!1,y=function(J,m){p||null!=J&&t||(R.checked?null!=m&&m(n.selected?null:c.value):""==I.value||b.isOffline()?(G.value="",C.value="",null!=m&&m("")):(I.value=mxUtils.trim(I.value),b.loadImage(I.value,function(v){G.value=v.width;C.value=v.height;null!=m&&m(I.value)},function(){b.showError(mxResources.get("error"),mxResources.get("fileNotFound"),mxResources.get("ok"));G.value="";C.value="";null!=m&&m(null)})))},A=mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(Q){this.spinner.stop();try{this.saveCanvas(Q,p?this.getFileData(!0,null,null,null,k,A):null,G,null==this.pages||0==this.pages.length,V)}catch(J){this.handleError(J)}}),null,this.thumbImageCache,null,mxUtils.bind(this,function(Q){this.spinner.stop();this.handleError(Q)}),null,k,c||1,e,n,null,null,t,y,C,S,N)}catch(Q){this.spinner.stop(),this.handleError(Q)}}};EditorUi.prototype.isCorsEnabledForUrl=function(c){return this.editor.isCorsEnabledForUrl(c)};EditorUi.prototype.importXml=function(c, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
d.appendChild(K);mxUtils.br(d);this.init=function(){K.focus();mxClient.IS_GC||mxClient.IS_FF||5<=document.documentMode?K.select():document.execCommand("selectAll",!1,null)};mxUtils.write(d,mxResources.get("top")+":");var E=document.createElement("input");E.setAttribute("type","text");E.setAttribute("size","4");E.style.marginRight="16px";E.style.marginLeft="4px";E.value=D;d.appendChild(E);mxUtils.write(d,mxResources.get("height")+":");var R=document.createElement("input");R.setAttribute("type","text"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(T,W,U,X,Z,Y){this.passThrough?this.originalRoundrect.apply(this.canvas,arguments):(this.begin(),this.moveTo(T+Z,W),this.lineTo(T+U-Z,W),this.quadTo(T+U,W,T+U,W+Y),this.lineTo(T+U,W+X-Y),this.quadTo(T+U,W+X,T+U-Z,W+X),this.lineTo(T+Z,W+X),this.quadTo(T,W+X,T,W+X-Y),this.lineTo(T,W+Y),this.quadTo(T,W,T+Z,W))};g.prototype.drawPath=function(T){if(0<this.path.length){this.passThrough=!0;try{this.rc.path(this.path.join(" "),T)}catch(U){}this.passThrough=!1}else if(null!=this.nextShape){for(var W in T)this.nextShape.options[W]=
T[W];T.stroke!=mxConstants.NONE&&null!=T.stroke||delete this.nextShape.options.stroke;T.filled||delete this.nextShape.options.fill;this.passThrough=!0;this.rc.draw(this.nextShape);this.passThrough=!1}};g.prototype.stroke=function(){this.passThrough?this.originalStroke.apply(this.canvas,arguments):this.drawPath(this.getStyle(!0,!1))};g.prototype.fill=function(){this.passThrough?this.originalFill.apply(this.canvas,arguments):this.drawPath(this.getStyle(!1,!0))};g.prototype.fillAndStroke=function(){this.passThrough? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Ca.substring(0,1).toUpperCase()+Ca.substring(1));18<Ca.length&&(Ca=Ca.substring(0,18)+"…");return Ca+(null!=ua?" ("+ua.length+")":"")}function la(Ca,ua,Ma){mxEvent.addListener(ua,"click",function(){Ka!=ua&&(null!=Ka&&(Ka.style.backgroundColor=""),Ka=ua,Ka.style.backgroundColor=z,ha.scrollTop=0,ha.innerText="",v=0,null!=sa[Ca].content?(ha.appendChild(sa[Ca].content),ca=ea,Ia=null,null!=sa[Ca].content.init&&sa[Ca].content.init()):(Ia=Ma?ta[Ca][Ma]:sa[Ca],T=null,t(!1)))});null!=urlParams["smart-template"]&&
"smartTemplate"==Ca&&ua.click()}Ta&&(Ta=!1,mxEvent.addListener(ha,"scroll",function(Ca){ha.scrollTop+ha.clientHeight>=ha.scrollHeight&&(t(),mxEvent.consume(Ca))}));if(0<Ea){var ma=document.createElement("div");ma.style.cssText="font-weight: bold;background: #f9f9f9;padding: 5px 0 5px 0;text-align: center;";mxUtils.write(ma,mxResources.get("custom"));xa.appendChild(ma);for(var oa in Da){var ia=document.createElement("div");ma=oa;var ja=Da[oa];18<ma.length&&(ma=ma.substring(0,18)+"…");ia.style.cssText= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
var X=this.fill,Z=this.stroke;this.stroke=this.fill=null;var Y=this.configurePointerEvents,ba=T.setStrokeColor;T.setStrokeColor=function(){};var fa=T.setFillColor;T.setFillColor=function(){};U||null==X||(this.configurePointerEvents=function(){});T.handJiggle.passThrough=!0;M.apply(this,arguments);T.handJiggle.passThrough=!1;T.setFillColor=fa;T.setStrokeColor=ba;this.configurePointerEvents=Y;this.stroke=Z;this.fill=X;T.restore();U&&null!=X&&(T.addTolerance=function(){})}M.apply(this,arguments);T.addTolerance= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g=0;g<H.length;g++)if(null!=H[g][EditorUi.DIFF_UPDATE]&&null!=H[g][EditorUi.DIFF_UPDATE][B]||null!=H[g][EditorUi.DIFF_REMOVE]&&0<=mxUtils.indexOf(H[g][EditorUi.DIFF_REMOVE],B)){e.refreshBackgroundImage();break}}}));var t=e.getBackgroundImageObject;e.getBackgroundImageObject=function(B,H){var g=t.apply(this,arguments);if(null!=g&&null!=g.originalSrc)if(!H)g={src:g.originalSrc};else if(H&&null!=this.themes&&"darkTheme"==this.defaultThemeName){var x=this.stylesheet,F=this.shapeForegroundColor,M=this.shapeBackgroundColor;
this.stylesheet=this.getDefaultStylesheet();this.shapeBackgroundColor="#ffffff";this.shapeForegroundColor="#000000";g=c.createImageForPageLink(g.originalSrc);this.shapeBackgroundColor=M;this.shapeForegroundColor=F;this.stylesheet=x}return g};this.isOffline()||"undefined"===typeof window.EditDataDialog||(EditDataDialog.placeholderHelpLink="https://www.drawio.com/doc/faq/predefined-placeholders");if(/viewer\.diagrams\.net$/.test(window.location.hostname)||/embed\.diagrams\.net$/.test(window.location.hostname))this.editor.editBlankUrl= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
ua,La.width*ua,La.height*ua))}return ya};var Ha=ka.getGlobalVariable;ka.getGlobalVariable=function(ya){return"page"==ya?ja.getName():"pagenumber"==ya?ia+1:"pagecount"==ya?null!=g.pages?g.pages.length:1:Ha.apply(this,arguments)};document.body.appendChild(ka.container);g.updatePageRoot(ja);ka.model.setRoot(ja.root)}ma=Ka(ka,ma,ia!=la,ja.getId());ka!=P&&ka.container.parentNode.removeChild(ka.container)}}else ma=Ka(P);null==ma||null==ma.wnd?g.handleError({message:mxResources.get("errorUpdatingPreview")}):
(ma.mathEnabled&&(la=ma.wnd.document,Ta&&(ma.wnd.IMMEDIATE_PRINT=!0),la.writeln('<script type="text/javascript" src="'+DRAWIO_BASE_URL+'/js/math-print.js">\x3c/script>')),ma.closeDocument(),Graph.rewritePageLinks(ma.wnd.document),!ma.mathEnabled&&Ta&&PrintDialog.printPreview(ma));null!=Ia&&(P.shapeForegroundColor=Va,P.shapeBackgroundColor=Ua,P.stylesheet=Ia,P.refresh())}}var P=g.editor.graph,T=document.createElement("div"),W=document.createElement("h3");W.style.width="100%";W.style.textAlign="center"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"keys",Ea,"values",Ta,"cells",ba.getSelectionCells()))}finally{ba.getModel().endUpdate()}}function P(qa,sa,ta){var Da=mxUtils.getOffset(g,!0),Ea=mxUtils.getOffset(qa,!0);sa.style.position="absolute";sa.style.left=Ea.x-Da.x+"px";sa.style.top=Ea.y-Da.y+"px";sa.style.width=qa.offsetWidth+"px";sa.style.height=qa.offsetHeight-(ta?4:0)+"px";sa.style.zIndex=5}function T(qa,sa,ta){var Da=document.createElement("div");Da.style.width="32px";Da.style.height="4px";Da.style.margin="2px";Da.style.border="1px solid black"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c?c:"",extras:JSON.stringify(p),scale:y,border:A,w:S&&isFinite(S)?S:null,h:N&&isFinite(N)?N:null}};EditorUi.prototype.setMode=function(c,e){this.mode=c};EditorUi.prototype.getDiagramId=function(){var c=window.location.hash;null!=c&&0<c.length&&(c=c.substring(1));if(null!=c&&1<c.length){var e=c.indexOf("#");0<=e&&(c=c.substring(0,e))}return c};EditorUi.prototype.getHashObject=function(){var c=window.location.hash,e={};if(null!=c&&0<c.length){var k=c.lastIndexOf("#");if(0<k){c=decodeURIComponent(c.substring(k+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.addLinkSection=function(c,e){function k(){var A=document.createElement("div");A.style.width="100%";A.style.height="100%";A.style.boxSizing="border-box";null!=t&&t!=mxConstants.NONE?(A.style.border="1px solid black",A.style.backgroundColor=t):(A.style.backgroundPosition="center center",A.style.backgroundRepeat="no-repeat",A.style.backgroundImage="url('"+Dialog.prototype.closeImage+"')");y.innerText="";y.appendChild(A)}mxUtils.write(c,mxResources.get("links")+":");var n=document.createElement("select");
n.style.width="100px";n.style.padding="0px";n.style.marginLeft="8px";n.style.marginRight="10px";n.className="geBtn";var p=document.createElement("option");p.setAttribute("value","auto");mxUtils.write(p,mxResources.get("automatic"));n.appendChild(p);p=document.createElement("option");p.setAttribute("value","blank");mxUtils.write(p,mxResources.get("openInNewWindow"));n.appendChild(p);p=document.createElement("option");p.setAttribute("value","self");mxUtils.write(p,mxResources.get("openInThisWindow"));
n.appendChild(p);e&&(e=document.createElement("option"),e.setAttribute("value","frame"),mxUtils.write(e,mxResources.get("openInThisWindow")+" ("+mxResources.get("iframe")+")"),n.appendChild(e));c.appendChild(n);mxUtils.write(c,mxResources.get("borderColor")+":");var t="#0000ff",y=null;y=mxUtils.button("",mxUtils.bind(this,function(A){this.pickColor(t||"none",function(G){t=G;k()});mxEvent.consume(A)}));k();y.style.padding=mxClient.IS_FF?"4px 2px 4px 2px":"4px";y.style.marginLeft="4px";y.style.height=
"22px";y.style.width="22px";y.style.position="relative";y.style.top=mxClient.IS_IE||mxClient.IS_IE11||mxClient.IS_EDGE?"6px":"1px";y.className="geColorBtn";c.appendChild(y);mxUtils.br(c);return{getColor:function(){return t},getTarget:function(){return n.value},focus:function(){n.focus()}}};EditorUi.prototype.createUrlParameters=function(c,e,k,n,p,t,y){y=null!=y?y:[];n&&("https://viewer.diagrams.net"==EditorUi.lightboxHost&&"1"!=urlParams.dev||y.push("lightbox=1"),"auto"!=c&&y.push("target="+c),null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
360,null!=c.pages&&1<c.pages.length?470:390,!0,!0)};this.defaultFilename=mxResources.get("untitledDiagram");var V=e.getExportVariables;e.getExportVariables=function(){var B=V.apply(this,arguments),H=c.getCurrentFile();null!=H&&(B.filename=H.getTitle());B.pagecount=null!=c.pages?c.pages.length:1;B.page=null!=c.currentPage?c.currentPage.getName():"";B.pagenumber=null!=c.pages&&null!=c.currentPage?mxUtils.indexOf(c.pages,c.currentPage)+1:1;return B};var S=e.getGlobalVariable;e.getGlobalVariable=function(B){var H= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
}finally{e.getModel().endUpdate()}t&&(e.setSelectionCell(k),e.scrollCellToVisible(k))}};l=mxUtils.button(mxResources.get("preview"),function(){c(E,R,!1)});l.className="geBtn";L.appendChild(l);l=mxUtils.button(mxResources.get("apply"),function(){c(b.editor.graph,f,!0)});l.className="geBtn gePrimaryBtn";L.appendChild(l);b.editor.cancelFirst||L.appendChild(q);D.appendChild(L);z.appendChild(D);u.appendChild(z);this.container=u},CustomDialog=function(b,f,l,d,q,u,z,D,L,K,E,R){var I=document.createElement("div"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
b.container.style.cursor=O?"crosshair":"";b.fireEvent(new mxEventObject("freehandStateChanged"))};this.startDrawing=function(){y(!0)};this.isDrawing=function(){return e};var A=mxUtils.bind(this,function(O){if(d){var Q=D.length,J=k&&0<z.length&&null!=D&&2>D.length;J||z.push.apply(z,D);D=[];z.push(null);q.push(d);d=null;(J||E)&&this.stopDrawing();E&&(!J||2<=Q)&&this.startDrawing();mxEvent.consume(O)}}),G=new mxCell;G.edge=!0;var C=function(){var O=b.getCurrentCellStyle(G);O=mxUtils.getValue(b.currentVertexStyle, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
if(null!=t.hoverIcons){var O=t.hoverIcons.update;t.hoverIcons.update=function(){y.freehand.isDrawing()||O.apply(this,arguments)}}if(null!=y.freehand){var Q=y.freehand.createStyle;y.freehand.createStyle=function(U){return Q.apply(this,arguments)+"sketch=0;"}}t.editor.addListener("statusChanged",mxUtils.bind(this,function(){t.setStatusText(t.editor.getStatus())}));t.setStatusText(t.editor.getStatus());var J=t.menus.get("viewZoom");if(null!=J){var m=function(U){if(mxEvent.isAltDown(U))t.hideCurrentMenu(), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
N+"&border="+t+"&xml="+encodeURIComponent(C))})}else"png"==k?c.exportImage(p,null==n||"none"==n,!0,!1,!1,t,!0,!1,null,A,y):c.exportImage(p,!1,!0,!1,!1,t,!0,!1,"jpeg",A);else mxUtils.alert(mxResources.get("drawingTooLarge"))}});EditorUi.prototype.getDiagramTextContent=function(){this.editor.graph.setEnabled(!1);var c=this.editor.graph,e="";if(null!=this.pages)for(var k=0;k<this.pages.length;k++){var n=c;this.currentPage!=this.pages[k]&&(n=this.createTemporaryGraph(c.getStylesheet()),this.updatePageRoot(this.pages[k]),
n.model.setRoot(this.pages[k].root));e+=this.pages[k].getName()+" "+n.getIndexableText()+" "}else e=c.getIndexableText();this.editor.graph.setEnabled(!0);return e};EditorUi.prototype.showRemotelyStoredLibrary=function(c){var e={},k=document.createElement("div");k.style.whiteSpace="nowrap";var n=document.createElement("h3");mxUtils.write(n,mxUtils.htmlEntities(c));n.style.cssText="width:100%;text-align:center;margin-top:0px;margin-bottom:12px";k.appendChild(n);var p=document.createElement("div");p.style.cssText= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
G.offsetTop);this.showShapePicker(Math.max(this.diagramContainer.scrollLeft+Math.max(24,Q.x)),this.diagramContainer.scrollTop+Q.y,null,null,null,null,mxUtils.bind(this,function(J){return e.getCenterInsertPoint(e.getBoundingBoxFromGeometry(J,!0))}),"simple"==c,!1)}mxEvent.consume(O)}));y.style.backgroundSize="24px";"simple"==c?y.style.flexShrink="0":y.style.marginBottom="4px";var C=!1,V=mxUtils.bind(this,function(O){if(O||document.body.contains(k)){O=function(v,B,H,g,x,F){null!=B&&v.setAttribute("title",
B);v.style.cursor="pointer";v.style.margin="simple"==c?"0px":"8px 0px 8px 2px";v.style.display="simple"==c?"inline-block":"block";k.appendChild(v);"simple"==c?v.style.opacity="0.7":null!=g&&(B=x,B=null!=B?B:30,F=null!=F?F:26,v.style.position="relative",v.style.overflow="visible",H=document.createElement("div"),H.style.position="absolute",H.style.fontSize="8px",H.style.left=B+"px",H.style.top=F+"px",mxUtils.write(H,g),v.appendChild(H));return v};k.innerText="";if(!C){var Q=window.innerWidth||document.documentElement.clientWidth|| | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxResources.get("reconnecting"))?window.location.search=this.getSearch(["url"]):null!=n?this.fileLoaded(n)||t():t()});e?c():this.handleError(A,mxResources.get("errorLoadingFile"),c,!0,null,null,!0)}else t();return p};EditorUi.prototype.getHashValueForPages=function(c,e){var k=0,n=new mxGraphModel,p=new mxCodec;null!=e&&(e.byteCount=0,e.attrCount=0,e.eltCount=0,e.nodeCount=0);for(var t=0;t<c.length;t++){this.updatePageRoot(c[t]);var y=c[t].node.cloneNode(!1);y.removeAttribute("name");n.root=c[t].root;
var A=p.encode(n);this.editor.graph.saveViewState(c[t].viewState,A,!0);A.removeAttribute("pageWidth");A.removeAttribute("pageHeight");y.appendChild(A);null!=e&&(e.eltCount+=y.getElementsByTagName("*").length,e.nodeCount+=y.getElementsByTagName("mxCell").length);k=(k<<5)-k+this.hashValue(y,function(G,C,V,S){return!S||"mxGeometry"!=G.nodeName&&"mxPoint"!=G.nodeName||"x"!=C&&"y"!=C&&"width"!=C&&"height"!=C?S&&"mxCell"==G.nodeName&&"previous"==C?null:V:Math.round(V)},e)<<0}return k};EditorUi.prototype.hashValue= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DiagramFormatPanel.prototype.addOptions=function(g){g=R.apply(this,arguments);var x=this.editorUi,F=x.editor.graph;if(F.isEnabled()){var M=x.getCurrentFile();null!=M&&M.isAutosaveOptional()&&g.appendChild(this.createOption(mxResources.get("autosave"),function(){return x.editor.autosave},function(W){x.editor.setAutosave(W);x.editor.autosave&&M.isModified()&&M.fileChanged()},{install:function(W){this.listener=function(){W(x.editor.autosave)};x.editor.addListener("autosaveChanged",this.listener)},destroy:function(){x.editor.removeListener(this.listener)}}))}if(this.isMathOptionVisible()&&
F.isEnabled()&&"undefined"!==typeof MathJax){var P=this.createOption(mxResources.get("mathematicalTypesetting"),function(){return F.mathEnabled},function(W){x.actions.get("mathematicalTypesetting").funct()},{install:function(W){this.listener=function(){W(F.mathEnabled)};x.addListener("mathEnabledChanged",this.listener)},destroy:function(){x.removeListener(this.listener)}});g.appendChild(P);var T=x.menus.createHelpLink("https://www.drawio.com/doc/faq/math-typesetting");T.style.position="relative";
T.style.marginLeft="6px";P.appendChild(T)}return g};mxCellRenderer.prototype.defaultVertexShape.prototype.customProperties=[{name:"arcSize",dispName:"Arc Size",type:"float",min:0,defVal:mxConstants.LINE_ARCSIZE},{name:"absoluteArcSize",dispName:"Abs. Arc Size",type:"bool",defVal:!1}];mxCellRenderer.defaultShapes.link.prototype.customProperties=[{name:"width",dispName:"Width",type:"float",min:0,defVal:4}];mxCellRenderer.defaultShapes.flexArrow.prototype.customProperties=[{name:"width",dispName:"Width", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
v),(g==mxLanguage||""==g&&null==mxLanguage)&&m.addCheckmark(F,Editor.checkmarkImage));return F});B("");m.addSeparator(v);for(var H in mxLanguageMap)B(H)})));var c=Menus.prototype.createMenubar;Menus.prototype.createMenubar=function(m){var v=c.apply(this,arguments);if(("1"!=urlParams.embed||"1"==urlParams.atlas)&&null!=v&&Editor.enableSimpleTheme&&"atlassian"!=d.getServiceName()){var B=this.get("appearance");if(null!=B){var H=v.addMenu("",B.funct);H.setAttribute("title",mxResources.get("appearance"));
H.className="geToolbarButton geAdaptiveAsset";H.style.backgroundPosition="center center";H.style.backgroundRepeat="no-repeat";H.style.backgroundSize="100% 100%";H.style.display="inline-block";H.style.cursor="pointer";H.style.zIndex="1";H.style.position="absolute";H.style.height="18px";H.style.width="18px";"atlas"==Editor.currentTheme?(H.style.filter="invert(100%)",H.style.right="11px",H.style.top="10px"):(H.style.right="10px",H.style.top="5px");document.body.appendChild(H);v.langIcon=H;B=mxUtils.bind(this,
function(){var g=window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth;H.style.display="atlas"==Editor.currentTheme||"min"==Editor.currentTheme||"sketch"==Editor.currentTheme?"none":"";H.style.backgroundImage="simple"==Editor.currentTheme?750>g?"url("+Editor.thinDoubleArrowRightImage+")":"url("+(Editor.isDarkMode()?Editor.thinDarkImage:Editor.thinLightImage)+")":"url("+(Editor.isDarkMode()?Editor.darkModeImage:Editor.lightModeImage)+")"});this.editorUi.addListener("currentThemeChanged",
B);this.editorUi.addListener("darkModeChanged",B);mxEvent.addListener(window,"resize",B);B()}}return v}}d.customLayoutConfig=[{layout:"mxHierarchicalLayout",config:{orientation:"west",intraCellSpacing:30,interRankCellSpacing:100,interHierarchySpacing:60,parallelEdgeSpacing:10}}];d.actions.addAction("runLayout",function(){d.showCustomLayoutDialog(JSON.stringify(d.customLayoutConfig,null,2))});E=this.get("viewZoom");var e=E.funct;E.funct=mxUtils.bind(this,function(m,v){e.apply(this,arguments);"sketch"!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
href:G,target:C,allowOpener:V}),"*")}}};EditorUi.prototype.createEmbedButton=function(c,e,k,n){var p="simple"==Editor.currentTheme||"sketch"==Editor.currentTheme||"min"==Editor.currentTheme,t=document.createElement("button");t.setAttribute("title",c+(null!=k?" ("+k+")":""));t.style.marginLeft="6px";mxUtils.write(t,c);p?(t.className=n?"gePrimaryBtn":"",t.style.marginLeft="8px",t.style.padding="6px"):t.className="geBigButton"+(n?"":" geBigStandardButton");mxEvent.addListener(t,"click",e);return t}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
libs:ka.getAttribute("libs"),clibs:ka.getAttribute("clibs"),title:ka.getAttribute("title")}),ka=ka.nextSibling;V(Ka)}});var Va=function(ka,da,la){za.style.display="";Ga.stop();H=!1;if(g)g=!1;else if(da)aa.innerText=da;else{la=la||{};da=0;for(var ma in la)da+=la[ma].length;0==ka.length&&0==da?aa.innerText=mxResources.get("noDiagrams"):C(ka,!1,U,0==da?null:la)}};O(W);var Ua=null;mxEvent.addListener(Fa,"keyup",m);mxEvent.addListener(Fa,"search",m);mxEvent.addListener(Fa,"input",m);mxEvent.addListener(na,
"click",function(ka){A(!1,!1)});R&&mxEvent.addListener(Aa,"click",function(ka){A(!1,!0)});I&&mxEvent.addListener(B.querySelector(".geTempDlgLinkToDiagramBtn"),"click",function(ka){A(!0)});mxEvent.addListener(B.querySelector(".geTempDlgCancelBtn"),"click",function(){null!=l&&l();e||b.hideDialog(!0)})};TemplatesDialog.tagsList={}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
A);else{var G=this[n].apply(this,A);k([G])}}else k(null,"Invalid Call: "+n+" is not found.")}catch(C){k(null,"Invalid Call: An error occurred, "+C.message)}};EditorUi.prototype.openDatabase=function(c,e){if(null==this.database){var k=window.indexedDB||window.mozIndexedDB||window.webkitIndexedDB;if(null!=k)try{var n=k.open("database",2);n.onupgradeneeded=function(p){try{var t=n.result;1>p.oldVersion&&t.createObjectStore("objects",{keyPath:"key"});2>p.oldVersion&&(t.createObjectStore("files",{keyPath:"title"}),
t.createObjectStore("filesInfo",{keyPath:"title"}),EditorUi.migrateStorageFiles=isLocalStorage)}catch(y){null!=e&&e(y)}};n.onsuccess=mxUtils.bind(this,function(p){try{var t=n.result;this.database=t;EditorUi.migrateStorageFiles&&(StorageFile.migrate(t),EditorUi.migrateStorageFiles=!1);"app.diagrams.net"!=location.host||this.drawioMigrationStarted||(this.drawioMigrationStarted=!0,this.getDatabaseItem(".drawioMigrated3",mxUtils.bind(this,function(y){if(!y||"1"==urlParams.forceMigration){var A=document.createElement("iframe"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.createRoughCanvas=function(g){var x=rough.canvas({getContext:function(){return g}});x.draw=function(F){var M=F.sets||[];F=F.options||this.getDefaultOptions();for(var P=0;P<M.length;P++){var T=M[P];switch(T.type){case "path":null!=F.stroke&&this._drawToContext(g,T,F);break;case "fillPath":this._drawToContext(g,T,F);break;case "fillSketch":this.fillSketch(g,T,F)}}};x.fillSketch=function(F,M,P){var T=g.state.strokeColor,W=g.state.strokeWidth,U=g.state.strokeAlpha,X=g.state.dashed,Z=P.fillWeight;
0>Z&&(Z=P.strokeWidth/2);g.setStrokeAlpha(g.state.fillAlpha);g.setStrokeColor(P.fill||"");g.setStrokeWidth(Z);g.setDashed(!1);this._drawToContext(F,M,P);g.setDashed(X);g.setStrokeWidth(W);g.setStrokeColor(T);g.setStrokeAlpha(U)};x._drawToContext=function(F,M,P){F.begin();for(var T=0;T<M.ops.length;T++){var W=M.ops[T],U=W.data;switch(W.op){case "move":F.moveTo(U[0],U[1]);break;case "bcurveTo":F.curveTo(U[0],U[1],U[2],U[3],U[4],U[5]);break;case "lineTo":F.lineTo(U[0],U[1])}}F.end();"fillPath"===M.type&&
P.filled?F.fill():F.stroke()};return x};(function(){function g(T,W,U){this.canvas=T;this.rc=W;this.shape=U;this.canvas.setLineJoin("round");this.canvas.setLineCap("round");this.originalBegin=this.canvas.begin;this.canvas.begin=mxUtils.bind(this,g.prototype.begin);this.originalEnd=this.canvas.end;this.canvas.end=mxUtils.bind(this,g.prototype.end);this.originalRect=this.canvas.rect;this.canvas.rect=mxUtils.bind(this,g.prototype.rect);this.originalRoundrect=this.canvas.roundrect;this.canvas.roundrect= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
e.addListener(mxEvent.SIZE,f);e.container.addEventListener("scroll",d);e.view.addListener("unitChanged",this.unitListener);b.addListener("pageViewChanged",this.pageListener);b.addListener("pageScaleChanged",this.pageListener);b.addListener("pageFormatChanged",this.pageListener);this.setStyle=function(y){E=y;R.style.background=E.bkgClr;n()};this.origGuideMove=mxGuide.prototype.move;mxGuide.prototype.move=function(y,A,G,C){if(l&&4<y.height||!l&&4<y.width){if(null!=K.guidePart)try{c.putImageData(K.guidePart.imgData1, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
arguments))};var n=mxSvgCanvas2D.prototype.updateTextNodes;mxSvgCanvas2D.prototype.updateTextNodes=function(g,x,F,M,P,T,W,U,X,Z,Y){n.apply(this,arguments);Graph.processFontAttributes(Y)};var p=mxText.prototype.redraw;mxText.prototype.redraw=function(){p.apply(this,arguments);null!=this.node&&"DIV"==this.node.nodeName&&Graph.processFontAttributes(this.node)};Graph.prototype.createTagsDialog=function(g,x,F,M){function P(){for(var ra=U.getSelectionCells(),za=[],Ba=0;Ba<ra.length;Ba++)U.isCellVisible(ra[Ba])&&
za.push(ra[Ba]);U.setSelectionCells(za)}function T(ra){U.setHiddenTags(ra?[]:X.slice());P();U.refresh()}function W(ra,za){Y.innerText="";if(0<ra.length){var Ba=document.createElement("table");Ba.setAttribute("cellpadding","2");Ba.style.boxSizing="border-box";Ba.style.tableLayout="fixed";Ba.style.width="100%";var ea=document.createElement("tbody");if(null!=ra&&0<ra.length)for(var ha=0;ha<ra.length;ha++)(function(pa){function na(){var sa=U.getCellsForTags([pa],null,null,!0);U.isEnabled()?U.setSelectionCells(sa): | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null==C.data&&null==C.url?(C=S(C),Ba(C,G)):this.loadDescriptor(C,mxUtils.bind(this,function(ea){Ba(za(),G)}),mxUtils.bind(this,function(ea){this.handleError(ea,mxResources.get("errorLoadingFile"))}))}}));var y=window.opener||window.parent;t="json"==urlParams.proto?JSON.stringify({event:"init"}):urlParams.ready||"ready";y.postMessage(t,"*");if("json"==urlParams.proto){var A=this.editor.graph.openLink;this.editor.graph.openLink=function(G,C,V){A.apply(this,arguments);y.postMessage(JSON.stringify({event:"openLink",
href:G,target:C,allowOpener:V}),"*")}}};EditorUi.prototype.createEmbedButton=function(c,e,k,n){var p="simple"==Editor.currentTheme||"sketch"==Editor.currentTheme||"min"==Editor.currentTheme,t=document.createElement("button");t.setAttribute("title",c+(null!=k?" ("+k+")":""));t.style.marginLeft="6px";mxUtils.write(t,c);p?(t.className=n?"gePrimaryBtn":"",t.style.marginLeft="8px",t.style.padding="6px"):t.className="geBigButton"+(n?"":" geBigStandardButton");mxEvent.addListener(t,"click",e);return t}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
App.prototype.save=function(b,f){var l=this.getCurrentFile();if(null!=l&&this.spinner.spin(document.body,mxResources.get("saving"))){var d=mxUtils.bind(this,function(q){this.handleError(q)});this.createTimeout(3*this.timeout,mxUtils.bind(this,function(q){this.editor.setStatus("");this.editor.graph.isEditing()&&this.editor.graph.stopEditing();var u=mxUtils.bind(this,function(){q.clear()&&(l.handleFileSuccess(!0),null!=f&&f())}),z=mxUtils.bind(this,function(D){q.clear()&&(l.isModified()&&Editor.addRetryToError(D,
mxUtils.bind(this,function(){this.save(b,f)})),l.handleFileError(D,null==D||"AbortError"!=D.name))});try{b==l.getTitle()?l.save(!0,u,z):l.saveAs(b,u,z)}catch(D){z(D)}}),d)}};App.prototype.getExtensionForService=function(b){b=this.getServiceForName(b);return null!=b?b.extension:".drawio"};App.prototype.getServiceForName=function(b){return b==App.MODE_GOOGLE?this.drive:b==App.MODE_ONEDRIVE?this.oneDrive:b==App.MODE_GITHUB?this.gitHub:b==App.MODE_GITLAB?this.gitLab:b==App.MODE_TRELLO?this.trello:null}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(k){z.value=k.target.result};e.readAsText(c)}},!1));f.appendChild(D);mxEvent.addListener(D,"change",function(){var c=q();if(0==z.value.length||z.value==I)I=c,z.value=I});b.isOffline()||"mermaid"!=l&&"plantUml"!=l||(L=mxUtils.button(mxResources.get("help"),function(){b.openLink("mermaid"==l?"https://mermaid-js.github.io/mermaid/#/":"https://plantuml.com/")}),L.className="geBtn",f.appendChild(L));L=mxUtils.button(mxResources.get("close"),function(){z.value==I?b.hideDialog():b.confirm(mxResources.get("areYouSure"), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l.appendChild(q);f.appendChild(l);this.container=f},ConnectionPointsDialog=function(b,f){function l(){null!=q&&q.destroy()}var d=document.createElement("div");d.style.userSelect="none";var q=null;this.init=function(){function u(Q,J,m){Q=new mxCell("",new mxGeometry(Q,J,6,6),"shape=mxgraph.basic.x;fillColor=#29b6f2;strokeColor=#29b6f2;points=[];rotatable=0;resizable=0;connectable=0;editable=0;");Q.vertex=!0;Q.cp=!0;Q.constObj=m;return R.addCell(Q)}function z(Q){Q=R.getSelectionCells();R.deleteCells(Q)} | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
k)}}catch(n){}};EditorUi.prototype.updatePageLinksForCell=function(c,e){var k=document.createElement("div"),n=this.editor.graph,p=n.getLinkForCell(e);null!=p&&n.setLinkForCell(e,this.updatePageLink(c,p));if(n.isHtmlLabel(e)){k.innerHTML=Graph.sanitizeHtml(n.getLabel(e));for(var t=k.getElementsByTagName("a"),y=!1,A=0;A<t.length;A++)p=t[A].getAttribute("href"),null!=p&&(t[A].setAttribute("href",this.updatePageLink(c,p)),y=!0);y&&n.labelChanged(e,k.innerHTML)}for(A=0;A<n.model.getChildCount(e);A++)this.updatePageLinksForCell(c,
n.model.getChildAt(e,A))};EditorUi.prototype.updatePageLink=function(c,e){if(Graph.isPageLink(e)){var k=c[e.substring(e.indexOf(",")+1)];e=null!=k?"data:page/id,"+k:null}else if("data:action/json,"==e.substring(0,17))try{var n=JSON.parse(e.substring(17));if(null!=n.actions){for(var p=0;p<n.actions.length;p++){var t=n.actions[p];if(null!=t.open&&Graph.isPageLink(t.open)){var y=t.open.substring(t.open.indexOf(",")+1);k=c[y];null!=k?t.open="data:page/id,"+k:null==this.getPageById(y)&&delete t.open}}e= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.isRevisionHistoryEnabled=function(){var c=this.getCurrentFile();return null!=c&&(c.constructor==DriveFile&&c.isEditable()||c.constructor==DropboxFile)};EditorUi.prototype.getServiceName=function(){return"draw.io"};EditorUi.prototype.addRemoteServiceSecurityCheck=function(c){c.setRequestHeader("Content-Language","da, mi, en, de-DE")};EditorUi.prototype.loadUrl=function(c,e,k,n,p,t,y,A){EditorUi.logEvent("SHOULD NOT BE CALLED: loadUrl");return this.editor.loadUrl(c,e,k,n,p,t,y,A)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
(null==Q.getCell()||Q.getCell()==I)};R.panningHandler.isForcePanningEvent=function(Q){return 2==Q.evt.button};var c=R.isCellSelectable;R.isCellSelectable=function(Q){return Q==I?!1:c.apply(this,arguments)};R.getLinkForCell=function(){return null};var e=R.view.getState(I);E=R.getAllConnectionConstraints(e);for(var k=0;null!=E&&k<E.length;k++){var n=R.getConnectionPoint(e,E[k]);u(n.x-3,n.y-3,E[k])}R.fit(8);R.center();k=b.createToolbarButton(Editor.zoomInImage,mxResources.get("zoomIn"),function(){R.zoomIn()}, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
U.fillStyle=W;return U};g.prototype.begin=function(){this.passThrough?this.originalBegin.apply(this.canvas,arguments):this.path=[]};g.prototype.end=function(){this.passThrough&&this.originalEnd.apply(this.canvas,arguments)};g.prototype.addOp=function(){if(null!=this.path&&(this.path.push(arguments[0]),2<arguments.length))for(var T=2;T<arguments.length;T+=2)this.lastX=arguments[T-1],this.lastY=arguments[T],this.path.push(this.canvas.format(this.lastX)),this.path.push(this.canvas.format(this.lastY))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"0"!=urlParams.pv;Graph.prototype.shadowId="dropShadow";Graph.prototype.svgShadowColor="#3D4574";Graph.prototype.svgShadowOpacity="0.4";Graph.prototype.svgShadowBlur="1.7";Graph.prototype.svgShadowSize="3";Graph.prototype.hiddenTags=[];Graph.prototype.defaultMathEnabled=!1;var e=Graph.prototype.init;Graph.prototype.init=function(){function g(P){x=P}e.apply(this,arguments);this.hiddenTags=[];window.mxFreehand&&(this.freehand=new mxFreehand(this));var x=null;mxEvent.addListener(this.container,"mouseenter",
g);mxEvent.addListener(this.container,"mousemove",g);mxEvent.addListener(this.container,"mouseleave",function(P){x=null});this.isMouseInsertPoint=function(){return null!=x};var F=this.getInsertPoint;this.getInsertPoint=function(){return null!=x?this.getPointForEvent(x):F.apply(this,arguments)};var M=this.layoutManager.getLayout;this.layoutManager.getLayout=function(P){var T=this.graph.getCellStyle(P);if(null!=T&&"rack"==T.childLayout){var W=new mxStackLayout(this.graph,!1);W.gridSize=null!=T.rackUnitSize?
parseFloat(T.rackUnitSize):"undefined"!==typeof mxRackContainer?mxRackContainer.unitSize:20;W.marginLeft=T.marginLeft||0;W.marginRight=T.marginRight||0;W.marginTop=T.marginTop||0;W.marginBottom=T.marginBottom||0;W.allowGaps=T.allowGaps||0;W.horizontal="1"==mxUtils.getValue(T,"horizontalRack","0");W.resizeParent=!1;W.fill=!0;return W}return M.apply(this,arguments)};this.updateGlobalUrlVariables()};var k=Graph.prototype.postProcessCellStyle;Graph.prototype.postProcessCellStyle=function(g,x){return Graph.processFontStyle(k.apply(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l?E=new mxHierarchicalLayout(u,mxConstants.DIRECTION_WEST):"circle"==l?E=new mxCircleLayout(u):(E=new mxFastOrganicLayout(u,!1),E.forceConstant=80);if(null!=E){var R=function(k,n){u.getModel().beginUpdate();try{null!=k&&k(),E.execute(u.getDefaultParent(),K)}catch(p){throw p;}finally{k=new mxMorphing(u),k.addListener(mxEvent.DONE,mxUtils.bind(this,function(){u.getModel().endUpdate();null!=n&&n()})),k.startAnimation()}},I=mxEdgeHandler.prototype.connect;mxEdgeHandler.prototype.connect=function(k,n, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"data:action/json,"+JSON.stringify(n)}}catch(A){}return e};EditorUi.prototype.isRemoteVisioFormat=function(c){return/(\.v(sd|dx))($|\?)/i.test(c)||/(\.vs(s|x))($|\?)/i.test(c)};EditorUi.prototype.importVisio=function(c,e,k,n,p){var t=mxUtils.bind(this,function(y){this.loadingExtensions=!1;null!=k?k(y):this.handleError(y)});this.createTimeout(null,mxUtils.bind(this,function(y){n=null!=n?n:c.name;var A=mxUtils.bind(this,function(C){y.clear()&&t(C)}),G=mxUtils.bind(this,function(){this.loadingExtensions= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
arguments);null!=this.tabContainer&&(this.tabContainer.style.right="62px",this.diagramContainer.style.bottom=this.tabContainerHeight+"px")};var u=EditorUi.prototype.updateActionStates;EditorUi.prototype.updateActionStates=function(){u.apply(this,arguments);this.menus.get("save").setEnabled(null!=this.getCurrentFile()||"1"==urlParams.embed)};var z=Menus.prototype.addShortcut;Menus.prototype.addShortcut=function(I,c){null!=c.shortcut&&900>d&&!mxClient.IS_IOS?I.firstChild.nextSibling.setAttribute("title",
c.shortcut):z.apply(this,arguments)};EditorUi.prototype.toggleFormatPanel=function(I){null!=this.formatWindow?this.formatWindow.window.setVisible(null!=I?I:!this.formatWindow.window.isVisible()):b(this)};EditorUi.prototype.isFormatPanelVisible=function(){return null!=this.formatWindow&&this.formatWindow.window.isVisible()||null==this.formatWindow&&0<this.formatWidth};DiagramFormatPanel.prototype.isMathOptionVisible=function(){return!0};var D=EditorUi.prototype.destroy;EditorUi.prototype.destroy=function(){this.destroyWindows(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
if(null!=t.hoverIcons){var O=t.hoverIcons.update;t.hoverIcons.update=function(){y.freehand.isDrawing()||O.apply(this,arguments)}}if(null!=y.freehand){var Q=y.freehand.createStyle;y.freehand.createStyle=function(U){return Q.apply(this,arguments)+"sketch=0;"}}t.editor.addListener("statusChanged",mxUtils.bind(this,function(){t.setStatusText(t.editor.getStatus())}));t.setStatusText(t.editor.getStatus());var J=t.menus.get("viewZoom");if(null!=J){var m=function(U){if(mxEvent.isAltDown(U))t.hideCurrentMenu(),
t.actions.get("customZoom").funct(),mxEvent.consume(U);else if("geMenuItem"==mxEvent.getSource(U).className||mxEvent.isShiftDown(U))t.hideCurrentMenu(),t.actions.get("smartFit").funct(),mxEvent.consume(U)},v=t.actions.get("zoomIn"),B=t.actions.get("zoomOut"),H=t.actions.get("resetView"),g=t.actions.get("undo"),x=t.actions.get("redo"),F=c("",g.funct,null,mxResources.get("undo")+" ("+g.shortcut+")",g,Editor.undoImage),M=c("",x.funct,null,mxResources.get("redo")+" ("+x.shortcut+")",x,Editor.redoImage), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"0"!=urlParams.pv;Graph.prototype.shadowId="dropShadow";Graph.prototype.svgShadowColor="#3D4574";Graph.prototype.svgShadowOpacity="0.4";Graph.prototype.svgShadowBlur="1.7";Graph.prototype.svgShadowSize="3";Graph.prototype.hiddenTags=[];Graph.prototype.defaultMathEnabled=!1;var e=Graph.prototype.init;Graph.prototype.init=function(){function g(P){x=P}e.apply(this,arguments);this.hiddenTags=[];window.mxFreehand&&(this.freehand=new mxFreehand(this));var x=null;mxEvent.addListener(this.container,"mouseenter", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Menus.prototype.init=function(){function l(m,v,B){this.ui=m;this.previousExtFonts=this.extFonts=v;this.prevCustomFonts=this.customFonts=B}f.apply(this,arguments);var d=this.editorUi,q=d.editor.graph,u=mxUtils.bind(q,q.isEnabled),z=("1"!=urlParams.embed&&"0"!=urlParams.gapi||"1"==urlParams.embed&&"1"==urlParams.gapi)&&mxClient.IS_SVG&&isLocalStorage&&(null==document.documentMode||10<=document.documentMode),D=("1"!=urlParams.embed&&"0"!=urlParams.db||"1"==urlParams.embed&&"1"==urlParams.db)&&mxClient.IS_SVG&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(c){return 1!=c};EditorUi.prototype.getEditBlankXml=function(){return this.getFileData(!0)};EditorUi.prototype.exportFile=function(c,e,k,n,p,t){};EditorUi.prototype.getServiceForName=function(c){return null};EditorUi.prototype.getTitleForService=function(c){return mxResources.get(c)};EditorUi.prototype.pickFolder=function(c,e,k){e(null)};EditorUi.prototype.exportSvg=function(c,e,k,n,p,t,y,A,G,C,V,S,N,O){if(this.spinner.spin(document.body,mxResources.get("export")))try{var Q=this.editor.graph.isSelectionEmpty(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.hideDialog=function(a,b,e){null!=this.dialogs&&0<this.dialogs.length&&(null==e||e==this.dialog.container.firstChild)&&(e=this.dialogs.pop(),0==e.close(a,b)?this.dialogs.push(e):(this.dialog=0<this.dialogs.length?this.dialogs[this.dialogs.length-1]:null,this.editor.fireEvent(new mxEventObject("hideDialog")),null==this.dialog&&null!=this.editor.graph.container&&"hidden"!=this.editor.graph.container.style.visibility&&window.setTimeout(mxUtils.bind(this,function(){null!=this.editor&&
(this.editor.graph.isEditing()&&null!=this.editor.graph.cellEditor.textarea?this.editor.graph.cellEditor.textarea.focus():(mxUtils.clearSelection(),this.editor.graph.container.focus()))}),0)))};EditorUi.prototype.ctrlEnter=function(){var a=this.editor.graph;if(a.isEnabled())try{for(var b=a.getSelectionCells(),e=new mxDictionary,f=[],g=0;g<b.length;g++){var d=a.isTableCell(b[g])?a.model.getParent(b[g]):b[g];null==d||e.get(d)||(e.put(d,!0),f.push(d))}a.setSelectionCells(a.duplicateCells(f,!1))}catch(h){this.handleError(h)}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
p.value);p.geometry.width+=G.gridSize;p.geometry.height+=G.gridSize}finally{G.getModel().endUpdate()}return[p]}}return[]};EditorUi.prototype.formatFileSize=function(c){var e=-1;do c/=1024,e++;while(1024<c);return Math.max(c,.1).toFixed(1)+" kB; MB; GB; TB;PB;EB;ZB;YB".split(";")[e]};EditorUi.prototype.convertDataUri=function(c){if("data:"==c.substring(0,5)){var e=c.indexOf(";");0<e&&(c=c.substring(0,e)+c.substring(c.indexOf(",",e+1)))}return c};EditorUi.prototype.isRemoteFileFormat=function(c,e){return/("contentType":\s*"application\/gliffy\+json")/.test(c)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(K){return this.isTreeEdge(K)}))};Graph.prototype.getIncomingTreeEdges=function(d,q){return this.getTreeEdges(d,q,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(d,q){return this.getTreeEdges(d,q,!1,!0,!1)};var f=EditorUi.prototype.init;EditorUi.prototype.init=function(){f.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function d(J){return k.isVertex(J)&&u(J)}function q(J){var m=!1;null!=J&&(m="1"== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
b.editor.cancelFirst||E.appendChild(R);K.appendChild(E);this.init=function(){Editor.selectFilename(c)};this.container=K},CreateDialog=function(b,f,l,d,q,u,z,D,L,K,E,R,I,c,e,k,n){function p(N,O,Q,J){function m(){mxEvent.addListener(v,"click",function(){var F=Q;if(z){var M=A.value,P=M.lastIndexOf(".");if(0>f.lastIndexOf(".")&&0>P){F=null!=F?F:S.value;var T="";F==App.MODE_GOOGLE?T=b.drive.extension:F==App.MODE_GITHUB?T=b.gitHub.extension:F==App.MODE_GITLAB?T=b.gitLab.extension:F==App.MODE_TRELLO?T=b.trello.extension:
F==App.MODE_DROPBOX?T=b.dropbox.extension:F==App.MODE_ONEDRIVE?T=b.oneDrive.extension:F==App.MODE_DEVICE&&(T=".drawio");0<=P&&(M=M.substring(0,P));A.value=M+T}}t(Q)})}var v=document.createElement("a");v.style.overflow="hidden";var B=document.createElement("img");B.src=N;B.setAttribute("border","0");B.setAttribute("align","absmiddle");B.style.width="60px";B.style.height="60px";B.style.paddingBottom="6px";v.style.display="inline-block";v.className="geBaseButton";v.style.position="relative";v.style.margin= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g);mxEvent.addListener(this.container,"mousemove",g);mxEvent.addListener(this.container,"mouseleave",function(P){x=null});this.isMouseInsertPoint=function(){return null!=x};var F=this.getInsertPoint;this.getInsertPoint=function(){return null!=x?this.getPointForEvent(x):F.apply(this,arguments)};var M=this.layoutManager.getLayout;this.layoutManager.getLayout=function(P){var T=this.graph.getCellStyle(P);if(null!=T&&"rack"==T.childLayout){var W=new mxStackLayout(this.graph,!1);W.gridSize=null!=T.rackUnitSize? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!n,null!=A&&n&&(p.shadowVisible=A),this.editor.graph.model.execute(p))});c=new BackgroundImageDialog(this,c,e,k,n);this.showDialog(c.container,400,n?240:220,!0,!0);c.init()};EditorUi.prototype.showLibraryDialog=function(c,e,k,n,p){c=new LibraryDialog(this,c,e,k,n,p);this.showDialog(c.container,640,440,!0,!1,mxUtils.bind(this,function(t){t&&null==this.getCurrentFile()&&"1"!=urlParams.embed&&this.showSplash()}));c.init()};var l=EditorUi.prototype.createFormat;EditorUi.prototype.createFormat=function(c){var e=
l.apply(this,arguments);this.editor.graph.addListener("viewStateChanged",mxUtils.bind(this,function(k){this.editor.graph.isSelectionEmpty()&&e.refresh()}));return e};EditorUi.prototype.handleError=function(c,e,k,n,p,t,y){var A=null!=this.spinner&&null!=this.spinner.pause?this.spinner.pause():function(){},G=null!=c&&null!=c.error?c.error:c;if(null!=c&&("1"==urlParams.test||null!=c.stack)&&null!=c.message)try{y?null!=window.console&&console.error("EditorUi.handleError:",c):EditorUi.logError("Caught: "+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.useCanvasForExport||".png"!=n||(n=".drawio"),".svg"===n||".xml"===n||".html"===n||".png"===n||".drawio"===n)&&(e=k+n)}c=new LocalFile(this,c,null!=urlParams.title?decodeURIComponent(urlParams.title):e,!0);c.getHash=function(){return b};this.fileLoaded(c,!0)?null!=d&&d():R()||this.handleError({message:mxResources.get("fileNotFound")},mxResources.get("errorLoadingFile"))}else R()||this.handleError({message:mxResources.get("fileNotFound")},mxResources.get("errorLoadingFile"))}),mxUtils.bind(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.onMathJaxDone=function(){};var P=Editor.prototype.init;Editor.prototype.init=function(){P.apply(this,arguments);var W=mxUtils.bind(this,function(U,X){null!=this.graph.container&&this.graph.mathEnabled&&Editor.MathJaxRender(this.graph.container)});this.graph.model.addListener(mxEvent.CHANGE,W);this.graph.addListener(mxEvent.REFRESH,W)};x=document.getElementsByTagName("script");if(null!=x&&0<x.length){var T=document.createElement("script");T.setAttribute("type","text/javascript");T.setAttribute("src", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
C=new mxAsyncCanvas(this.thumbImageCache);G.images=this.thumbImageCache.images;var V=new mxImageExport;V.drawShape=function(S,N){S.shape instanceof mxShape&&S.shape.checkBounds()&&(N.save(),N.translate(.5,.5),S.shape.paint(N),N.translate(-.5,-.5),N.restore())};V.drawText=function(S,N){};V.drawState(z.getView().getState(z.model.root),C);C.finish(mxUtils.bind(this,function(){try{V.drawState(z.getView().getState(z.model.root),G),z!=this.editor.graph&&null!=z.container.parentNode&&z.container.parentNode.removeChild(z.container)}catch(S){R= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return V};EditorUi.prototype.getXmlFileData=function(c,e,k,n){c=null!=c?c:!0;e=null!=e?e:!1;k=null!=k?k:!Editor.defaultCompressed;var p=this.editor.getGraphXml(c,n);if(c&&null!=this.fileNode&&null!=this.currentPage)if(c=function(G){var C=G.getElementsByTagName("mxGraphModel");C=0<C.length?C[0]:null;null==C&&k?(C=mxUtils.trim(mxUtils.getTextContent(G)),G=G.cloneNode(!1),0<C.length&&(C=Graph.decompress(C),null!=C&&0<C.length&&G.appendChild(mxUtils.parseXml(C).documentElement))):null==C||k?G=G.cloneNode(!0):
(G=G.cloneNode(!1),mxUtils.setTextContent(G,Graph.compressNode(C)));p.appendChild(G)},EditorUi.removeChildNodes(this.currentPage.node),mxUtils.setTextContent(this.currentPage.node,Graph.compressNode(p)),p=this.fileNode.cloneNode(!1),e)c(this.currentPage.node);else for(e=0;e<this.pages.length;e++){var t=this.pages[e],y=t.node;if(t!=this.currentPage)if(t.needsUpdate){var A=new mxCodec(mxUtils.createXmlDocument());A=A.encode(new mxGraphModel(t.root));this.editor.graph.saveViewState(t.viewState,A,null, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"geCommentActionLnk";mxUtils.write(Z,T);X.appendChild(Z);mxEvent.addListener(Z,"click",function(Y){W(Y,N);Y.preventDefault();mxEvent.consume(Y)});P.appendChild(X);U&&(X.style.display="none")}function B(){function T(X){W.push(U);if(null!=X.replies)for(var Z=0;Z<X.replies.length;Z++)U=U.nextSibling,T(X.replies[Z])}var W=[],U=g;T(N);return{pdiv:U,replies:W}}function H(T,W,U,X,Z){function Y(){K(aa);N.addReply(ca,function(ra){ca.id=ra;N.replies.push(ca);R(aa);U&&U()},function(ra){ba();E(aa);b.handleError(ra, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"120px",E.style.backgroundImage="url('"+IMAGE_PATH+"/droptarget.png')",E.style.backgroundPosition="center 65%",E.style.backgroundRepeat="no-repeat",z=document.createElement("div"),z.style.position="absolute",z.style.width="420px",z.style.top="58%",z.style.textAlign="center",z.style.fontSize="18px",z.style.color="#a0c3ff",mxUtils.write(z,mxResources.get("dragImagesHere")),E.appendChild(z));E.appendChild(D);this.container=E},LinkDialog=function(b,f,l,d,q,u,z){function D(y,A,G){G=mxUtils.button("",G);
G.className="geBtn";G.setAttribute("title",A);A=document.createElement("img");A.style.height="26px";A.style.width="26px";A.setAttribute("src",y);G.style.minWidth="42px";G.style.verticalAlign="middle";G.appendChild(A);t.appendChild(G)}var L=document.createElement("div");L.style.height="100%";mxUtils.write(L,mxResources.get("editLink")+":");var K=document.createElement("div");K.className="geTitle";K.style.backgroundColor="transparent";K.style.borderColor="transparent";K.style.whiteSpace="nowrap";K.style.textOverflow= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.addMenuItem(m,"export",v).firstChild.nextSibling.innerHTML=mxResources.get("advanced")+"...");mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||"min"!=Editor.currentTheme||this.addMenuItems(m,["publishLink"],v);d.mode==App.MODE_ATLAS||"1"==urlParams.extAuth||"simple"!=Editor.currentTheme&&"sketch"!=Editor.currentTheme&&"min"!=Editor.currentTheme||(m.addSeparator(v),d.menus.addSubmenu("embed",m,v))})));this.put("importFrom",new Menu(mxUtils.bind(this,function(m,v){function B(x){x.pickFile(function(F){d.spinner.spin(document.body,
mxResources.get("loading"))&&x.getFile(F,function(M){var P="data:image/"==M.getData().substring(0,11)?g(M.getTitle()):"text/xml";/\.svg$/i.test(M.getTitle())&&!d.editor.isDataSvg(M.getData())&&(M.setData(Editor.createSvgDataUri(M.getData())),P="image/svg+xml");H(M.getData(),P,M.getTitle())},function(M){d.handleError(M,null!=M?mxResources.get("errorLoadingFile"):null)},x==d.drive)},!0)}var H=mxUtils.bind(this,function(x,F,M){var P=q.view,T=q.getGraphBounds(),W=q.snap(Math.ceil(Math.max(0,T.x/P.scale- | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
fa:null)},b.mode!=App.MODE_GOOGLE||null==b.stateArg||null==b.stateArg.folderId)}}function C(da,la,ma,oa,ia,ja,va){null!=aa&&(aa.style.backgroundColor="transparent",aa.style.border="1px solid transparent");H.removeAttribute("disabled");ca=la;ba=ma;fa=ja;aa=da;ra=oa;za=va;Ba=ia;aa.style.backgroundColor=D;aa.style.border=L}function V(da,la,ma,oa,ia,ja,va,wa,Ja,Ha,ya){function La(Na,Ya){null==Ma?(Oa=Na,Oa=/^https?:\/\//.test(Oa)&&!b.editor.isCorsEnabledForUrl(Oa)?PROXY_URL+"?url="+encodeURIComponent(Oa): | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c?c:"",extras:JSON.stringify(p),scale:y,border:A,w:S&&isFinite(S)?S:null,h:N&&isFinite(N)?N:null}};EditorUi.prototype.setMode=function(c,e){this.mode=c};EditorUi.prototype.getDiagramId=function(){var c=window.location.hash;null!=c&&0<c.length&&(c=c.substring(1));if(null!=c&&1<c.length){var e=c.indexOf("#");0<=e&&(c=c.substring(0,e))}return c};EditorUi.prototype.getHashObject=function(){var c=window.location.hash,e={};if(null!=c&&0<c.length){var k=c.lastIndexOf("#");if(0<k){c=decodeURIComponent(c.substring(k+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(O){E=O};this.setAutoScroll=function(O){R=O};this.setOpenFill=function(O){I=O};this.setStopClickEnabled=function(O){k=O};this.setSelectInserted=function(O){n=O};this.setSmoothing=function(O){l=O};this.setPerfectFreehandMode=function(O){t=O};this.isPerfectFreehandMode=function(){return t};this.setBrushSize=function(O){p.size=O};this.getBrushSize=function(){return p.size};var y=function(O){e=O;b.getRubberband().setEnabled(!O);b.graphHandler.setSelectEnabled(!O);b.graphHandler.setMoveEnabled(!O); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
b.x,a.height+=b.height+b.y),this.fitWindow(a))};Graph.prototype.fitWindow=function(a,b){b=null!=b?b:10;var e=this.container.clientWidth-b,f=this.container.clientHeight-b;this.zoomTo(Math.floor(20*Math.min(e/a.width,f/a.height))/20);if(mxUtils.hasScrollbars(this.container)){var g=this.view.translate;this.container.scrollLeft=(a.x+g.x)*this.view.scale-Math.max((e-a.width*this.view.scale)/2+b/2,0);this.container.scrollTop=(a.y+g.y)*this.view.scale-Math.max((f-a.height*this.view.scale)/2+b/2,0)}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.ui.pages.push(this.ui.createPage());0>mxUtils.indexOf(this.ui.pages,this.ui.currentPage)&&this.ui.selectPage(this.ui.pages[0],!0)}finally{D.container.style.visibility="";D.model.endUpdate();D.cellRenderer.redraw=R;this.changeListenerEnabled=L;l||(q.history=u,q.indexOfNextAdd=z,q.fireEvent(new mxEventObject(mxEvent.CLEAR)));if(null==this.ui.currentPage||this.ui.currentPage.needsUpdate)E!=D.mathEnabled?(this.ui.editor.updateGraphComponents(),D.refresh()):(K!=D.foldingEnabled?D.view.revalidate():
D.view.validate(),D.sizeDidChange());null!=this.sync&&this.isRealtime()&&!d&&(this.sync.snapshot=this.ui.clonePages(this.ui.pages));this.ui.editor.fireEvent(new mxEventObject("pagesPatched","patches",b))}EditorUi.debug("DrawioFile.patch",[this],"patches",b,"resolver",f,"undoable",l)}return b}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(K){return this.isTreeEdge(K)}))};Graph.prototype.getIncomingTreeEdges=function(d,q){return this.getTreeEdges(d,q,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(d,q){return this.getTreeEdges(d,q,!1,!0,!1)};var f=EditorUi.prototype.init;EditorUi.prototype.init=function(){f.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function d(J){return k.isVertex(J)&&u(J)}function q(J){var m=!1;null!=J&&(m="1"== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
n;for(t=0;t<p.length;t++)y.objectStore(p[t]).put(null!=c&&null!=c[t]?{key:c[t],data:e[t]}:e[t])}catch(A){null!=n&&n(A)}}),n)};EditorUi.prototype.removeDatabaseItem=function(c,e,k,n){this.openDatabase(mxUtils.bind(this,function(p){n=n||"objects";Array.isArray(n)||(n=[n],c=[c]);p=p.transaction(n,"readwrite");p.oncomplete=e;p.onerror=k;for(var t=0;t<n.length;t++)p.objectStore(n[t]).delete(c[t])}),k)};EditorUi.prototype.getDatabaseItem=function(c,e,k,n){this.openDatabase(mxUtils.bind(this,function(p){try{n=
n||"objects";var t=p.transaction([n],"readonly").objectStore(n).get(c);t.onsuccess=function(){e(t.result)};t.onerror=k}catch(y){null!=k&&k(y)}}),k)};EditorUi.prototype.getDatabaseItems=function(c,e,k){this.openDatabase(mxUtils.bind(this,function(n){try{k=k||"objects";var p=n.transaction([k],"readonly").objectStore(k).openCursor(IDBKeyRange.lowerBound(0)),t=[];p.onsuccess=function(y){null==y.target.result?c(t):(t.push(y.target.result.value),y.target.result.continue())};p.onerror=e}catch(y){null!=e&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
J):S.y+S.height>J+O&&(S.height=J+O-S.y,S.y=Math.min(S.y,J+O));var m=(S.x-Q)/N*100;N=100-(S.x+S.width-Q)/N*100;Q=(S.y-J)/O*100;S=100-(S.y+S.height-J)/O*100;return"inset("+mxUtils.format(Q)+"% "+mxUtils.format(N)+"% "+mxUtils.format(S)+"% "+mxUtils.format(m)+"%"+(C?" round "+I+"%":V?" round 50%":"")+")"}function u(C){null!=E&&(!0!==C&&(E.model.setGeometry(c,R.clone()),I=5,y.value=I),E.model.setStyle(c,e+q()),E.selectAll(),t.style.visibility=n.checked?"visible":"hidden")}var z=document.createElement("div"), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g);x[0].parentNode.appendChild(T)}}};Editor.prototype.csvToArray=function(g){if(0<g.length){var x="",F=[""],M=0,P=!0,T;g=$jscomp.makeIterator(g);for(T=g.next();!T.done;T=g.next())T=T.value,'"'===T?(P&&T===x&&(F[M]+=T),P=!P):","===T&&P?T=F[++M]="":F[M]+=T,x=T;return F}return[]};Editor.prototype.getProxiedUrl=function(g){if((/test\.draw\.io$/.test(window.location.hostname)||/app\.diagrams\.net$/.test(window.location.hostname))&&!this.isCorsEnabledForUrl(g)){var x=/(\.v(dx|sdx?))($|\?)/i.test(g)||/(\.vs(x|sx?))($|\?)/i.test(g); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
C=new mxAsyncCanvas(this.thumbImageCache);G.images=this.thumbImageCache.images;var V=new mxImageExport;V.drawShape=function(S,N){S.shape instanceof mxShape&&S.shape.checkBounds()&&(N.save(),N.translate(.5,.5),S.shape.paint(N),N.translate(-.5,-.5),N.restore())};V.drawText=function(S,N){};V.drawState(z.getView().getState(z.model.root),C);C.finish(mxUtils.bind(this,function(){try{V.drawState(z.getView().getState(z.model.root),G),z!=this.editor.graph&&null!=z.container.parentNode&&z.container.parentNode.removeChild(z.container)}catch(S){R= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
va.innerText=ja;ia.appendChild(va);pa.appendChild(ia);mxEvent.addListener(ia,"click",function(){function Ja(){var ya=Ha.querySelector(".geTemplateDrawioCatLink");null!=ya?ya.click():setTimeout(Ja,200)}fa=!0;var Ha=B.querySelector(".geTemplatesList");Ha.style.display="block";Ba.style.width="";Fa.style.display="";Fa.value="";Y=null;Ja()});ca.style.display=ka.length<=la?"none":""}function S(ka,da,la){function ma(Oa,Xa){Oa=mxResources.get(Oa,null,Oa.substring(0,1).toUpperCase()+Oa.substring(1));var Qa= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
y.apply(this,arguments);null==x&&null!=this.globalVars&&(x=this.globalVars[g]);return x};Graph.prototype.getDefaultStylesheet=function(){if(null==this.defaultStylesheet){var g=this.themes["default-style2"];this.defaultStylesheet=(new mxCodec(g.ownerDocument)).decode(g)}return this.defaultStylesheet};Graph.prototype.isViewer=function(){return urlParams.viewer};var A=Graph.prototype.getSvg;Graph.prototype.getSvg=function(g,x,F,M,P,T,W,U,X,Z,Y,ba,fa,ca){var aa=null,ra=null,za=null;ba||null==this.themes|| | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
C){var Fa=Q&&this.isResampleImageSize(U.size,V)?Math.min(1,Math.min(n/na,n/Aa)):1;return p(pa,U.type,e+W*g,k+W*g,Math.round(na*Fa),Math.round(Aa*Fa),U.name)}this.handleError({message:mxResources.get("imageTooBig")});return null}))}),Q,n,V,U.size)}),mxUtils.bind(this,function(){this.handleError({message:mxResources.get("invalidOrMissingFile")})})))}else Y=Z.target.result,p(Y,U.type,e+W*g,k+W*g,240,160,U.name,function(ha){P(W,function(){return ha})},U)}catch(ha){P(W,mxUtils.bind(this,function(){return null})), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(fa){"true"!=U.getAttribute("contentEditable")&&mxEvent.consume(fa)});T=function(fa){if(mxClient.IS_IOS||mxClient.IS_FF||!(null==document.documentMode||9<document.documentMode)){var ca=new FilenameDialog(b,X.title||"",mxResources.get("ok"),function(aa){null!=aa&&(X.title=aa,H())},mxResources.get("enterValue"));b.showDialog(ca.container,300,80,!0,!0);ca.init();mxEvent.consume(fa)}else if("true"!=U.getAttribute("contentEditable")){null!=t&&(t(),t=null);if(null==X.title||0==X.title.length)U.innerText=
"";U.style.textOverflow="";U.style.whiteSpace="";U.style.cursor="text";U.style.color="";U.setAttribute("contentEditable","true");mxUtils.setPrefixedStyle(U.style,"user-select","text");U.focus();document.execCommand("selectAll",!1,null);t=function(){U.removeAttribute("contentEditable");U.style.cursor="pointer";X.title=U.innerHTML;H()};mxEvent.consume(fa)}};mxEvent.addListener(U,"click",T);mxEvent.addListener(M,"dblclick",T);c.appendChild(M);mxEvent.addListener(M,"dragstart",function(fa){null==V&&null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.