code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
F.substring(0,17)&&this.setLinkForCell(x,this.updateCustomLink(g,F));if(this.isHtmlLabel(x)){var M=document.createElement("div");M.innerHTML=Graph.sanitizeHtml(this.getLabel(x));for(var P=M.getElementsByTagName("a"),T=!1,W=0;W<P.length;W++)F=P[W].getAttribute("href"),null!=F&&"data:action/json,"==F.substring(0,17)&&(P[W].setAttribute("href",this.updateCustomLink(g,F)),T=!0);T&&this.labelChanged(x,M.innerHTML)}};Graph.prototype.updateCustomLink=function(g,x){if("data:action/json,"==x.substring(0,17))try{var F= JSON.parse(x.substring(17));null!=F.actions&&(this.updateCustomLinkActions(g,F.actions),x="data:action/json,"+JSON.stringify(F))}catch(M){}return x};Graph.prototype.updateCustomLinkActions=function(g,x){for(var F=0;F<x.length;F++){var M=x[F],P;for(P in M)this.updateCustomLinkAction(g,M[P],"cells"),this.updateCustomLinkAction(g,M[P],"excludeCells")}};Graph.prototype.updateCustomLinkAction=function(g,x,F){if(null!=x&&null!=x[F]){for(var M=[],P=0;P<x[F].length;P++)if("*"==x[F][P])M.push(x[F][P]);else{var T=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u)for(z=0;z<u.length;z++)u[z].node.style.visibility=d?"visible":"hidden"};var l=mxGuide.prototype.destroy;mxGuide.prototype.destroy=function(){l.call(this);var d=this.guidesArrVer,q=this.guidesArrHor;if(null!=d){for(var u=0;u<d.length;u++)d[u].destroy();this.guidesArrVer=null}if(null!=q){for(u=0;u<q.length;u++)q[u].destroy();this.guidesArrHor=null}}})();function mxRuler(b,f,l,d){function q(){var y=b.diagramContainer;R.style.top=y.offsetTop-L+"px";R.style.left=y.offsetLeft-L+"px";R.style.width=(l?0:y.offsetWidth)+L+"px";R.style.height=(l?y.offsetHeight:0)+L+"px"}function u(y,A,G){if(null!=z)return y;var C;return function(){var V=this,S=arguments,N=G&&!C;clearTimeout(C);C=setTimeout(function(){C=null;G||y.apply(V,S)},A);N&&y.apply(V,S)}}var z=window.requestAnimationFrame||window.mozRequestAnimationFrame||window.webkitRequestAnimationFrame||window.msRequestAnimationFrame,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e.addListener(mxEvent.SIZE,f);e.container.addEventListener("scroll",d);e.view.addListener("unitChanged",this.unitListener);b.addListener("pageViewChanged",this.pageListener);b.addListener("pageScaleChanged",this.pageListener);b.addListener("pageFormatChanged",this.pageListener);this.setStyle=function(y){E=y;R.style.background=E.bkgClr;n()};this.origGuideMove=mxGuide.prototype.move;mxGuide.prototype.move=function(y,A,G,C){if(l&&4<y.height||!l&&4<y.width){if(null!=K.guidePart)try{c.putImageData(K.guidePart.imgData1, K.guidePart.x1,K.guidePart.y1),c.putImageData(K.guidePart.imgData2,K.guidePart.x2,K.guidePart.y2),c.putImageData(K.guidePart.imgData3,K.guidePart.x3,K.guidePart.y3)}catch(g){}var V=K.origGuideMove.apply(this,arguments);try{c.lineWidth=.5;c.strokeStyle=E.guideClr;c.setLineDash([2]);if(l){var S=y.y+V.y+L-this.graph.container.scrollTop;var N=0;var O=S+y.height/2;var Q=L/2;var J=S+y.height;var m=0;var v=c.getImageData(N,S-1,L,3);k(N,S,L,S);S--;var B=c.getImageData(Q,O-1,L,3);k(Q,O,L,O);O--;var H=c.getImageData(m, J-1,L,3);k(m,J,L,J);J--}else S=0,N=y.x+V.x+L-this.graph.container.scrollLeft,O=L/2,Q=N+y.width/2,J=0,m=N+y.width,v=c.getImageData(N-1,S,3,L),k(N,S,N,L),N--,B=c.getImageData(Q-1,O,3,L),k(Q,O,Q,L),Q--,H=c.getImageData(m-1,J,3,L),k(m,J,m,L),m--;if(null==K.guidePart||K.guidePart.x1!=N||K.guidePart.y1!=S)K.guidePart={imgData1:v,x1:N,y1:S,imgData2:B,x2:Q,y2:O,imgData3:H,x3:m,y3:J}}catch(g){}}else V=K.origGuideMove.apply(this,arguments);return V};this.origGuideDestroy=mxGuide.prototype.destroy;mxGuide.prototype.destroy=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g.substring(0,34)||"https://fonts.googleapis.com/"===g.substring(0,29)||"https://fonts.gstatic.com/"===g.substring(0,26)};Editor.prototype.createImageUrlConverter=function(){var g=new mxUrlConverter;g.updateBaseUrl();var x=g.convert,F=this;g.convert=function(M){if(null!=M){var P="http://"==M.substring(0,7)||"https://"==M.substring(0,8);P&&!navigator.onLine?M=Editor.svgBrokenImage.src:!P||M.substring(0,g.baseUrl.length)==g.baseUrl||F.crossOriginImages&&F.isCorsEnabledForUrl(M)?"chrome-extension://"== M.substring(0,19)||mxClient.IS_CHROMEAPP||(M=x.apply(this,arguments)):M=PROXY_URL+"?url="+encodeURIComponent(M)}return M};return g};Editor.createSvgDataUri=function(g){return"data:image/svg+xml;base64,"+btoa(unescape(encodeURIComponent(g)))};Editor.prototype.convertImageToDataUri=function(g,x){try{var F=!0,M=window.setTimeout(mxUtils.bind(this,function(){F=!1;x(Editor.svgBrokenImage.src)}),this.timeout);if(/(\.svg)$/i.test(g))mxUtils.get(g,mxUtils.bind(this,function(T){window.clearTimeout(M);F&&x(Editor.createSvgDataUri(T.getText()))}),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.editor.addFontCss(c,this.editor.resolvedFontCss),this.editor.embedExtFonts(mxUtils.bind(this,function(k){try{null!=k&&this.editor.addFontCss(c,k),e(c)}catch(n){e(c)}}))}catch(k){e(c)}}))};EditorUi.prototype.exportImage=function(c,e,k,n,p,t,y,A,G,C,V,S,N){G=null!=G?G:"png";if(this.spinner.spin(document.body,mxResources.get("exporting"))){var O=this.editor.graph.isSelectionEmpty();k=null!=k?k:O;null==this.thumbImageCache&&(this.thumbImageCache={});try{this.editor.exportToCanvas(mxUtils.bind(this, function(Q){this.spinner.stop();try{this.saveCanvas(Q,p?this.getFileData(!0,null,null,null,k,A):null,G,null==this.pages||0==this.pages.length,V)}catch(J){this.handleError(J)}}),null,this.thumbImageCache,null,mxUtils.bind(this,function(Q){this.spinner.stop();this.handleError(Q)}),null,k,c||1,e,n,null,null,t,y,C,S,N)}catch(Q){this.spinner.stop(),this.handleError(Q)}}};EditorUi.prototype.isCorsEnabledForUrl=function(c){return this.editor.isCorsEnabledForUrl(c)};EditorUi.prototype.importXml=function(c,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null,c,mxResources.get("ok"),e);this.showDialog(c.container,k||340,100,!0,!1);c.init()};EditorUi.prototype.confirm=function(c,e,k,n,p,t){c=null!=c?c:"";var y=null!=this.spinner&&null!=this.spinner.pause?this.spinner.pause():function(){},A=Math.min(220,28*Math.ceil(Math.max(1,c.length)/50));c=new ConfirmDialog(this,c,function(){y();null!=e&&e()},function(){y();null!=k&&k()},n,p,null,null,null,null,A);this.showDialog(c.container,340,46+A,!0,t);c.init()};EditorUi.prototype.showBanner=function(c,e,k,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(new mxXmlRequest(SAVE_URL,"format="+R+"&xml="+encodeURIComponent(K)+"&filename="+encodeURIComponent(b)+(u?"&binary=1":""))).simulate(document,"_blank")}else this.ui.handleError({message:mxResources.get("drawingTooLarge")},mxResources.get("error"),mxUtils.bind(this,function(){mxUtils.popup(K)}));D()}});u?(f=this.ui.getPngFileProperties(this.ui.fileNode),this.ui.getEmbeddedPng(mxUtils.bind(this,function(K){L(K)}),d,this.ui.getCurrentFile()!=this?z:null,f.scale,f.border)):L(z)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f.prev.getId():"";null!=f.page.getName()&&b[L].getName()!=f.page.getName()&&(R.name=f.page.getName());mxUtils.isEmptyObject(R)||(z[K]=R)}delete u[b[L].getId()];D=b[L]}for(K in u)f=u[K],l.push({id:f.page.getId(),data:mxUtils.getXml(f.page.node),previous:null!=f.prev?f.prev.getId():""});mxUtils.isEmptyObject(z)||(q[EditorUi.DIFF_UPDATE]=z);0<d.length&&(q[EditorUi.DIFF_REMOVE]=d);0<l.length&&(q[EditorUi.DIFF_INSERT]=l)}return q};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m,mxUtils.bind(this,function(v){null==v||".scratchpad"==m&&v==this.emptyLibraryXml?A.contentWindow.postMessage(JSON.stringify({action:"remoteInvoke",funtionName:"getLocalStorageFile",functionArgs:[m]}),"*"):O()}),O)}}catch(v){console.log(v)}}),J=mxUtils.bind(this,function(m){try{this.setDatabaseItem(null,[{title:m.title,size:m.data.length,lastModified:Date.now(),type:m.isLib?"L":"F"},{title:m.title,data:m.data}],O,O,["filesInfo","files"])}catch(v){console.log(v)}});y=mxUtils.bind(this,function(m){try{if(m.source==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.initMath();if("1"==urlParams.configure){var K=window.opener||window.parent,E=function(I){if(I.source==K)try{var c=JSON.parse(I.data);null!=c&&"configure"==c.action&&(mxEvent.removeListener(window,"message",E),Editor.configure(c.config),mxSettings.load(),c.colorSchemeMeta&&mxmeta("color-scheme","dark light"),l())}catch(e){null!=window.console&&console.log("Error in configure message: "+e,I.data)}};mxEvent.addListener(window,"message",E);K.postMessage(JSON.stringify({event:"configure"}),"*")}else{if(null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxDualRuler.prototype.setUnit=function(b){this.vRuler.setUnit(b);this.hRuler.setUnit(b)};mxDualRuler.prototype.setStyle=function(b){this.vRuler.setStyle(b);this.hRuler.setStyle(b)};mxDualRuler.prototype.destroy=function(){this.vRuler.destroy();this.hRuler.destroy();this.ui.refresh=this.editorUiRefresh;mxGuide.prototype.move=this.origGuideMove;mxGuide.prototype.destroy=this.origGuideDestroy;this.ui.getDiagramContainerOffset=this.editorUiGetDiagContOffset};function mxFreehand(b){var f=null!=b.view&&null!=b.view.canvas?b.view.canvas.ownerSVGElement:null;if(null!=b.container&&null!=f){b.addListener(mxEvent.ESCAPE,mxUtils.bind(this,function(){this.stopDrawing()}));var l=mxFreehand.prototype.NORMAL_SMOOTHING,d=null,q=[],u,z=[],D,L=!1,K=!0,E=!0,R=!0,I=!0,c=[],e=!1,k=!1,n=!1,p={size:5,thinning:.5,smoothing:.5,streamline:.5,start:{taper:0,cap:!0},end:{taper:0,cap:!0}},t=!0;this.setClosedPath=function(O){L=O};this.setAutoClose=function(O){K=O};this.setAutoInsert=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
{replAllMrk:p,replAllPos:n};E.isCellEditable(M)&&(E.model.setValue(M,J(P,k,G.value,n-k.length,E.getCurrentCellStyle(M))),x++)}H!=b.currentPage&&b.editor.graph.model.execute(new SelectPage(b,H));mxUtils.write(Q,mxResources.get("matchesRepl",[x]))}catch(W){b.handleError(W)}finally{E.getModel().endUpdate(),b.editor.graph.setSelectionCells(g),b.editor.graph.rendering=!0}p++});B.setAttribute("title",mxResources.get("replaceAll"));B.style.float="none";B.style.width="120px";B.style.marginTop="6px";B.style.marginLeft=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.loadFonts=function(c){EditorUi.logEvent("SHOULD NOT BE CALLED: loadFonts");return this.editor.loadFonts(c)};EditorUi.prototype.createSvgDataUri=function(c){EditorUi.logEvent("SHOULD NOT BE CALLED: createSvgDataUri");return Editor.createSvgDataUri(c)};EditorUi.prototype.embedCssFonts=function(c,e){EditorUi.logEvent("SHOULD NOT BE CALLED: embedCssFonts");return this.editor.embedCssFonts(c,e)};EditorUi.prototype.embedExtFonts=function(c){EditorUi.logEvent("SHOULD NOT BE CALLED: embedExtFonts"); return this.editor.embedExtFonts(c)};EditorUi.prototype.exportToCanvas=function(c,e,k,n,p,t,y,A,G,C,V,S,N,O,Q,J){EditorUi.logEvent("SHOULD NOT BE CALLED: exportToCanvas");return this.editor.exportToCanvas(c,e,k,n,p,t,y,A,G,C,V,S,N,O,Q,J)};EditorUi.prototype.createImageUrlConverter=function(){EditorUi.logEvent("SHOULD NOT BE CALLED: createImageUrlConverter");return this.editor.createImageUrlConverter()};EditorUi.prototype.convertImages=function(c,e,k,n){EditorUi.logEvent("SHOULD NOT BE CALLED: convertImages");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.highlightCells=function(g,x,F,M){for(var P=0;P<g.length;P++)this.highlightCell(g[P],x,F,M)};Graph.prototype.highlightCell=function(g,x,F,M,P){x=null!=x?x:mxConstants.DEFAULT_VALID_COLOR;F=null!=F?F:1E3;g=this.view.getState(g);var T=null;null!=g&&(P=null!=P?P:4,P=Math.max(P+1,mxUtils.getValue(g.style,mxConstants.STYLE_STROKEWIDTH,1)+P),T=new mxCellHighlight(this,x,P,!1),null!=M&&(T.opacity=M),T.highlight(g),window.setTimeout(function(){null!=T.shape&&(mxUtils.setPrefixedStyle(T.shape.node.style,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(ja?"geTempDlgRadioBtnLarge":"geTempDlgRadioBtnSmall");B.querySelector("."+da).src="/images/"+la+"-sel.svg";B.querySelector("."+oa).src="/images/"+ia+".svg";return!0}function t(ka,da,la,ma){function oa(wa,Ja){null==ja?(wa=/^https?:\/\//.test(wa)&&!b.editor.isCorsEnabledForUrl(wa)?PROXY_URL+"?url="+encodeURIComponent(wa):TEMPLATE_PATH+"/"+wa,mxUtils.get(wa,mxUtils.bind(this,function(Ha){200<=Ha.getStatus()&&299>=Ha.getStatus()&&(ja=Ha.getText());Ja(ja)}))):Ja(ja)}function ia(wa,Ja,Ha){if(null!=wa&& mxUtils.isAncestorNode(document.body,da)&&(wa=mxUtils.parseXml(wa),wa=Editor.extractGraphModel(wa.documentElement,!0),null!=wa)){"mxfile"==wa.nodeName&&(wa=Editor.parseDiagramNode(wa.getElementsByTagName("diagram")[0]));var ya=new mxCodec(wa.ownerDocument),La=new mxGraphModel;ya.decode(wa,La);wa=La.root.getChildAt(0).children||[];b.sidebar.createTooltip(da,wa,Math.min((window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth)-80,1E3),Math.min((window.innerHeight||document.documentElement.clientHeight|| document.body.clientHeight)-80,800),null!=ka.title?mxResources.get(ka.title,null,ka.title):null,!0,new mxPoint(Ja,Ha),!0,null,!0);var Ca=document.createElement("div");Ca.className="geTempDlgDialogMask";B.appendChild(Ca);var ua=b.sidebar.hideTooltip;b.sidebar.hideTooltip=function(){Ca&&(B.removeChild(Ca),Ca=null,ua.apply(this,arguments),b.sidebar.hideTooltip=ua)};mxEvent.addListener(Ca,"click",function(){b.sidebar.hideTooltip()})}}var ja=null;if(qa||b.sidebar.currentElt==da)b.sidebar.hideTooltip();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
l.setCellStyles(mxConstants.STYLE_ROTATION,Number(p.value),[f[y]])}}finally{l.getModel().endUpdate()}});t.className="geBtn gePrimaryBtn";mxEvent.addListener(q,"keypress",function(y){13==y.keyCode&&t.click()});u=document.createElement("div");u.style.marginTop="20px";u.style.textAlign="right";b.editor.cancelFirst?(u.appendChild(d),u.appendChild(t)):(u.appendChild(t),u.appendChild(d));q.appendChild(u);this.container=q},LibraryDialog=function(b,f,l,d,q,u){function z(V){for(V=document.elementFromPoint(V.clientX, V.clientY);null!=V&&V.parentNode!=c;)V=V.parentNode;var S=null;if(null!=V){var N=c.firstChild;for(S=0;null!=N&&N!=V;)N=N.nextSibling,S++}return S}function D(V,S,N,O,Q,J,m,v,B){try{if(b.spinner.stop(),null==S||"image/"==S.substring(0,6))if(null==V&&null!=m||null==k[V]){var H=function(){U.innerText="";U.style.cursor="pointer";U.style.whiteSpace="nowrap";U.style.textOverflow="ellipsis";mxUtils.write(U,null!=X.title&&0<X.title.length?X.title:mxResources.get("untitled"));U.style.color=null==X.title||0==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(K){return this.isTreeEdge(K)}))};Graph.prototype.getIncomingTreeEdges=function(d,q){return this.getTreeEdges(d,q,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(d,q){return this.getTreeEdges(d,q,!1,!0,!1)};var f=EditorUi.prototype.init;EditorUi.prototype.init=function(){f.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function d(J){return k.isVertex(J)&&u(J)}function q(J){var m=!1;null!=J&&(m="1"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"cells",[N]))}finally{G.getModel().endUpdate()}G.setSelectionCell(N)}))}else{c=Graph.zapGremlins(mxUtils.trim(c));if(this.isCompatibleString(c))return this.importXml(c,e,k,t,null,A);if(0<c.length)if(this.isLucidChartData(c))this.convertLucidChart(c,mxUtils.bind(this,function(N){this.editor.graph.setSelectionCells(this.importXml(N,e,k,t,null,A))}),mxUtils.bind(this,function(N){this.handleError(N)}));else{G=this.editor.graph;p=null;G.getModel().beginUpdate();try{p=G.insertVertex(G.getDefaultParent(),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0;ja<wa.length;ja++)oa=wa[ja],0==ia==(null==la[oa.url])&&(Ha[oa.url]=!0,Ja.push(oa));la=Ha;ia++}0==Ja.length?ra.innerText=mxResources.get("noResultsFor",[ka]):C(Ja,!0)}}function J(ka){if(Y!=ka||W!=ba)n(),Ba.scrollTop=0,aa.innerText="",ra.innerText=mxResources.get("searchResults")+' "'+ka+'"',Ua=null,fa?Q(ka):D&&(ka?(Ga.spin(aa),g=!1,H=!0,D(ka,Va,function(){k(mxResources.get("searchFailed"));Va([])},W?null:u)):O(W)),Y=ka,ba=W}function m(ka){null!=Ua&&clearTimeout(Ua);13==ka.keyCode?J(Fa.value):Ua= setTimeout(function(){J(Fa.value)},1E3)}var v='<div class="geTempDlgHeader"><img src="/images/draw.io-logo.svg" class="geTempDlgHeaderLogo"><input type="search" class="geTempDlgSearchBox" '+(D?"":'style="display: none"')+' placeholder="'+mxResources.get("search")+'"></div><div class="geTemplatesList" style="display: none"><div class="geTempDlgBack">&lt; '+mxResources.get("back")+'</div><div class="geTempDlgHLine"></div><div class="geTemplatesLbl">'+mxResources.get("templates")+'</div></div><div class="geTempDlgContent" style="width: 100%"><div class="geTempDlgNewDiagramCat"><div class="geTempDlgNewDiagramCatLbl">'+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
document.execCommand("copy");this.alert(mxResources.get("copiedToClipboard"));n.value=t}catch(y){this.handleError(y)}}));p.setAttribute("title","copy");p.className="geBtn";k.appendChild(p)}),!0,null,null,"https://www.drawio.com/doc/faq/apply-layouts");this.showDialog(e.container,620,460,!0,!0);e.init()}))};EditorUi.prototype.loadOrgChartLayouts=function(c){this.createTimeout(null,mxUtils.bind(this,function(e){var k=mxUtils.bind(this,function(){this.loadingOrgChart=!1;e.clear()&&(Graph.layoutNames.push("mxOrgChartLayout"), this.spinner.stop(),c())}),n=mxUtils.bind(this,function(p){this.loadingOrgChart=!1;e.clear()&&this.handleError(p)});"undefined"!==typeof mxOrgChartLayout||this.loadingOrgChart||this.isOffline(!0)?k():this.spinner.spin(document.body,mxResources.get("loading"))&&(this.loadingOrgChart=!0,"1"==urlParams.dev?mxscript("js/orgchart/bridge.min.js",function(){mxscript("js/orgchart/bridge.collections.min.js",function(){mxscript("js/orgchart/OrgChart.Layout.min.js",function(){mxscript("js/orgchart/mxOrgChartLayout.js", k,null,null,null,n)},null,null,null,n)},null,null,null,n)},null,null,null,n):mxscript(DRAWIO_BASE_URL+"/js/orgchart.min.js",k,null,null,null,n))}),onerror)};EditorUi.prototype.importCsv=function(c,e){this.loadOrgChartLayouts(mxUtils.bind(this,function(){this.doImportCsv(c,e)}))};EditorUi.prototype.doImportCsv=function(c,e){try{var k=c.split("\n"),n=[],p=[],t=[],y={};if(0<k.length){var A={},G=this.editor.graph,C=null,V=null,S=null,N=null,O=null,Q=null,J=null,m="whiteSpace=wrap;html=1;",v=null,B=null,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
t.defaultLibraryName=mxResources.get("untitledLibrary");var A=document.createElement("div");A.className="geMenubarContainer";var G=null,C=new Menubar(t,A);t.statusContainer=t.createStatusContainer();t.statusContainer.style.position="relative";t.statusContainer.style.maxWidth="";t.statusContainer.style.color="gray";t.statusContainer.style.cursor="default";var V=t.hideCurrentMenu;t.hideCurrentMenu=function(){V.apply(this,arguments);this.editor.graph.popupMenuHandler.hideMenu()};var S=t.descriptorChanged;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments),null!=this.mathEnabled&&this.mathEnabled!=this.ui.isMathEnabled()&&(this.ui.setMathEnabled(this.mathEnabled),this.mathEnabled=!this.mathEnabled),null!=this.shadowVisible&&this.shadowVisible!=this.ui.editor.graph.shadowVisible&&(this.ui.editor.graph.setShadowVisible(this.shadowVisible),this.shadowVisible=!this.shadowVisible)};Editor.prototype.useCanvasForExport=!1;try{var B=document.createElement("canvas"),H=new Image;H.onload=function(){try{B.getContext("2d").drawImage(H,0,0);var g=B.toDataURL("image/png"); Editor.prototype.useCanvasForExport=null!=g&&6<g.length}catch(x){}};H.src="data:image/svg+xml;base64,"+btoa(unescape(encodeURIComponent('<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="1px" height="1px" version="1.1"><foreignObject pointer-events="all" width="1" height="1"><div xmlns="http://www.w3.org/1999/xhtml"></div></foreignObject></svg>')))}catch(g){}Editor.prototype.useCanvasForExport=!1})();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"geCommentActionLnk";mxUtils.write(Z,T);X.appendChild(Z);mxEvent.addListener(Z,"click",function(Y){W(Y,N);Y.preventDefault();mxEvent.consume(Y)});P.appendChild(X);U&&(X.style.display="none")}function B(){function T(X){W.push(U);if(null!=X.replies)for(var Z=0;Z<X.replies.length;Z++)U=U.nextSibling,T(X.replies[Z])}var W=[],U=g;T(N);return{pdiv:U,replies:W}}function H(T,W,U,X,Z){function Y(){K(aa);N.addReply(ca,function(ra){ca.id=ra;N.replies.push(ca);R(aa);U&&U()},function(ra){ba();E(aa);b.handleError(ra, null,null,null,mxUtils.htmlEntities(mxResources.get("objectNotFound")))},X,Z)}function ba(){D(ca,aa,function(ra){Y()},!0)}var fa=B().pdiv,ca=b.newComment(T,b.getCurrentUser());ca.pCommentId=N.id;null==N.replies&&(N.replies=[]);var aa=I(ca,N.replies,fa,J+1);W?ba():Y()}if(m||!N.isResolved){y.style.display="none";var g=document.createElement("div");g.className="geCommentContainer";g.setAttribute("data-commentId",N.id);g.style.marginLeft=20*J+5+"px";N.isResolved&&!Editor.isDarkMode()&&(g.style.backgroundColor=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){window.clearTimeout(M);F&&x(Editor.svgBrokenImage.src)});else{var P=new Image;this.crossOriginImages&&(P.crossOrigin="anonymous");P.onload=function(){window.clearTimeout(M);if(F)try{var T=document.createElement("canvas"),W=T.getContext("2d");T.height=P.height;T.width=P.width;W.drawImage(P,0,0);x(T.toDataURL())}catch(U){x(Editor.svgBrokenImage.src)}};P.onerror=function(){window.clearTimeout(M);F&&x(Editor.svgBrokenImage.src)};P.src=g}}catch(T){x(Editor.svgBrokenImage.src)}};Editor.prototype.convertImages=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e.getCurrentCellStyle(J).treeMoving);return m}function u(J){var m=!1;null!=J&&(J=k.getParent(J),m=e.view.getState(J),m="tree"==(null!=m?m.style:e.getCellStyle(J)).containerType);return m}function z(J){var m=!1;null!=J&&(J=k.getParent(J),m=e.view.getState(J),e.view.getState(J),m=null!=(null!=m?m.style:e.getCellStyle(J)).childLayout);return m}function D(J){J=e.view.getState(J);if(null!=J){var m=e.getIncomingTreeEdges(J.cell);if(0<m.length&&(m=e.view.getState(m[0]),null!=m&&(m=m.absolutePoints,null!= m&&0<m.length&&(m=m[m.length-1],null!=m)))){if(m.y==J.y&&Math.abs(m.x-J.getCenterX())<J.width/2)return mxConstants.DIRECTION_SOUTH;if(m.y==J.y+J.height&&Math.abs(m.x-J.getCenterX())<J.width/2)return mxConstants.DIRECTION_NORTH;if(m.x>J.getCenterX())return mxConstants.DIRECTION_WEST}}return mxConstants.DIRECTION_EAST}function L(J,m){m=null!=m?m:!0;e.model.beginUpdate();try{var v=e.model.getParent(J),B=e.getIncomingTreeEdges(J),H=e.cloneCells([B[0],J]);e.model.setTerminal(H[0],e.model.getTerminal(B[0],
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
1));try{e=JSON.parse(c)}catch(n){}}}return e};EditorUi.prototype.updateHashObject=function(){if(null!=this.currentFile&&""!=this.currentFile.getHash()&&null!=this.currentPage&&0<this.getSelectedPageIndex()){var c=this.getHashObject();c.pageId=this.currentPage.getId();this.setHashObject(c)}else this.setHashObject(null)};EditorUi.prototype.setHashObject=function(c){if(Editor.enableHashObjects){var e=window.location.hash;if(null==e||""==e)e="#";var k=e.lastIndexOf("#");0<k&&(e=e.substring(0,k));try{null== c||mxUtils.isEmptyObject(c)||(e=e+"#"+encodeURIComponent(JSON.stringify(c)))}catch(n){}window.location.hash=e}};EditorUi.prototype.loadDescriptor=function(c,e,k){var n=window.location.hash,p=mxUtils.bind(this,function(y){var A=null!=c.data?c.data:"";null!=y&&0<y.length&&(0<A.length&&(A+="\n"),A+=y);y=new LocalFile(this,"csv"!=c.format&&0<A.length?A:this.emptyDiagramXml,null!=urlParams.title?decodeURIComponent(urlParams.title):this.defaultFilename,!0);y.getHash=function(){return n};this.fileLoaded(y);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m);var X=mxUtils.bind(this,function(Z,Y,ba){U.innerText="";mxUtils.write(U,Math.round(100*t.editor.graph.view.scale*(null!=ba?ba:1))+"%")});t.editor.graph.view.addListener(mxEvent.EVENT_SCALE,X);t.editor.addListener("resetGraphView",X);t.editor.addListener("pageSelected",X);t.editor.graph.addListener("zoomPreview",mxUtils.bind(this,function(Z,Y){X(Z,Y,Y.getProperty("factor"))}))})(T);var W=t.setGraphEnabled;t.setGraphEnabled=function(){W.apply(this,arguments);null!=this.tabContainer&&(T.style.visibility= this.tabContainer.style.visibility,this.diagramContainer.style.bottom="0"!=urlParams.pages&&"hidden"!=this.tabContainer.style.visibility?this.tabContainerHeight+"px":"0px")}}p.appendChild(A);p.appendChild(t.diagramContainer);n.appendChild(p);t.updateTabContainer();!EditorUi.windowed&&1E3<=d&&b(this,!0);p.appendChild(t.tabContainer);k();mxEvent.addListener(window,"resize",function(){k();null!=t.sidebarWindow&&t.sidebarWindow.window.fit();null!=t.formatWindow&&t.formatWindow.window.fit();null!=t.actions.outlineWindow&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
360,null!=c.pages&&1<c.pages.length?470:390,!0,!0)};this.defaultFilename=mxResources.get("untitledDiagram");var V=e.getExportVariables;e.getExportVariables=function(){var B=V.apply(this,arguments),H=c.getCurrentFile();null!=H&&(B.filename=H.getTitle());B.pagecount=null!=c.pages?c.pages.length:1;B.page=null!=c.currentPage?c.currentPage.getName():"";B.pagenumber=null!=c.pages&&null!=c.currentPage?mxUtils.indexOf(c.pages,c.currentPage)+1:1;return B};var S=e.getGlobalVariable;e.getGlobalVariable=function(B){var H= c.getCurrentFile();return"filename"==B&&null!=H?H.getTitle():"page"==B&&null!=c.currentPage?c.currentPage.getName():"pagenumber"==B?null!=c.currentPage&&null!=c.pages?mxUtils.indexOf(c.pages,c.currentPage)+1:1:"pagecount"==B?null!=c.pages?c.pages.length:1:S.apply(this,arguments)};var N=null,O=null;this.addListener("fileDescriptorChanged",mxUtils.bind(this,function(){var B=this.getCurrentFile(),H=null!=B&&null!=B.getTitle()?B.getTitle():this.defaultFilename;N!=H&&B==O&&(e.invalidateDescendantsWithPlaceholders(e.model.getRoot()),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
F.apply(this,arguments)};var M=H.restore;H.restore=function(){x--;M.apply(this,arguments)};var P=m.drawShape;m.drawShape=function(T){mxLog.debug("entering shape",T,x);P.apply(this,arguments);mxLog.debug("leaving shape",T,x)};m.drawState(q.getView().getState(q.model.root),H);mxLog.show();mxLog.debug(mxUtils.getXml(g));mxLog.debug("stateCounter",x)}));d.actions.addAction("testShowConsole",function(){mxLog.isVisible()?mxLog.window.fit():mxLog.show();mxLog.window.div.style.zIndex=mxPopupMenu.prototype.zIndex-
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
T[W];T.stroke!=mxConstants.NONE&&null!=T.stroke||delete this.nextShape.options.stroke;T.filled||delete this.nextShape.options.fill;this.passThrough=!0;this.rc.draw(this.nextShape);this.passThrough=!1}};g.prototype.stroke=function(){this.passThrough?this.originalStroke.apply(this.canvas,arguments):this.drawPath(this.getStyle(!0,!1))};g.prototype.fill=function(){this.passThrough?this.originalFill.apply(this.canvas,arguments):this.drawPath(this.getStyle(!1,!0))};g.prototype.fillAndStroke=function(){this.passThrough?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"22px";y.style.width="22px";y.style.position="relative";y.style.top=mxClient.IS_IE||mxClient.IS_IE11||mxClient.IS_EDGE?"6px":"1px";y.className="geColorBtn";c.appendChild(y);mxUtils.br(c);return{getColor:function(){return t},getTarget:function(){return n.value},focus:function(){n.focus()}}};EditorUi.prototype.createUrlParameters=function(c,e,k,n,p,t,y){y=null!=y?y:[];n&&("https://viewer.diagrams.net"==EditorUi.lightboxHost&&"1"!=urlParams.dev||y.push("lightbox=1"),"auto"!=c&&y.push("target="+c),null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u.x,u.y),b.editor.graph.fireEvent(new mxEventObject("cellsInserted","cells",N))}finally{b.editor.graph.getModel().endUpdate()}b.editor.graph.setSelectionCells(N);b.editor.graph.scrollCellToVisible(b.editor.graph.getSelectionCell());t.destroy();n.parentNode.removeChild(n)}}}function q(){return"list"==D.value?"Person\n-name: String\n-birthDate: Date\n--\n+getName(): String\n+setName(String): void\n+isBirthday(): boolean\n\nAddress\n-street: String\n-city: String\n-state: String":"mermaid"==D.value||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
}finally{e.getModel().endUpdate()}t&&(e.setSelectionCell(k),e.scrollCellToVisible(k))}};l=mxUtils.button(mxResources.get("preview"),function(){c(E,R,!1)});l.className="geBtn";L.appendChild(l);l=mxUtils.button(mxResources.get("apply"),function(){c(b.editor.graph,f,!0)});l.className="geBtn gePrimaryBtn";L.appendChild(l);b.editor.cancelFirst||L.appendChild(q);D.appendChild(L);z.appendChild(D);u.appendChild(z);this.container=u},CustomDialog=function(b,f,l,d,q,u,z,D,L,K,E,R){var I=document.createElement("div");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=aa&&(this.shapeBackgroundColor=za,this.shapeForegroundColor=ra,this.stylesheet=aa,this.refresh());return Ba};var G=mxCellRenderer.prototype.destroy;mxCellRenderer.prototype.destroy=function(g){G.apply(this,arguments);null!=g.secondLabel&&(g.secondLabel.destroy(),g.secondLabel=null)};mxCellRenderer.prototype.getShapesForState=function(g){return[g.shape,g.text,g.secondLabel,g.control]};var C=mxGraphView.prototype.resetValidationState;mxGraphView.prototype.resetValidationState=function(){C.apply(this, arguments);this.enumerationState=0};var V=mxGraphView.prototype.stateValidated;mxGraphView.prototype.stateValidated=function(g){null!=g.shape&&this.redrawEnumerationState(g);return V.apply(this,arguments)};mxGraphView.prototype.createEnumerationValue=function(g){g=decodeURIComponent(mxUtils.getValue(g.style,"enumerateValue",""));""==g&&(g=++this.enumerationState);return'<div style="padding:2px;border:1px solid gray;background:yellow;border-radius:2px;">'+mxUtils.htmlEntities(g)+"</div>"};mxGraphView.prototype.redrawEnumerationState=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){window.openFile=null});if(!e){var p=this.dialog,t=p.close;this.dialog.close=mxUtils.bind(this,function(y){Editor.useLocalStorage=n;t.apply(p,arguments);y&&null==this.getCurrentFile()&&"1"!=urlParams.embed&&this.showSplash()})}}};EditorUi.prototype.importZipFile=function(c,e,k){var n=this,p=mxUtils.bind(this,function(){this.loadingExtensions=!1;"undefined"!==typeof JSZip?JSZip.loadAsync(c).then(function(t){if(mxUtils.isEmptyObject(t.files))k();else{var y=0,A,G=!1;t.forEach(function(C,V){C= V.name.toLowerCase();"diagram/diagram.xml"==C?(G=!0,V.async("string").then(function(S){0==S.indexOf("<mxfile ")?e(S):k()})):0==C.indexOf("versions/")&&(C=parseInt(C.substr(9)),C>y&&(y=C,A=V))});0<y?A.async("string").then(function(C){(new XMLHttpRequest).upload&&n.isRemoteFileFormat(C,c.name)?n.isOffline()?n.showError(mxResources.get("error"),mxResources.get("notInOffline"),null,k):n.parseFileData(C,mxUtils.bind(this,function(V){4==V.readyState&&(200<=V.status&&299>=V.status?e(V.responseText):k())}), c.name):k()}):G||k()}},function(t){k(t)}):k()});"undefined"!==typeof JSZip||this.loadingExtensions||this.isOffline(!0)?p():(this.loadingExtensions=!0,mxscript("js/extensions.min.js",p,null,null,null,k))};EditorUi.prototype.importFile=function(c,e,k,n,p,t,y,A,G,C,V,S){C=null!=C?C:!0;var N=!1,O=null,Q=mxUtils.bind(this,function(J){var m=null;null!=J&&"<mxlibrary"==J.substring(0,10)?this.loadLibrary(new LocalLibrary(this,J,y)):m=this.importXml(J,k,n,C,null,null!=S?mxEvent.isControlDown(S):null);null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.getTextContent(x[F]);0>M.indexOf("mxPageSelector")&&0<M.indexOf("MathJax")&&g[0].appendChild(x[F].cloneNode(!0))}};Editor.prototype.addFontCss=function(g,x){x=null!=x?x:this.absoluteCssFonts(this.fontCss);if(null!=x){var F=g.getElementsByTagName("defs"),M=g.ownerDocument;0==F.length?(F=null!=M.createElementNS?M.createElementNS(mxConstants.NS_SVG,"defs"):M.createElement("defs"),null!=g.firstChild?g.insertBefore(F,g.firstChild):g.appendChild(F)):F=F[0];g=null!=M.createElementNS?M.createElementNS(mxConstants.NS_SVG, "style"):M.createElement("style");g.setAttribute("type","text/css");mxUtils.setTextContent(g,x);F.appendChild(g)}};Editor.prototype.isExportToCanvas=function(){return mxClient.IS_CHROMEAPP||this.useCanvasForExport};Editor.prototype.getMaxCanvasScale=function(g,x,F){var M=mxClient.IS_FF?8192:16384;return Math.min(F,Math.min(M/g,M/x))};Editor.prototype.exportToCanvas=function(g,x,F,M,P,T,W,U,X,Z,Y,ba,fa,ca,aa,ra,za,Ba){try{T=null!=T?T:!0;W=null!=W?W:!0;ba=null!=ba?ba:this.graph;fa=null!=fa?fa:0;var ea=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e[k].parentNode&&"root"!=e[k].parentNode.nodeName&&null!=e[k].parentNode.parentNode&&(e[k].setAttribute("id",e[k].parentNode.getAttribute("id")),e[k].parentNode.parentNode.replaceChild(e[k],e[k].parentNode));return c};EditorUi.prototype.synchronizeCurrentFile=function(c){var e=this.getCurrentFile();null!=e&&(e.savingFile?this.handleError({message:mxResources.get("busy")}):!c&&e.invalidChecksum?e.handleFileError(null,!0):this.spinner.spin(document.body,mxResources.get("updatingDocument"))&&(e.clearAutosave(), this.editor.setStatus(""),c?e.reloadFile(mxUtils.bind(this,function(){e.handleFileSuccess("manual"==DrawioFile.SYNC)}),mxUtils.bind(this,function(k){e.handleFileError(k,!0)})):e.synchronizeFile(mxUtils.bind(this,function(){e.handleFileSuccess("manual"==DrawioFile.SYNC)}),mxUtils.bind(this,function(k){e.handleFileError(k,!0)}))))};EditorUi.prototype.getFileData=function(c,e,k,n,p,t,y,A,G,C,V){p=null!=p?p:!0;t=null!=t?t:!1;C=null!=C?C:!Editor.defaultCompressed;var S=this.editor.graph;if(e||!c&&null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0;H<J.length;H++){var g=e.view.getState(e.model.getTerminal(J[H],!1));null!=g&&(!m&&Math.min(g.x+g.width,v.x+v.width)>=Math.max(g.x,v.x)||m&&Math.min(g.y+g.height,v.y+v.height)>=Math.max(g.y,v.y))&&B.push(g)}B.sort(function(x,F){return m?x.x+x.width-F.x-F.width:x.y+x.height-F.y-F.height})}return B}function I(J,m){var v=D(J),B=m==mxConstants.DIRECTION_EAST||m==mxConstants.DIRECTION_WEST;(v==mxConstants.DIRECTION_EAST||v==mxConstants.DIRECTION_WEST)==B&&v!=m?c.actions.get("selectParent").funct():v== m?(m=e.getOutgoingTreeEdges(J),null!=m&&0<m.length&&e.setSelectionCell(e.model.getTerminal(m[0],!1))):(v=e.getIncomingTreeEdges(J),null!=v&&0<v.length&&(B=R(e.model.getTerminal(v[0],!0),B,J),J=e.view.getState(J),null!=J&&(J=mxUtils.indexOf(B,J),0<=J&&(J+=m==mxConstants.DIRECTION_NORTH||m==mxConstants.DIRECTION_WEST?-1:1,0<=J&&J<=B.length-1&&e.setSelectionCell(B[J].cell)))))}var c=this,e=c.editor.graph,k=e.getModel(),n=c.menus.createPopupMenu;c.menus.createPopupMenu=function(J,m,v){n.apply(this,arguments);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"https://app.diagrams.net/";var y=c.editor.getEditBlankUrl;this.editor.getEditBlankUrl=function(B){B=null!=B?B:"";"1"==urlParams.dev&&(B+=(0<B.length?"&":"?")+"dev=1");return y.apply(this,arguments)};var A=e.addClickHandler;e.addClickHandler=function(B,H,g){var x=H;H=function(F,M){if(null==M){var P=mxEvent.getSource(F);"a"==P.nodeName.toLowerCase()&&(M=P.getAttribute("href"))}null!=M&&e.isCustomLink(M)&&(mxEvent.isTouchEvent(F)||!mxEvent.isPopupTrigger(F))&&e.customLinkClicked(M)&&mxEvent.consume(F);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g.setAttribute("title",mxResources.get("preview"));g.className="geActiveButton";g.style.position="absolute";g.style.cursor="default";g.style.padding="8px";g.style.right="0px";g.style.top="0px";var x=!1,F=null,M=!1;if(R||I){var P=[],T=null,W=null,U=null,X=function(da){H.setAttribute("disabled","disabled");for(var la=0;la<P.length;la++)P[la].className=la==da?"geBtn gePrimaryBtn":"geBtn"};Q=!0;k=document.createElement("div");k.style.whiteSpace="nowrap";k.style.height="30px";O.appendChild(k);N=mxUtils.button(mxResources.get("Templates",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null}u(R)}));l=!0}}catch(S){l=!1,null!=z&&z!=this.editor.graph&&null!=z.container.parentNode&&z.container.parentNode.removeChild(z.container)}l||window.clearTimeout(q);return l};App.prototype.createBackground=function(){var b=this.createDiv("background");b.style.position="absolute";b.style.background="white";b.style.left="0px";b.style.top="0px";b.style.bottom="0px";b.style.right="0px";mxUtils.setOpacity(b,100);return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D?mxUtils.button(mxResources.get("ignore"),D):null;null!=D&&(D.className="geBtn");b.editor.cancelFirst?(c.appendChild(l),null!=D&&c.appendChild(D),c.appendChild(z),c.appendChild(u)):(c.appendChild(u),c.appendChild(z),null!=D&&c.appendChild(D),c.appendChild(l));K.appendChild(c);K.appendChild(e);this.container=K},FindWindow=function(b,f,l,d,q,u){function z(H,g,x,F){if("object"===typeof g.value&&null!=g.value.attributes){g=g.value.attributes;for(var M=0;M<g.length;M++)if("label"!=g[M].nodeName){var P= mxUtils.trim(g[M].nodeValue.replace(/[\x00-\x1F\x7F-\x9F]|\s+/g," ")).toLowerCase();if(null==H&&(F&&0<=P.indexOf(x)||!F&&P.substring(0,x.length)===x)||null!=H&&H.test(P))return!0}}return!1}function D(){c?(m.removeAttribute("disabled"),v.removeAttribute("disabled")):(m.setAttribute("disabled","disabled"),v.setAttribute("disabled","disabled"));A.value?B.removeAttribute("disabled"):B.setAttribute("disabled","disabled")}function L(H,g,x){Q.innerText="";var F=E.model.getDescendants(E.model.getRoot()),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
6)this.curveTo(fa[ca],fa[ca+1],fa[ca+2],fa[ca+3],fa[ca+4],fa[ca+5]);this.lastX=Y;this.lastY=ba}};g.prototype.rect=function(T,W,U,X){this.passThrough?this.originalRect.apply(this.canvas,arguments):(this.path=[],this.nextShape=this.rc.generator.rectangle(T,W,U,X,this.getStyle(!0,!0)))};g.prototype.ellipse=function(T,W,U,X){this.passThrough?this.originalEllipse.apply(this.canvas,arguments):(this.path=[],this.nextShape=this.rc.generator.ellipse(T+U/2,W+X/2,U,X,this.getStyle(!0,!0)))};g.prototype.roundrect=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
c.nodeName&&(y=c.hasAttribute("max-scale")?parseFloat(c.getAttribute("max-scale")):1);c=c.nextSibling}}finally{t.endUpdate()}null!=y&&this.chromelessResize&&this.chromelessResize(!0,y)}return k};EditorUi.prototype.getCopyFilename=function(c,e){var k=null!=c&&null!=c.getTitle()?c.getTitle():this.defaultFilename;c="";var n=k.lastIndexOf(".");0<=n&&(c=k.substring(n),k=k.substring(0,n));if(e){e=k;var p=new Date;k=p.getFullYear();n=p.getMonth()+1;var t=p.getDate(),y=p.getHours(),A=p.getMinutes();p=p.getSeconds();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g=null!=g?g:DRAW_MATH_URL+"/startup.js";Editor.mathJaxQueue=[];var M=null;Editor.doMathJaxRender=function(W){try{null==M?(MathJax.typesetClear([W]),MathJax.typeset([W]),F()):M!=W&&Editor.mathJaxQueue.push(W)}catch(U){MathJax.typesetClear([W]),null!=U.retry?(M=W,U.retry.then(function(){MathJax.typesetPromise([W]).then(F)["catch"](function(X){console.log("Error in MathJax.typesetPromise: "+X.toString());F()})})["catch"](function(X){console.log("Error in MathJax.retry: "+X.toString());F()})):null!=window.console&& console.log("Error in MathJax.typeset: "+U.toString())}};window.MathJax=null!=x?x:{options:{skipHtmlTags:{"[+]":["text"]}},loader:{load:["html"==urlParams["math-output"]?"output/chtml":"output/svg","input/tex","input/asciimath","ui/safe"]},startup:{pageReady:function(){for(var W=0;W<Editor.mathJaxQueue.length;W++)Editor.doMathJaxRender(Editor.mathJaxQueue[W])}}};Editor.MathJaxRender=function(W){"undefined"!==typeof MathJax&&"function"===typeof MathJax.typeset?Editor.doMathJaxRender(W):Editor.mathJaxQueue.push(W)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
V(la.url,la.libs,la.title,la.tooltip?la.tooltip:la.title,la.select,la.imgUrl,la.info,la.onClick,la.preview,la.noImg,la.clibs);da&&la.click();da=!1}}function y(da,la,ma,oa,ia,ja){if(null!=da&&mxUtils.isAncestorNode(document.body,oa)){da=mxUtils.parseXml(da);da=Editor.parseDiagramNode(da.documentElement);var va=new mxCodec(da.ownerDocument),wa=new mxGraphModel;va.decode(da,wa);da=wa.root.getChildAt(0).children;b.sidebar.createTooltip(oa,da,Math.min((window.innerWidth||document.documentElement.clientWidth|| document.body.clientWidth)-80,1E3),Math.min((window.innerHeight||document.documentElement.clientHeight||document.body.clientHeight)-80,800),null!=ia?mxResources.get(ia):null,!0,new mxPoint(la,ma),!0,function(){M=null!=b.sidebar.tooltip&&"none"!=b.sidebar.tooltip.style.display;null!=ja&&C(oa,null,null,ja,infoObj,clibs)},!0,!1)}}function A(){var da=document.createElement("div");da.style.position="absolute";da.style.overflow="visible";da.style.left="8px";da.style.right="8px";da.style.bottom="8px";da.style.top=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g.length&&0<x.length){this.model.beginUpdate();try{for(var F=0;F<g.length;F++){for(var M=this.getTagsForCell(g[F]),P=M.split(" "),T=!1,W=0;W<x.length;W++){var U=mxUtils.trim(x[W]);""!=U&&0>mxUtils.indexOf(P,U)&&(M=0<M.length?M+" "+U:U,T=!0)}T&&this.setAttributeForCell(g[F],"tags",M)}}finally{this.model.endUpdate()}}};Graph.prototype.removeTagsForCells=function(g,x){if(0<g.length&&0<x.length){this.model.beginUpdate();try{for(var F=0;F<g.length;F++){var M=this.getTagsForCell(g[F]);if(0<M.length){for(var P=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
document.body.clientHeight)-80,800),null!=ka.title?mxResources.get(ka.title,null,ka.title):null,!0,new mxPoint(Ja,Ha),!0,null,!0);var Ca=document.createElement("div");Ca.className="geTempDlgDialogMask";B.appendChild(Ca);var ua=b.sidebar.hideTooltip;b.sidebar.hideTooltip=function(){Ca&&(B.removeChild(Ca),Ca=null,ua.apply(this,arguments),b.sidebar.hideTooltip=ua)};mxEvent.addListener(Ca,"click",function(){b.sidebar.hideTooltip()})}}var ja=null;if(qa||b.sidebar.currentElt==da)b.sidebar.hideTooltip();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
delete D[R];return z};EditorUi.prototype.patchViewState=function(b,f){if(null!=b.viewState&&null!=f){b==this.currentPage&&(b.viewState=this.editor.graph.getViewState());for(var l in f)try{this.patchViewStateProperty(b,f,l)}catch(d){}b==this.currentPage&&this.editor.graph.setViewState(b.viewState,!0)}};EditorUi.prototype.patchViewStateProperty=function(b,f,l){b.viewState[l]=JSON.parse(f[l])};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!1;u.connectionHandler.createEdgeState=function(k){k=u.createEdge(null,null,null,null,null,z);return new mxCellState(this.graph.view,k,this.graph.getCellStyle(k))};var D=u.getDefaultParent(),L=mxUtils.bind(this,function(k){var n=new mxCellOverlay(this.connectImage,"Add outgoing");n.cursor="hand";n.addListener(mxEvent.CLICK,function(p,t){u.connectionHandler.reset();u.clearSelection();var y=u.getCellGeometry(k),A;R(function(){A=u.insertVertex(D,null,"Entry",y.x,y.y,80,30,"rounded=1;");L(A);u.view.refresh(A);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e&&e(N)}}),null,null,null,mxUtils.bind(this,function(V){null!=e&&e(V)}),null,null,n,null,t.shadowVisible,null,t,p,null,null,null,"diagram",null)}catch(V){null!=e&&e(V)}};EditorUi.prototype.getEmbeddedSvg=function(c,e,k,n,p,t,y,A,G,C,V,S,N){A=null!=A?A:!0;V=null!=V?V:0;y=null!=G?G:e.background;y==mxConstants.NONE&&(y=null);t=e.getSvg(y,C,V,null,null,t,null,null,null,e.shadowVisible||S,null,N,"diagram");(e.shadowVisible||S)&&e.addSvgShadow(t,null,null,0==V);null!=c&&t.setAttribute("content",c);null!= k&&t.setAttribute("resource",k);var O=mxUtils.bind(this,function(Q){Q=(n?"":Graph.xmlDeclaration+"\n"+Graph.svgFileComment+"\n"+Graph.svgDoctype+"\n")+mxUtils.getXml(Q);null!=p&&p(Q);return Q});e.mathEnabled&&this.editor.addMathCss(t);if(null!=p)this.embedFonts(t,mxUtils.bind(this,function(Q){A?this.editor.convertImages(Q,mxUtils.bind(this,function(J){O(J)})):O(Q)}));else return O(t)};EditorUi.prototype.embedFonts=function(c,e){this.editor.loadFonts(mxUtils.bind(this,function(){try{null!=this.editor.resolvedFontCss&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.originalQuadTo.apply(this.canvas,arguments):(this.addOp(this.quadOp,T,W,U,X),this.lastX=U,this.lastY=X)};g.prototype.curveTo=function(T,W,U,X,Z,Y){this.passThrough?this.originalCurveTo.apply(this.canvas,arguments):(this.addOp(this.curveOp,T,W,U,X,Z,Y),this.lastX=Z,this.lastY=Y)};g.prototype.arcTo=function(T,W,U,X,Z,Y,ba){if(this.passThrough)this.originalArcTo.apply(this.canvas,arguments);else{var fa=mxUtils.arcToCurves(this.lastX,this.lastY,T,W,U,X,Z,Y,ba);if(null!=fa)for(var ca=0;ca<fa.length;ca+= 6)this.curveTo(fa[ca],fa[ca+1],fa[ca+2],fa[ca+3],fa[ca+4],fa[ca+5]);this.lastX=Y;this.lastY=ba}};g.prototype.rect=function(T,W,U,X){this.passThrough?this.originalRect.apply(this.canvas,arguments):(this.path=[],this.nextShape=this.rc.generator.rectangle(T,W,U,X,this.getStyle(!0,!0)))};g.prototype.ellipse=function(T,W,U,X){this.passThrough?this.originalEllipse.apply(this.canvas,arguments):(this.path=[],this.nextShape=this.rc.generator.ellipse(T+U/2,W+X/2,U,X,this.getStyle(!0,!0)))};g.prototype.roundrect=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Format.prototype.init;Format.prototype.init=function(){K.apply(this,arguments);this.editorUi.editor.addListener("fileLoaded",this.update)};var E=Format.prototype.refresh;Format.prototype.refresh=function(){null!=this.editorUi.getCurrentFile()||"1"==urlParams.embed||this.editorUi.editor.chromeless?E.apply(this,arguments):this.clear()};DiagramFormatPanel.prototype.isMathOptionVisible=function(g){return"simple"==Editor.currentTheme||"sketch"==Editor.currentTheme||"min"==Editor.currentTheme};var R=DiagramFormatPanel.prototype.addOptions;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
La.renderPage=function(Za,cb,bb,eb,db,kb){var jb=mxClient.NO_FO,fb=ib.apply(this,arguments);mxClient.NO_FO=jb;this.graph.mathEnabled?this.mathEnabled=this.mathEnabled||!0:fb.className="geDisableMathJax";return fb}}Na=null;Ya=P.shapeForegroundColor;$a=P.shapeBackgroundColor;Wa=P.enableFlowAnimation;P.enableFlowAnimation=!1;null!=P.themes&&"darkTheme"==P.defaultThemeName&&(Na=P.stylesheet,P.stylesheet=P.getDefaultStylesheet(),P.shapeForegroundColor="#000000",P.shapeBackgroundColor="#ffffff",P.refresh());
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments))};var n=mxSvgCanvas2D.prototype.updateTextNodes;mxSvgCanvas2D.prototype.updateTextNodes=function(g,x,F,M,P,T,W,U,X,Z,Y){n.apply(this,arguments);Graph.processFontAttributes(Y)};var p=mxText.prototype.redraw;mxText.prototype.redraw=function(){p.apply(this,arguments);null!=this.node&&"DIV"==this.node.nodeName&&Graph.processFontAttributes(this.node)};Graph.prototype.createTagsDialog=function(g,x,F,M){function P(){for(var ra=U.getSelectionCells(),za=[],Ba=0;Ba<ra.length;Ba++)U.isCellVisible(ra[Ba])&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
S.setBackgroundImage(Q.viewState.backgroundImage);S.getGlobalVariable=function(J){return"page"==J&&null!=Q?Q.getName():"pagenumber"==J?1:O.apply(this,arguments)};document.body.appendChild(S.container);null!=Q&&S.model.setRoot(Q.root)}}y=null!=y?y:this.getXmlFileData(p,t,C,V);G=null!=G?G:this.getCurrentFile();c=this.createFileData(y,S,G,window.location.href,c,e,k,n,p,A,C);S!=this.editor.graph&&S.container.parentNode.removeChild(S.container);return c};EditorUi.prototype.getHtml=function(c,e,k,n,p,t){t=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
c.error.data[0].reason)||404==G.code||404==G.status)){S="#U"==S.substring(0,2)?S.substring(45,S.lastIndexOf("%26ex")):S.substring(2);this.showError(e,y,mxResources.get("openInNewWindow"),mxUtils.bind(this,function(){this.editor.graph.openLink("https://drive.google.com/open?id="+S);this.handleError(c,e,k,n,p)}),V,mxResources.get("changeUser"),mxUtils.bind(this,function(){function O(){v.innerText="";for(var B=0;B<Q.length;B++){var H=document.createElement("option");mxUtils.write(H,Q[B].displayName); H.value=B;v.appendChild(H);H=document.createElement("option");H.innerHTML="&nbsp;&nbsp;&nbsp;";mxUtils.write(H,"<"+Q[B].email+">");H.setAttribute("disabled","disabled");v.appendChild(H)}H=document.createElement("option");mxUtils.write(H,mxResources.get("addAccount"));H.value=Q.length;v.appendChild(H)}var Q=this.drive.getUsersList(),J=document.createElement("div"),m=document.createElement("span");m.style.marginTop="6px";mxUtils.write(m,mxResources.get("changeUser")+": ");J.appendChild(m);var v=document.createElement("select");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"/pid2/mxPidInstruments.js"];mxStencilRegistry.libraries.pid2misc=[SHAPES_PATH+"/pid2/mxPidMisc.js",STENCIL_PATH+"/pid/misc.xml"];mxStencilRegistry.libraries.pid2valves=[SHAPES_PATH+"/pid2/mxPidValves.js"];mxStencilRegistry.libraries.pidFlowSensors=[STENCIL_PATH+"/pid/flow_sensors.xml"];mxMarker.getPackageForType=function(g){var x=null;null!=g&&0<g.length&&("ER"==g.substring(0,2)?x="mxgraph.er":"sysML"==g.substring(0,5)&&(x="mxgraph.sysml"));return x};var J=mxMarker.createMarker;mxMarker.createMarker=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.setScrollbars=function(a){var b=this.editor.graph,e=b.container.style.overflow;b.scrollbars=a;this.editor.updateGraphComponents();e!=b.container.style.overflow&&(b.container.scrollTop=0,b.container.scrollLeft=0,b.view.scaleAndTranslate(1,0,0),this.resetScrollbars());this.fireEvent(new mxEventObject("scrollbarsChanged"))};EditorUi.prototype.hasScrollbars=function(){return this.editor.graph.scrollbars};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
parseFloat(T.rackUnitSize):"undefined"!==typeof mxRackContainer?mxRackContainer.unitSize:20;W.marginLeft=T.marginLeft||0;W.marginRight=T.marginRight||0;W.marginTop=T.marginTop||0;W.marginBottom=T.marginBottom||0;W.allowGaps=T.allowGaps||0;W.horizontal="1"==mxUtils.getValue(T,"horizontalRack","0");W.resizeParent=!1;W.fill=!0;return W}return M.apply(this,arguments)};this.updateGlobalUrlVariables()};var k=Graph.prototype.postProcessCellStyle;Graph.prototype.postProcessCellStyle=function(g,x){return Graph.processFontStyle(k.apply(this, arguments))};var n=mxSvgCanvas2D.prototype.updateTextNodes;mxSvgCanvas2D.prototype.updateTextNodes=function(g,x,F,M,P,T,W,U,X,Z,Y){n.apply(this,arguments);Graph.processFontAttributes(Y)};var p=mxText.prototype.redraw;mxText.prototype.redraw=function(){p.apply(this,arguments);null!=this.node&&"DIV"==this.node.nodeName&&Graph.processFontAttributes(this.node)};Graph.prototype.createTagsDialog=function(g,x,F,M){function P(){for(var ra=U.getSelectionCells(),za=[],Ba=0;Ba<ra.length;Ba++)U.isCellVisible(ra[Ba])&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
da.getAttribute("section");ma=da.getAttribute("subsection");if(null==oa&&(ja=ia.indexOf("/"),oa=ia.substring(0,ja),null==ma)){var va=ia.indexOf("/",ja+1);-1<va&&(ma=ia.substring(ja+1,va))}ja=sa[oa];null==ja&&(ja=[],sa[oa]=ja);ia=da.getAttribute("clibs");null!=la[ia]&&(ia=la[ia]);ia={url:da.getAttribute("url"),libs:da.getAttribute("libs"),title:da.getAttribute("title"),tooltip:da.getAttribute("name")||da.getAttribute("url"),preview:da.getAttribute("preview"),clibs:ia,tags:da.getAttribute("tags")}; ja.push(ia);null!=ma&&(ja=ta[oa],null==ja&&(ja={},ta[oa]=ja),oa=ja[ma],null==oa&&(oa=[],ja[ma]=oa),oa.push(ia))}da=da.nextSibling}B.stop();S()}})};O.appendChild(pa);O.appendChild(xa);O.appendChild(ha);var Ua=!1,ka=E;/^https?:\/\//.test(ka)&&!b.editor.isCorsEnabledForUrl(ka)&&(ka=PROXY_URL+"?url="+encodeURIComponent(ka));B.spin(ha);null!=n?n(function(da,la){Da=da;U=Ea=la;Va()},Va):Va();W=sa}mxEvent.addListener(m,"keypress",function(da){b.dialog.container.firstChild==O&&13==da.keyCode&&G()});n=document.createElement("div");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
libs:ka.getAttribute("libs"),clibs:ka.getAttribute("clibs"),title:ka.getAttribute("title")}),ka=ka.nextSibling;V(Ka)}});var Va=function(ka,da,la){za.style.display="";Ga.stop();H=!1;if(g)g=!1;else if(da)aa.innerText=da;else{la=la||{};da=0;for(var ma in la)da+=la[ma].length;0==ka.length&&0==da?aa.innerText=mxResources.get("noDiagrams"):C(ka,!1,U,0==da?null:la)}};O(W);var Ua=null;mxEvent.addListener(Fa,"keyup",m);mxEvent.addListener(Fa,"search",m);mxEvent.addListener(Fa,"input",m);mxEvent.addListener(na,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Math.min(U,Math.max(parseInt(fa.value),parseInt(ba.value))));ba.value=Math.max(1,Math.min(U,Math.min(parseInt(fa.value),parseInt(ba.value))))}function M(Ta){function Ka(ya,La,Ca,ua){var Ma=ya.useCssTransforms,Oa=ya.currentTranslate,Xa=ya.currentScale,Qa=ya.view.translate,Ra=ya.view.scale;ya.useCssTransforms&&(ya.useCssTransforms=!1,ya.currentTranslate=new mxPoint(0,0),ya.currentScale=1,ya.view.translate=new mxPoint(0,0),ya.view.scale=1);var Pa=ya.getGraphBounds(),Na=0,Ya=0,Wa=Da.get(),ab=1/ya.pageScale, $a=Ba.checked;if($a){ab=parseInt(sa.value);var gb=parseInt(ta.value);ab=Math.min(Wa.height*gb/(Pa.height/ya.view.scale),Wa.width*ab/(Pa.width/ya.view.scale))}else ab=parseInt(za.value)/(100*ya.pageScale),isNaN(ab)&&(Sa=1/ya.pageScale,za.value="100 %");Wa=mxRectangle.fromRectangle(Wa);Wa.width=Math.ceil(Wa.width*Sa);Wa.height=Math.ceil(Wa.height*Sa);ab*=Sa;!$a&&ya.pageVisible?(Pa=ya.getPageLayout(),Na-=Pa.x*Wa.width,Ya-=Pa.y*Wa.height):$a=!0;ua=null!=ua?"page/id,"+ua:null;if(null==La){La=PrintDialog.createPrintPreview(ya,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"checked"):(I=parseInt(m[5]),y.value=I,n.setAttribute("checked","checked"),t.style.visibility="visible"):k.setAttribute("checked","checked")):l=null}else l=null}catch(P){}c.style=e+(l?l:q());c.vertex=!0;E.addCell(c,null,null,null,null);E.selectAll();E.addListener(mxEvent.CELLS_MOVED,C);E.addListener(mxEvent.CELLS_RESIZED,C);var x=E.graphHandler.mouseUp,F=E.graphHandler.mouseDown;E.graphHandler.mouseUp=function(){x.apply(this,arguments);K.style.backgroundColor="#fff9"};E.graphHandler.mouseDown=function(){F.apply(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.showDialog(c.container,620,460,!0,!0,null,null,null,null,!0);c.init();document.execCommand("selectall",!1,null)};EditorUi.prototype.doSaveLocalFile=function(c,e,k,n,p,t){"text/xml"!=k||/(\.drawio)$/i.test(e)||/(\.xml)$/i.test(e)||/(\.svg)$/i.test(e)||/(\.html)$/i.test(e)||(e=e+"."+(null!=t?t:"drawio"));if(window.Blob&&navigator.msSaveOrOpenBlob)c=n?this.base64ToBlob(c,k):new Blob([c],{type:k}),navigator.msSaveOrOpenBlob(c,e);else if(mxClient.IS_IE)k=window.open("about:blank","_blank"),null== k?mxUtils.popup(c,!0):(k.document.write(c),k.document.close(),k.document.execCommand("SaveAs",!0,e),k.close());else if(mxClient.IS_IOS&&this.isOffline())navigator.standalone||null==k||"image/"!=k.substring(0,6)?this.showTextDialog(e+":",c):this.openInNewWindow(c,k,n);else{var y=document.createElement("a");t=(null==navigator.userAgent||0>navigator.userAgent.indexOf("PaleMoon/"))&&"undefined"!==typeof y.download;if(mxClient.IS_GC&&null!=navigator.userAgent){var A=navigator.userAgent.match(/Chrom(e|ium)\/([0-9]+)\./); t=65==(A?parseInt(A[2],10):!1)?!1:t}if(t||this.isOffline()){y.href=URL.createObjectURL(n?this.base64ToBlob(c,k):new Blob([c],{type:k}));t?y.download=e:y.setAttribute("target","_blank");document.body.appendChild(y);try{window.setTimeout(function(){URL.revokeObjectURL(y.href)},2E4),y.click(),y.parentNode.removeChild(y)}catch(G){}}else this.createEchoRequest(c,e,k,n,p).simulate(document,"_blank")}};EditorUi.prototype.createEchoRequest=function(c,e,k,n,p,t){c="xml="+encodeURIComponent(c);return new mxXmlRequest(SAVE_URL,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Da;var Ea=ba.gridSize*sa.gridSteps*U,Ta=ba.getGraphBounds(),Ka=sa.translate.x*ta,Sa=sa.translate.y*ta,Ia=Ka+(Ta.x-Ka)/ta-fa,Va=Sa+(Ta.y-Sa)/ta-fa,Ua=new Image;Ua.onload=function(){try{for(var ka=-Math.round(Ea-mxUtils.mod((Ka-Ia)*U,Ea)),da=-Math.round(Ea-mxUtils.mod((Sa-Va)*U,Ea));ka<xa;ka+=Ea)for(var la=da;la<Ga;la+=Ea)qa.drawImage(Ua,ka/U,la/U);Aa()}catch(ma){null!=P&&P(ma)}};Ua.onerror=function(ka){null!=P&&P(ka)};Ua.src=Da}else Aa()}catch(ka){null!=P&&P(ka)}});pa.onerror=function(Aa){null!=P&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.settingsKey=".sketch-config")};EditorUi.initTheme();EditorUi.prototype.showImageDialog=function(c,e,k,n,p,t,y){c=new ImageDialog(this,c,e,k,n,p,t,y);this.showDialog(c.container,Graph.fileSupport?480:360,Graph.fileSupport?200:90,!0,!0);c.init()};EditorUi.prototype.showLocalStorageDialog=function(c,e,k,n,p,t){var y=localStorage.getItem(e);c=new TextareaDialog(this,c,null!=y?JSON.stringify(JSON.parse(y),null,2):"",mxUtils.bind(this,function(A){if(null!=A)try{if(null!=t&&t(A),A==y)this.hideDialog(); else{if(0<A.length){var G=JSON.parse(A);localStorage.setItem(e,JSON.stringify(G))}else localStorage.removeItem(e);this.hideDialog();this.alert(mxResources.get("restartForChangeRequired"))}}catch(C){this.handleError(C)}}),null,mxResources.get("close"),null,null,null,!0,null,null,p,k,n);this.showDialog(c.container,620,460,!0,!1);c.init()};EditorUi.prototype.showBackgroundImageDialog=function(c,e,k,n){c=null!=c?c:mxUtils.bind(this,function(p,t,y,A){t||(p=new ChangePageSetup(this,n?y:null,p),p.ignoreColor=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0;za<this.customFonts.length;za++)if(this.customFonts[za].name==ca){ra=!1;break}ra&&(this.customFonts.push({name:ca,url:aa}),this.editorUi.fireEvent(new mxEventObject("customFontsChanged","customFonts",this.customFonts)))}finally{U.getModel().endUpdate()}}}));this.editorUi.showDialog(Z.container,380,Editor.enableWebFonts?250:180,!0,!0);Z.init()}),v,null,!0)})))}})();function DiagramPage(b,f){this.node=b;null!=f?this.node.setAttribute("id",f):null==this.getId()&&this.node.setAttribute("id",Editor.guid())}DiagramPage.prototype.node=null;DiagramPage.prototype.root=null;DiagramPage.prototype.viewState=null;DiagramPage.prototype.getId=function(){return this.node.getAttribute("id")};DiagramPage.prototype.getName=function(){return this.node.getAttribute("name")};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f.w,f.h,f,f.aspect,f.title);mxEvent.addListener(c,"dragleave",function(V){e.style.cursor="";for(var S=mxEvent.getSource(V);null!=S;){if(S==c||S==e){V.stopPropagation();V.preventDefault();break}S=S.parentNode}});var G=function(V){return function(S,N,O,Q,J,m,v,B,H){null!=H&&(/(\.v(dx|sdx?))($|\?)/i.test(H.name)||/(\.vs(x|sx?))($|\?)/i.test(H.name))?b.importVisio(H,mxUtils.bind(this,function(g){D(g,N,O,Q,J,m,v,"fixed",mxEvent.isAltDown(V)?null:v.substring(0,v.lastIndexOf(".")).replace(/_/g," "))})): null!=H&&(new XMLHttpRequest).upload&&b.isRemoteFileFormat(S,H.name)?b.isExternalDataComms()?b.parseFile(H,mxUtils.bind(this,function(g){4==g.readyState&&(b.spinner.stop(),200<=g.status&&299>=g.status&&(D(g.responseText,N,O,Q,J,m,v,"fixed",mxEvent.isAltDown(V)?null:v.substring(0,v.lastIndexOf(".")).replace(/_/g," ")),c.scrollTop=c.scrollHeight))})):(b.spinner.stop(),b.showError(mxResources.get("error"),mxResources.get("notInOffline"))):(D(S,N,O,Q,J,m,v,"fixed",mxEvent.isAltDown(V)?null:v.substring(0, v.lastIndexOf(".")).replace(/_/g," ")),c.scrollTop=c.scrollHeight)}};mxEvent.addListener(c,"dragover",L);mxEvent.addListener(c,"drop",K);mxEvent.addListener(e,"dragover",L);mxEvent.addListener(e,"drop",K);l.appendChild(c);d=document.createElement("div");d.style.textAlign="right";d.style.marginTop="20px";R=mxUtils.button(mxResources.get("cancel"),function(){b.hideDialog(!0)});R.setAttribute("id","btnCancel");R.className="geBtn";b.editor.cancelFirst&&d.appendChild(R);"draw.io"!=b.getServiceName()||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(O){E=O};this.setAutoScroll=function(O){R=O};this.setOpenFill=function(O){I=O};this.setStopClickEnabled=function(O){k=O};this.setSelectInserted=function(O){n=O};this.setSmoothing=function(O){l=O};this.setPerfectFreehandMode=function(O){t=O};this.isPerfectFreehandMode=function(){return t};this.setBrushSize=function(O){p.size=O};this.getBrushSize=function(){return p.size};var y=function(O){e=O;b.getRubberband().setEnabled(!O);b.graphHandler.setSelectEnabled(!O);b.graphHandler.setMoveEnabled(!O);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
B,this.thumbImageCache)):B(g)});N?this.embedFonts(m,H):(this.editor.addFontCss(m),H(m))}catch(g){this.handleError(g)}};EditorUi.prototype.addRadiobox=function(c,e,k,n,p,t,y){return this.addCheckbox(c,k,n,p,t,y,!0,e)};EditorUi.prototype.addCheckbox=function(c,e,k,n,p,t,y,A){t=null!=t?t:!0;var G=document.createElement("input");G.style.marginRight="8px";G.style.marginTop="16px";G.setAttribute("type",y?"radio":"checkbox");y="geCheckbox-"+Editor.guid();G.id=y;null!=A&&G.setAttribute("name",A);k&&(G.setAttribute("checked",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
c)+"px",C.style.top=Math.max(0,e+70)+"px",mxUtils.setPrefixedStyle(C.style,"borderRadius","6px"),mxUtils.setPrefixedStyle(C.style,"transform","translate(-50%,-50%)"),Editor.isDarkMode()||mxUtils.setPrefixedStyle(C.style,"boxShadow","2px 2px 3px 0px #ddd"),"..."!=G.substring(G.length-3,G.length)&&"!"!=G.charAt(G.length-1)&&(G+="..."),C.innerHTML=G,A.appendChild(C),p.status=C),this.pause=mxUtils.bind(this,function(){var V=function(){};this.active&&(V=mxUtils.bind(this,function(){this.spin(A,G)}));this.stop();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){c(G.checked,C.checked,V.checked,S.checked,N.getLink(),J.checked)}),null,mxResources.get("embed"),p);this.showDialog(e.container,280,300,!0,!0)};EditorUi.prototype.createEmbedImage=function(c,e,k,n,p,t,y,A){function G(O){var Q=" ",J="";n&&(Q=" onclick=\"(function(img){if(img.wnd!=null&&!img.wnd.closed){img.wnd.focus();}else{var r=function(evt){if(evt.data=='ready'&&evt.source==img.wnd){img.wnd.postMessage(decodeURIComponent(img.getAttribute('src')),'*');window.removeEventListener('message',r);}};window.addEventListener('message',r);img.wnd=window.open('"+ EditorUi.lightboxHost+"/?client=1"+(null!=V?"&page="+V:"")+(p?"&edit=_blank":"")+(t?"&layers=1":"")+"');}})(this);\"",J+="cursor:pointer;");c&&(J+="max-width:100%;");var m="";k&&(m=' width="'+Math.round(C.width)+'" height="'+Math.round(C.height)+'"');y('<img src="'+O+'"'+m+(""!=J?' style="'+J+'"':"")+Q+"/>")}var C=this.editor.graph.getGraphBounds(),V=this.getSelectedPageIndex();if(this.isExportToCanvas())this.editor.exportToCanvas(mxUtils.bind(this,function(O){var Q=n?this.getFileData(!0):null;O=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DiagramFormatPanel.prototype.addOptions=function(g){g=R.apply(this,arguments);var x=this.editorUi,F=x.editor.graph;if(F.isEnabled()){var M=x.getCurrentFile();null!=M&&M.isAutosaveOptional()&&g.appendChild(this.createOption(mxResources.get("autosave"),function(){return x.editor.autosave},function(W){x.editor.setAutosave(W);x.editor.autosave&&M.isModified()&&M.fileChanged()},{install:function(W){this.listener=function(){W(x.editor.autosave)};x.editor.addListener("autosaveChanged",this.listener)},destroy:function(){x.editor.removeListener(this.listener)}}))}if(this.isMathOptionVisible()&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u.x,u.y),b.editor.graph.fireEvent(new mxEventObject("cellsInserted","cells",N))}finally{b.editor.graph.getModel().endUpdate()}b.editor.graph.setSelectionCells(N);b.editor.graph.scrollCellToVisible(b.editor.graph.getSelectionCell());t.destroy();n.parentNode.removeChild(n)}}}function q(){return"list"==D.value?"Person\n-name: String\n-birthDate: Date\n--\n+getName(): String\n+setName(String): void\n+isBirthday(): boolean\n\nAddress\n-street: String\n-city: String\n-state: String":"mermaid"==D.value|| "mermaid2drawio"==D.value?"graph TD;\n A--\x3eB;\n A--\x3eC;\n B--\x3eD;\n C--\x3eD;":"table"==D.value?"CREATE TABLE Suppliers\n(\nsupplier_id int NOT NULL PRIMARY KEY,\nsupplier_name char(50) NOT NULL,\ncontact_name char(50),\n);\nCREATE TABLE Customers\n(\ncustomer_id int NOT NULL PRIMARY KEY,\ncustomer_name char(50) NOT NULL,\naddress char(50),\ncity char(50),\nstate char(25),\nzip_code char(10)\n);\n":"plantUmlPng"==D.value?"@startuml\nskinparam backgroundcolor transparent\nskinparam shadowing false\nAlice -> Bob: Authentication Request\nBob --\x3e Alice: Authentication Response\n\nAlice -> Bob: Another authentication Request\nAlice <-- Bob: Another authentication Response\n@enduml": "plantUmlSvg"==D.value||"plantUmlTxt"==D.value?"@startuml\nskinparam shadowing false\nAlice -> Bob: Authentication Request\nBob --\x3e Alice: Authentication Response\n\nAlice -> Bob: Another authentication Request\nAlice <-- Bob: Another authentication Response\n@enduml":";Example:\na->b\nb->edge label->c\nc->a\n"}var u=b.editor.graph.getFreeInsertPoint();f=document.createElement("div");f.style.textAlign="right";var z=document.createElement("textarea");z.style.boxSizing="border-box";z.style.resize=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Format.prototype.init;Format.prototype.init=function(){K.apply(this,arguments);this.editorUi.editor.addListener("fileLoaded",this.update)};var E=Format.prototype.refresh;Format.prototype.refresh=function(){null!=this.editorUi.getCurrentFile()||"1"==urlParams.embed||this.editorUi.editor.chromeless?E.apply(this,arguments):this.clear()};DiagramFormatPanel.prototype.isMathOptionVisible=function(g){return"simple"==Editor.currentTheme||"sketch"==Editor.currentTheme||"min"==Editor.currentTheme};var R=DiagramFormatPanel.prototype.addOptions;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
6),g.setAttribute("height",parseInt(g.getAttribute("height"))+6),x=g.getAttribute("viewBox"),null!=x&&0<x.length&&(x=x.split(" "),3<x.length&&(w=parseFloat(x[2])+6,h=parseFloat(x[3])+6,g.setAttribute("viewBox",x[0]+" "+x[1]+" "+w+" "+h))))));return T};Graph.prototype.setShadowVisible=function(g,x){mxClient.IS_SVG&&!mxClient.IS_SF&&(x=null!=x?x:!0,(this.shadowVisible=g)?this.view.getDrawPane().setAttribute("filter","url(#"+this.shadowId+")"):this.view.getDrawPane().removeAttribute("filter"),x&&this.fireEvent(new mxEventObject("shadowVisibleChanged")))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e.getCurrentCellStyle(J).treeMoving);return m}function u(J){var m=!1;null!=J&&(J=k.getParent(J),m=e.view.getState(J),m="tree"==(null!=m?m.style:e.getCellStyle(J)).containerType);return m}function z(J){var m=!1;null!=J&&(J=k.getParent(J),m=e.view.getState(J),e.view.getState(J),m=null!=(null!=m?m.style:e.getCellStyle(J)).childLayout);return m}function D(J){J=e.view.getState(J);if(null!=J){var m=e.getIncomingTreeEdges(J.cell);if(0<m.length&&(m=e.view.getState(m[0]),null!=m&&(m=m.absolutePoints,null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(O){E=O};this.setAutoScroll=function(O){R=O};this.setOpenFill=function(O){I=O};this.setStopClickEnabled=function(O){k=O};this.setSelectInserted=function(O){n=O};this.setSmoothing=function(O){l=O};this.setPerfectFreehandMode=function(O){t=O};this.isPerfectFreehandMode=function(){return t};this.setBrushSize=function(O){p.size=O};this.getBrushSize=function(){return p.size};var y=function(O){e=O;b.getRubberband().setEnabled(!O);b.graphHandler.setSelectEnabled(!O);b.graphHandler.setMoveEnabled(!O);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
x;null!=g&&g()})):null!=g&&g()};Editor.prototype.createGoogleFontCache=function(){var g={},x;for(x in Graph.fontMapping)Graph.isCssFontUrl(x)&&(g[x]=Graph.fontMapping[x]);return g};Editor.prototype.embedExtFonts=function(g){var x=this.graph.getCustomFonts();if(0<x.length){var F=[],M=0;null==this.cachedGoogleFonts&&(this.cachedGoogleFonts=this.createGoogleFontCache());for(var P=mxUtils.bind(this,function(){0==M&&this.embedCssFonts(F.join(""),g)}),T=0;T<x.length;T++)mxUtils.bind(this,function(W,U){Graph.isCssFontUrl(U)? null==this.cachedGoogleFonts[U]?(M++,this.loadUrl(U,mxUtils.bind(this,function(X){this.cachedGoogleFonts[U]=X;F.push(X+"\n");M--;P()}),mxUtils.bind(this,function(X){M--;F.push("@import url("+U+");\n");P()}))):F.push(this.cachedGoogleFonts[U]+"\n"):F.push('@font-face {font-family: "'+W+'";src: url("'+U+'")}\n')})(x[T].name,x[T].url);P()}else g()};Editor.prototype.addMathCss=function(g){g=g.getElementsByTagName("defs");if(null!=g&&0<g.length)for(var x=document.getElementsByTagName("style"),F=0;F<x.length;F++){var M=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.defaultFilename;K=new LocalFile(this,K,E,!0);null!=window.location.hash&&"#P"==window.location.hash.substring(0,2)&&(K.getHash=function(){return window.location.hash.substring(1)});this.fileLoaded(K);this.getCurrentFile().setModified(!this.editor.chromeless)}),D=window.opener||window.parent;if(D!=window){var L=urlParams.create;null!=L?z(D[decodeURIComponent(L)]):(L=urlParams.data,null!=L?z(decodeURIComponent(L)):this.installMessageHandler(mxUtils.bind(this,function(K,E){E.source==D&&z(K)})))}}else if(null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(zn){this.unput(this.match.slice(zn))},pastInput:function(){var zn=this.matched.substr(0,this.matched.length-this.match.length);return(zn.length>20?"...":"")+zn.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var zn=this.match;return zn.length<20&&(zn+=this._input.substr(0,20-zn.length)),(zn.substr(0,20)+(zn.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var zn=this.pastInput(),Zn=new Array(zn.length+1).join("-");return zn+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+i,p.parser);const m=Oe().securityLevel;let b;m==="sandbox"&&(b=Mr("#i"+a));const C=Mr(m==="sandbox"?b.nodes()[0].contentDocument.body:"body").select("#"+a);C.append("g");const D=p.db.getMindmap(),N=C.append("g");N.attr("class","mindmap-edges");const B=C.append("g");B.attr("class","mindmap-nodes"),vjt(B,D,-1,v);const j=await pUe(D,v);gUe(N,j),bUe(j),J9(void 0,C,v.mindmap.padding,v.mindmap.useMaxWidth),Editor.mermaidToDrawio(j,"Mindmap")}},wUe=i=>{let a="";for(let f=0;f<i.THEME_COLOR_LIMIT;f++)i["lineColor"+f]=i["lineColor"+f]||i["cScaleInv"+f],Q9(i["lineColor"+f])?i["lineColor"+f]=Ds(i["lineColor"+f],20):i["lineColor"+f]=ta(i["lineColor"+f],20);for(let f=0;f<i.THEME_COLOR_LIMIT;f++){const p=""+(17-3*f);a+=` .section-${f-1} rect, .section-${f-1} path, .section-${f-1} circle, .section-${f-1} polygon, .section-${f-1} path { fill: ${i["cScale"+f]}; } .section-${f-1} text { fill: ${i["cScaleLabel"+f]}; } .node-icon-${f-1} { font-size: 40px; color: ${i["cScaleLabel"+f]}; } .section-edge-${f-1}{ stroke: ${i["cScale"+f]}; } .edge-depth-${f-1}{ stroke-width: ${p}; } .section-${f-1} line { stroke: ${i["cScaleInv"+f]} ; stroke-width: 3; } .disabled, .disabled circle, .disabled text { fill: lightgray; } .disabled text { fill: #efefef; } `}return a},mUe=Object.freeze(Object.defineProperty({__proto__:null,diagram:{db:tUe,renderer:vUe,parser:VGe,styles:i=>`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`},s_e=(i,a)=>{hW[i]=a},a_e=i_e;let $1t="",fW="",z1t="";const q1t=i=>sg(i,Oe()),cg=function(){$1t="",z1t="",fW=""},ug=function(i){$1t=q1t(i).replace(/^\s+/g,"")},cp=function(){return $1t||fW},up=function(i){z1t=q1t(i).replace(/\n\s+/g,`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`)),O("labelWrapKey",z)}else if($==="ellipsis"){var Ne=y.pstyle("text-max-width").pfValue,ve="",fn="…",$e=!1;if(this.calculateLabelDimensions(y,A).width<Ne)return A;for(var qe=0;qe<A.length;qe++){var xn=this.calculateLabelDimensions(y,ve+A[qe]+fn).width;if(xn>Ne)break;ve+=A[qe],qe===A.length-1&&($e=!0)}return $e||(ve+=fn),ve}return A},kp.getLabelJustification=function(y){var g=y.pstyle("text-justification").strValue,x=y.pstyle("text-halign").strValue;if(g==="auto")if(y.isNode())switch(x){case"left":return"right";case"right":return"left";default:return"center"}else return"center";else return g},kp.calculateLabelDimensions=function(y,g){var x=this,T=ad(g,y._private.labelDimsKey),A=x.labelDimCache||(x.labelDimCache=[]),I=A[T];if(I!=null)return I;var O=0,$=y.pstyle("font-style").strValue,z=y.pstyle("font-size").pfValue,S=y.pstyle("font-family").strValue,V=y.pstyle("font-weight").strValue,U=this.labelCalcCanvas,tt=this.labelCalcCanvasContext;if(!U){U=this.labelCalcCanvas=document.createElement("canvas"),tt=this.labelCalcCanvasContext=U.getContext("2d");var at=U.style;at.position="absolute",at.left="-9999px",at.top="-9999px",at.zIndex="-1",at.visibility="hidden",at.pointerEvents="none"}tt.font="".concat($," ").concat(V," ").concat(z,"px ").concat(S);for(var ut=0,dt=0,At=g.split(`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
H0 V0 Z`)},sUe=function(i,a){i.append("circle").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("r",a.width/2)};function aUe(i,a,f,p,v){return i.insert("polygon",":first-child").attr("points",p.map(function(m){return m.x+","+m.y}).join(" ")).attr("transform","translate("+(v.width-a)/2+", "+f+")")}const oUe=function(i,a){const f=a.height,v=f/4,m=a.width-a.padding+2*v,b=[{x:v,y:0},{x:m-v,y:0},{x:m,y:-f/2},{x:m-v,y:-f},{x:v,y:-f},{x:0,y:-f/2}];aUe(i,m,f,b,a)},cUe=function(i,a){i.append("rect").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("height",a.height).attr("rx",a.padding).attr("ry",a.padding).attr("width",a.width)},hjt={drawNode:function(i,a,f,p){const v=p.htmlLabels,m=f%(ljt-1),b=i.append("g");a.section=m;let E="section-"+m;m<0&&(E+=" section-root"),b.attr("class",(a.class?a.class+" ":"")+"mindmap-node "+E);const C=b.append("g"),D=b.append("g"),N=a.descr.replace(/(<br\/*>)/g,`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(Te){this.unput(this.match.slice(Te))},pastInput:function(){var Te=this.matched.substr(0,this.matched.length-this.match.length);return(Te.length>20?"...":"")+Te.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var Te=this.match;return Te.length<20&&(Te+=this._input.substr(0,20-Te.length)),(Te.substr(0,20)+(Te.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var Te=this.pastInput(),ne=new Array(Te.length+1).join("-");return Te+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
${i.faceColor?`fill: ${i.faceColor}`:"fill: #FFF8DC"};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(kt){this.unput(this.match.slice(kt))},pastInput:function(){var kt=this.matched.substr(0,this.matched.length-this.match.length);return(kt.length>20?"...":"")+kt.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var kt=this.match;return kt.length<20&&(kt+=this._input.substr(0,20-kt.length)),(kt.substr(0,20)+(kt.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var kt=this.pastInput(),yt=new Array(kt.length+1).join("-");return kt+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(ne){this.unput(this.match.slice(ne))},pastInput:function(){var ne=this.matched.substr(0,this.matched.length-this.match.length);return(ne.length>20?"...":"")+ne.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var ne=this.match;return ne.length<20&&(ne+=this._input.substr(0,20-ne.length)),(ne.substr(0,20)+(ne.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var ne=this.pastInput(),Ee=new Array(ne.length+1).join("-");return ne+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(ft){this.unput(this.match.slice(ft))},pastInput:function(){var ft=this.matched.substr(0,this.matched.length-this.match.length);return(ft.length>20?"...":"")+ft.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var ft=this.match;return ft.length<20&&(ft+=this._input.substr(0,20-ft.length)),(ft.substr(0,20)+(ft.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var ft=this.pastInput(),mt=new Array(ft.length+1).join("-");return ft+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(un){this.unput(this.match.slice(un))},pastInput:function(){var un=this.matched.substr(0,this.matched.length-this.match.length);return(un.length>20?"...":"")+un.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var un=this.match;return un.length<20&&(un+=this._input.substr(0,20-un.length)),(un.substr(0,20)+(un.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var un=this.pastInput(),jt=new Array(un.length+1).join("-");return un+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(zn){this.unput(this.match.slice(zn))},pastInput:function(){var zn=this.matched.substr(0,this.matched.length-this.match.length);return(zn.length>20?"...":"")+zn.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var zn=this.match;return zn.length<20&&(zn+=this._input.substr(0,20-zn.length)),(zn.substr(0,20)+(zn.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var zn=this.pastInput(),Zn=new Array(zn.length+1).join("-");return zn+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(it){this.unput(this.match.slice(it))},pastInput:function(){var it=this.matched.substr(0,this.matched.length-this.match.length);return(it.length>20?"...":"")+it.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var it=this.match;return it.length<20&&(it+=this._input.substr(0,20-it.length)),(it.substr(0,20)+(it.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var it=this.pastInput(),et=new Array(it.length+1).join("-");return it+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
H0 V0 Z`)},sUe=function(i,a){i.append("circle").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("r",a.width/2)};function aUe(i,a,f,p,v){return i.insert("polygon",":first-child").attr("points",p.map(function(m){return m.x+","+m.y}).join(" ")).attr("transform","translate("+(v.width-a)/2+", "+f+")")}const oUe=function(i,a){const f=a.height,v=f/4,m=a.width-a.padding+2*v,b=[{x:v,y:0},{x:m-v,y:0},{x:m,y:-f/2},{x:m-v,y:-f},{x:v,y:-f},{x:0,y:-f/2}];aUe(i,m,f,b,a)},cUe=function(i,a){i.append("rect").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("height",a.height).attr("rx",a.padding).attr("ry",a.padding).attr("width",a.width)},hjt={drawNode:function(i,a,f,p){const v=p.htmlLabels,m=f%(ljt-1),b=i.append("g");a.section=m;let E="section-"+m;m<0&&(E+=" section-root"),b.attr("class",(a.class?a.class+" ":"")+"mindmap-node "+E);const C=b.append("g"),D=b.append("g"),N=a.descr.replace(/(<br\/*>)/g,`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
H0 V0 Z`)},sUe=function(i,a){i.append("circle").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("r",a.width/2)};function aUe(i,a,f,p,v){return i.insert("polygon",":first-child").attr("points",p.map(function(m){return m.x+","+m.y}).join(" ")).attr("transform","translate("+(v.width-a)/2+", "+f+")")}const oUe=function(i,a){const f=a.height,v=f/4,m=a.width-a.padding+2*v,b=[{x:v,y:0},{x:m-v,y:0},{x:m,y:-f/2},{x:m-v,y:-f},{x:v,y:-f},{x:0,y:-f/2}];aUe(i,m,f,b,a)},cUe=function(i,a){i.append("rect").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("height",a.height).attr("rx",a.padding).attr("ry",a.padding).attr("width",a.width)},hjt={drawNode:function(i,a,f,p){const v=p.htmlLabels,m=f%(ljt-1),b=i.append("g");a.section=m;let E="section-"+m;m<0&&(E+=" section-root"),b.attr("class",(a.class?a.class+" ":"")+"mindmap-node "+E);const C=b.append("g"),D=b.append("g"),N=a.descr.replace(/(<br\/*>)/g,`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
H0 V0 Z`)},iUe=function(i,a){const f=a.width,p=a.height,v=.15*f;i.append("path").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("d",`M0 0 a${v},${v} 1 0,0 ${f*.25},${-1*p*.1} a${v},${v} 1 0,0 ${f*.25},0 a${v},${v} 1 0,0 ${f*.25},0 a${v},${v} 1 0,0 ${f*.25},${1*p*.1} a${v},${v} 1 0,0 ${f*.15},${1*p*.33} a${v*.8},${v*.8} 1 0,0 0,${1*p*.34} a${v},${v} 1 0,0 ${-1*f*.15},${1*p*.33} a${v},${v} 1 0,0 ${-1*f*.25},${p*.15} a${v},${v} 1 0,0 ${-1*f*.25},0 a${v},${v} 1 0,0 ${-1*f*.25},0 a${v},${v} 1 0,0 ${-1*f*.25},${-1*p*.15} a${v},${v} 1 0,0 ${-1*f*.1},${-1*p*.33} a${v*.8},${v*.8} 1 0,0 0,${-1*p*.34} a${v},${v} 1 0,0 ${f*.1},${-1*p*.33} H0 V0 Z`)},sUe=function(i,a){i.append("circle").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("r",a.width/2)};function aUe(i,a,f,p,v){return i.insert("polygon",":first-child").attr("points",p.map(function(m){return m.x+","+m.y}).join(" ")).attr("transform","translate("+(v.width-a)/2+", "+f+")")}const oUe=function(i,a){const f=a.height,v=f/4,m=a.width-a.padding+2*v,b=[{x:v,y:0},{x:m-v,y:0},{x:m,y:-f/2},{x:m-v,y:-f},{x:v,y:-f},{x:0,y:-f/2}];aUe(i,m,f,b,a)},cUe=function(i,a){i.append("rect").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("height",a.height).attr("rx",a.padding).attr("ry",a.padding).attr("width",a.width)},hjt={drawNode:function(i,a,f,p){const v=p.htmlLabels,m=f%(ljt-1),b=i.append("g");a.section=m;let E="section-"+m;m<0&&(E+=" section-root"),b.attr("class",(a.class?a.class+" ":"")+"mindmap-node "+E);const C=b.append("g"),D=b.append("g"),N=a.descr.replace(/(<br\/*>)/g,`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
H0 V0 Z`)},sUe=function(i,a){i.append("circle").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("r",a.width/2)};function aUe(i,a,f,p,v){return i.insert("polygon",":first-child").attr("points",p.map(function(m){return m.x+","+m.y}).join(" ")).attr("transform","translate("+(v.width-a)/2+", "+f+")")}const oUe=function(i,a){const f=a.height,v=f/4,m=a.width-a.padding+2*v,b=[{x:v,y:0},{x:m-v,y:0},{x:m,y:-f/2},{x:m-v,y:-f},{x:v,y:-f},{x:0,y:-f/2}];aUe(i,m,f,b,a)},cUe=function(i,a){i.append("rect").attr("id","node-"+a.id).attr("class","node-bkg node-"+EE(a.type)).attr("height",a.height).attr("rx",a.padding).attr("ry",a.padding).attr("width",a.width)},hjt={drawNode:function(i,a,f,p){const v=p.htmlLabels,m=f%(ljt-1),b=i.append("g");a.section=m;let E="section-"+m;m<0&&(E+=" section-root"),b.attr("class",(a.class?a.class+" ":"")+"mindmap-node "+E);const C=b.append("g"),D=b.append("g"),N=a.descr.replace(/(<br\/*>)/g,`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(rt){this.unput(this.match.slice(rt))},pastInput:function(){var rt=this.matched.substr(0,this.matched.length-this.match.length);return(rt.length>20?"...":"")+rt.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var rt=this.match;return rt.length<20&&(rt+=this._input.substr(0,20-rt.length)),(rt.substr(0,20)+(rt.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var rt=this.pastInput(),wt=new Array(rt.length+1).join("-");return rt+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`;let w3=Oe(),D5;const TN=450,Ize=Object.freeze(Object.defineProperty({__proto__:null,diagram:{parser:Lze,db:Mze,renderer:{draw:(i,a,f,p)=>{var pt;try{w3=Oe(),zt.debug(`Rendering info diagram
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable