code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(ye){this.unput(this.match.slice(ye))},pastInput:function(){var ye=this.matched.substr(0,this.matched.length-this.match.length);return(ye.length>20?"...":"")+ye.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var ye=this.match;return ye.length<20&&(ye+=this._input.substr(0,20-ye.length)),(ye.substr(0,20)+(ye.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var ye=this.pastInput(),Vt=new Array(ye.length+1).join("-");return ye+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`},s_e=(i,a)=>{hW[i]=a},a_e=i_e;let $1t="",fW="",z1t="";const q1t=i=>sg(i,Oe()),cg=function(){$1t="",z1t="",fW=""},ug=function(i){$1t=q1t(i).replace(/^\s+/g,"")},cp=function(){return $1t||fW},up=function(i){z1t=q1t(i).replace(/\n\s+/g,`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+Zn+"^"},test_match:function(zn,Zn){var Nr,On,xi;if(this.options.backtrack_lexer&&(xi={yylineno:this.yylineno,yylloc:{first_line:this.yylloc.first_line,last_line:this.last_line,first_column:this.yylloc.first_column,last_column:this.yylloc.last_column},yytext:this.yytext,match:this.match,matches:this.matches,matched:this.matched,yyleng:this.yyleng,offset:this.offset,_more:this._more,_input:this._input,yy:this.yy,conditionStack:this.conditionStack.slice(0),done:this.done},this.options.ranges&&(xi.yylloc.range=this.yylloc.range.slice(0))),On=zn[0].match(/(?:\r\n?|\n).*/g),On&&(this.yylineno+=On.length),this.yylloc={first_line:this.yylloc.last_line,last_line:this.yylineno+1,first_column:this.yylloc.last_column,last_column:On?On[On.length-1].length-On[On.length-1].match(/\r?\n?/)[0].length:this.yylloc.last_column+zn[0].length},this.yytext+=zn[0],this.match+=zn[0],this.matches=zn,this.yyleng=this.yytext.length,this.options.ranges&&(this.yylloc.range=[this.offset,this.offset+=this.yyleng]),this._more=!1,this._backtrack=!1,this._input=this._input.slice(zn[0].length),this.matched+=zn[0],Nr=this.performAction.call(this,this.yy,this,Zn,this.conditionStack[this.conditionStack.length-1]),this.done&&this._input&&(this.done=!1),Nr)return Nr;if(this._backtrack){for(var In in xi)this[In]=xi[In];return!1}return!1},next:function(){if(this.done)return this.EOF;this._input||(this.done=!0);var zn,Zn,Nr,On;this._more||(this.yytext="",this.match="");for(var xi=this._currentRules(),In=0;In<xi.length;In++)if(Nr=this._input.match(this.rules[xi[In]]),Nr&&(!Zn||Nr[0].length>Zn[0].length)){if(Zn=Nr,On=In,this.options.backtrack_lexer){if(zn=this.test_match(Nr,xi[In]),zn!==!1)return zn;if(this._backtrack){Zn=!1;continue}else return!1}else if(!this.options.flex)break}return Zn?(zn=this.test_match(Zn,xi[On]),zn!==!1?zn:!1):this._input===""?this.EOF:this.parseError("Lexical error on line "+(this.yylineno+1)+`. Unrecognized text.
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(_t){this.unput(this.match.slice(_t))},pastInput:function(){var _t=this.matched.substr(0,this.matched.length-this.match.length);return(_t.length>20?"...":"")+_t.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var _t=this.match;return _t.length<20&&(_t+=this._input.substr(0,20-_t.length)),(_t.substr(0,20)+(_t.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var _t=this.pastInput(),X=new Array(_t.length+1).join("-");return _t+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`},s_e=(i,a)=>{hW[i]=a},a_e=i_e;let $1t="",fW="",z1t="";const q1t=i=>sg(i,Oe()),cg=function(){$1t="",z1t="",fW=""},ug=function(i){$1t=q1t(i).replace(/^\s+/g,"")},cp=function(){return $1t||fW},up=function(i){z1t=q1t(i).replace(/\n\s+/g,`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(zn){this.unput(this.match.slice(zn))},pastInput:function(){var zn=this.matched.substr(0,this.matched.length-this.match.length);return(zn.length>20?"...":"")+zn.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var zn=this.match;return zn.length<20&&(zn+=this._input.substr(0,20-zn.length)),(zn.substr(0,20)+(zn.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var zn=this.pastInput(),Zn=new Array(zn.length+1).join("-");return zn+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`},s_e=(i,a)=>{hW[i]=a},a_e=i_e;let $1t="",fW="",z1t="";const q1t=i=>sg(i,Oe()),cg=function(){$1t="",z1t="",fW=""},ug=function(i){$1t=q1t(i).replace(/^\s+/g,"")},cp=function(){return $1t||fW},up=function(i){z1t=q1t(i).replace(/\n\s+/g,`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`,z0t={CONTAINS:"contains",ARROW:"arrow"},MBt={ReqMarkers:z0t,insertLineEndings:(i,a)=>{let f=i.append("defs").append("marker").attr("id",z0t.CONTAINS+"_line_ending").attr("refX",0).attr("refY",a.line_height/2).attr("markerWidth",a.line_height).attr("markerHeight",a.line_height).attr("orient","auto").append("g");f.append("circle").attr("cx",a.line_height/2).attr("cy",a.line_height/2).attr("r",a.line_height/2).attr("fill","none"),f.append("line").attr("x1",0).attr("x2",a.line_height).attr("y1",a.line_height/2).attr("y2",a.line_height/2).attr("stroke-width",1),f.append("line").attr("y1",0).attr("y2",a.line_height).attr("x1",a.line_height/2).attr("x2",a.line_height/2).attr("stroke-width",1),i.append("defs").append("marker").attr("id",z0t.ARROW+"_line_ending").attr("refX",a.line_height).attr("refY",.5*a.line_height).attr("markerWidth",a.line_height).attr("markerHeight",a.line_height).attr("orient","auto").append("path").attr("d",`M0,0
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(cs){this.unput(this.match.slice(cs))},pastInput:function(){var cs=this.matched.substr(0,this.matched.length-this.match.length);return(cs.length>20?"...":"")+cs.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var cs=this.match;return cs.length<20&&(cs+=this._input.substr(0,20-cs.length)),(cs.substr(0,20)+(cs.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var cs=this.pastInput(),zs=new Array(cs.length+1).join("-");return cs+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(et){this.unput(this.match.slice(et))},pastInput:function(){var et=this.matched.substr(0,this.matched.length-this.match.length);return(et.length>20?"...":"")+et.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var et=this.match;return et.length<20&&(et+=this._input.substr(0,20-et.length)),(et.substr(0,20)+(et.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var et=this.pastInput(),st=new Array(et.length+1).join("-");return et+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
`+this.showPosition(),{text:"",token:null,line:this.yylineno});return this},less:function(It){this.unput(this.match.slice(It))},pastInput:function(){var It=this.matched.substr(0,this.matched.length-this.match.length);return(It.length>20?"...":"")+It.substr(-20).replace(/\n/g,"")},upcomingInput:function(){var It=this.match;return It.length<20&&(It+=this._input.substr(0,20-It.length)),(It.substr(0,20)+(It.length>20?"...":"")).replace(/\n/g,"")},showPosition:function(){var It=this.pastInput(),Pt=new Array(It.length+1).join("-");return It+this.upcomingInput()+`
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.setScrollbars=function(b){var e=this.editor.graph,g=e.container.style.overflow;e.scrollbars=b;this.editor.updateGraphComponents();g!=e.container.style.overflow&&(e.container.scrollTop=0,e.container.scrollLeft=0,e.view.scaleAndTranslate(1,0,0),this.resetScrollbars());this.fireEvent(new mxEventObject("scrollbarsChanged"))};EditorUi.prototype.hasScrollbars=function(){return this.editor.graph.scrollbars};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
R.height=p.copiedSize.height,q.getModel().setGeometry(G[M],R))}}finally{q.getModel().endUpdate()}}},null,null,"Alt+Shift+V");this.addAction("copyData",function(){var G=q.getSelectionCell()||q.getModel().getRoot();q.isEnabled()&&null!=G&&(G=G.cloneValue(),null==G||isNaN(G.nodeType)||(p.copiedValue=G))},null,null,"Alt+Shift+B");this.addAction("pasteData",function(G,M){function R(f,k){var u=W.getValue(f);k=f.cloneValue(k);k.removeAttribute("placeholders");null==u||isNaN(u.nodeType)||k.setAttribute("placeholders", u.getAttribute("placeholders"));null!=G&&mxEvent.isShiftDown(G)||k.setAttribute("label",q.convertValueToString(f));W.setValue(f,k)}G=null!=M?M:G;var W=q.getModel();if(q.isEnabled()&&!q.isSelectionEmpty()&&null!=p.copiedValue){W.beginUpdate();try{var d=q.getEditableCells(q.getSelectionCells());if(0==d.length)R(W.getRoot(),p.copiedValue);else for(M=0;M<d.length;M++)R(d[M],p.copiedValue)}finally{W.endUpdate()}}},null,null,"Alt+Shift+E");this.addAction("delete",function(G,M){G=null!=M?M:G;null!=G&&mxEvent.isShiftDown(G)?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function X(){mxShape.call(this)}function U(){mxShape.call(this)}function Z(){mxRectangleShape.call(this)}function ba(){mxShape.call(this)}function ia(){mxShape.call(this)}function qa(){mxShape.call(this)}function ra(){mxShape.call(this)}function pa(){mxShape.call(this)}function xa(){mxCylinder.call(this)}function Ca(){mxCylinder.call(this)}function Aa(){mxRectangleShape.call(this)}function za(){mxDoubleEllipse.call(this)}function Ma(){mxDoubleEllipse.call(this)}function Qa(){mxArrowConnector.call(this);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
window.openWindow((mxClient.IS_CHROMEAPP?EditorUi.drawHost+"/":"https://"+location.host+"/")+window.location.search+"#U"+encodeURIComponent(z)))))}else this.openLocalFile(z,null,!0)}u.stopPropagation();u.preventDefault()}))};EditorUi.prototype.highlightElement=function(d){var f=0,k=0;if(null==d){var u=document.body;var z=document.documentElement;var C=(u.clientWidth||z.clientWidth)-3;u=Math.max(u.clientHeight||0,z.clientHeight)-3}else f=d.offsetTop,k=d.offsetLeft,C=d.clientWidth,u=d.clientHeight; z=document.createElement("div");z.style.zIndex=mxPopupMenu.prototype.zIndex+2;z.style.border="3px dotted rgb(254, 137, 12)";z.style.pointerEvents="none";z.style.position="absolute";z.style.top=f+"px";z.style.left=k+"px";z.style.width=Math.max(0,C-3)+"px";z.style.height=Math.max(0,u-3)+"px";null!=d&&d.parentNode==this.editor.graph.container?this.editor.graph.container.appendChild(z):document.body.appendChild(z);return z};EditorUi.prototype.stringToCells=function(d){d=mxUtils.parseXml(d);var f=this.editor.extractGraphModel(d.documentElement);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d)try{d.close()}catch(O){}if(EditorUi.enableLogging&&!this.isOffline())try{EditorUi.logEvent({category:"ERROR-LOAD-FILE-"+(null!=d?d.getHash():"none"),action:"message_"+K.message,label:"stack_"+K.stack})}catch(O){}d=mxUtils.bind(this,function(){null!=urlParams.url&&this.spinner.spin(document.body,mxResources.get("reconnecting"))?window.location.search=this.getSearch(["url"]):null!=u?this.fileLoaded(u)||C():C()});f?d():this.handleError(K,mxResources.get("errorLoadingFile"),d,!0,null,null,!0)}else C();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
l.prototype.quadTo=function(Z,ba,ia,qa){this.passThrough?this.originalQuadTo.apply(this.canvas,arguments):(this.addOp(this.quadOp,Z,ba,ia,qa),this.lastX=ia,this.lastY=qa)};l.prototype.curveTo=function(Z,ba,ia,qa,ra,pa){this.passThrough?this.originalCurveTo.apply(this.canvas,arguments):(this.addOp(this.curveOp,Z,ba,ia,qa,ra,pa),this.lastX=ra,this.lastY=pa)};l.prototype.arcTo=function(Z,ba,ia,qa,ra,pa,xa){if(this.passThrough)this.originalArcTo.apply(this.canvas,arguments);else{var Ca=mxUtils.arcToCurves(this.lastX,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
GraphViewer.logAncestorFrames=function(){try{if(window.location.ancestorOrigins&&window.location.hostname&&window.location.ancestorOrigins.length&&0<window.location.ancestorOrigins.length){var b=window.location.hostname;b&&1<b.length&&"/"==b.charAt(b.length-1)&&(b=b.substring(0,b.length-1));for(var e="",g=0;g<window.location.ancestorOrigins.length;g++)e+=" -> "+window.location.ancestorOrigins[g];!(b.endsWith(".draw.io")&&1==window.location.ancestorOrigins.length&&window.location.ancestorOrigins[0]&& window.location.ancestorOrigins[0].endsWith(".atlassian.net"))&&0<window.location.ancestorOrigins.length&&((new Image).src="https://log.diagrams.net/images/1x1.png?src=ViewerAncestorFrames"+("undefined"!==typeof window.EditorUi?"&v="+encodeURIComponent(EditorUi.VERSION):"")+"&data="+encodeURIComponent(e))}}catch(p){}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxResources.get("format"),d,60,240,f,mxUtils.bind(this,function(z){z.appendChild(this.formatContainer)}));this.formatWindow.window.addListener(mxEvent.SHOW,mxUtils.bind(this,function(){this.formatWindow.window.fit()}));var k=this.formatWindow.window.toggleMinimized,u=240;this.formatWindow.window.toggleMinimized=function(){k.apply(this,arguments);this.minimized?(u=parseInt(this.div.style.width),this.div.style.width="140px",this.table.style.width="140px",this.div.style.left=parseInt(this.div.style.left)+ u-140+"px"):(this.div.style.width=u+"px",this.table.style.width=this.div.style.width,this.div.style.left=Math.max(0,parseInt(this.div.style.left)-u+140)+"px");this.fit()};mxEvent.addListener(this.formatWindow.window.title,"dblclick",mxUtils.bind(this,function(z){mxEvent.getSource(z)==this.formatWindow.window.title&&this.formatWindow.window.toggleMinimized()}));this.formatWindow.window.minimumSize=new mxRectangle(0,0,240,80);"sketch"==Editor.currentTheme?(d=window.innerHeight||document.documentElement.clientHeight||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function W(){mxShape.call(this)}function d(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1}function f(){mxActor.call(this)}function k(){mxCylinder.call(this)}function u(){mxCylinder.call(this)}function z(){mxActor.call(this)}function C(){mxActor.call(this)}function F(){mxActor.call(this)}function K(){mxActor.call(this)}function O(){mxActor.call(this)}function H(){mxActor.call(this)}function ka(){mxActor.call(this)}function fa(c,m){this.canvas=c;this.canvas.setLineJoin("round"); this.canvas.setLineCap("round");this.defaultVariation=m;this.originalLineTo=this.canvas.lineTo;this.canvas.lineTo=mxUtils.bind(this,fa.prototype.lineTo);this.originalMoveTo=this.canvas.moveTo;this.canvas.moveTo=mxUtils.bind(this,fa.prototype.moveTo);this.originalClose=this.canvas.close;this.canvas.close=mxUtils.bind(this,fa.prototype.close);this.originalQuadTo=this.canvas.quadTo;this.canvas.quadTo=mxUtils.bind(this,fa.prototype.quadTo);this.originalCurveTo=this.canvas.curveTo;this.canvas.curveTo= mxUtils.bind(this,fa.prototype.curveTo);this.originalArcTo=this.canvas.arcTo;this.canvas.arcTo=mxUtils.bind(this,fa.prototype.arcTo)}function ca(){mxRectangleShape.call(this)}function ja(){mxRectangleShape.call(this)}function ma(){mxActor.call(this)}function aa(){mxActor.call(this)}function S(){mxActor.call(this)}function da(){mxRectangleShape.call(this)}function P(){mxRectangleShape.call(this)}function V(){mxCylinder.call(this)}function l(){mxShape.call(this)}function A(){mxShape.call(this)}function N(){mxEllipse.call(this)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=A&&0<A.length&&(A=l[A[1]],null!=A&&(A=/.* \/Subject (\d+) (\d+) R/g.exec(A.join("\n")),null!=A&&0<A.length&&(l=l[A[1]],null!=l&&(l=l.join("\n"),N=l.substring(1,l.length-1))))));return N};Editor.extractParserError=function(l,A){var N=null;l=null!=l?l.getElementsByTagName("parsererror"):null;null!=l&&0<l.length&&(N=A||mxResources.get("invalidChars"),A=l[0].getElementsByTagName("div"),0<A.length&&(N=mxUtils.getTextContent(A[0])));return null!=N?mxUtils.trim(N):N};Editor.addRetryToError=function(l, A){null!=l&&(l=null!=l.error?l.error:l,null==l.retry&&(l.retry=A))};Editor.mermaidToDrawio=function(l,A,N){if("function"===typeof mxMermaidToDrawio)return mxMermaidToDrawio(l,A,N)};Editor.configure=function(l){if(null!=l){Editor.config=l;Editor.configVersion=l.version;l.debug&&(urlParams.test="1");null!=l.defaultFonts&&(Menus.prototype.defaultFonts=l.defaultFonts);null!=l.presetColors&&(ColorDialog.prototype.presetColors=l.presetColors);null!=l.defaultColors&&(ColorDialog.prototype.defaultColors=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.ui.pages.push(this.ui.createPage());0>mxUtils.indexOf(this.ui.pages,this.ui.currentPage)&&this.ui.selectPage(this.ui.pages[0],!0)}finally{L.container.style.visibility="";L.model.endUpdate();L.cellRenderer.redraw=R;this.changeListenerEnabled=T;g||(y.history=q,y.indexOfNextAdd=E,y.fireEvent(new mxEventObject(mxEvent.CLEAR)));if(null==this.ui.currentPage||this.ui.currentPage.needsUpdate)M!=L.mathEnabled?(this.ui.editor.updateGraphComponents(),L.refresh()):(G!=L.foldingEnabled?L.view.revalidate(): L.view.validate(),L.sizeDidChange());null!=this.sync&&this.isRealtime()&&!p&&(this.sync.snapshot=this.ui.clonePages(this.ui.pages));this.ui.editor.fireEvent(new mxEventObject("pagesPatched","patches",b))}EditorUi.debug("DrawioFile.patch",[this],"patches",b,"resolver",e,"undoable",g)}return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g.setViewState(b.viewState);g.gridEnabled=g.gridEnabled&&(!this.ui.editor.isChromelessView()||"1"==urlParams.grid);e.graph.fireEvent(new mxEventObject(mxEvent.ROOT));e.fireEvent(new mxEventObject("pageSelected","change",this))}};function ChangePage(b,e,g,p,y){SelectPage.call(this,b,g);this.relatedPage=e;this.index=p;this.previousIndex=null;this.noSelect=y}mxUtils.extend(ChangePage,SelectPage);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
da.resp&&0<da.resp.length&&null!=da.resp[0]?aa(da.resp[0]):ja())}}catch(P){console.log(P)}});window.addEventListener("message",F)}})));d(C);C.onversionchange=function(){C.close()}}catch(F){null!=f?f(F):null!=window.console&&console.warn(F)}});u.onerror=f;u.onblocked=function(){}}catch(z){null!=f?f(z):null!=window.console&&console.error(z)}else null!=f&&f(Error("IndexedDB not supported"))}else d(this.database)};EditorUi.prototype.setDatabaseItem=function(d,f,k,u,z){this.openDatabase(mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.prompt=function(b,e,g){b=new FilenameDialog(this,e,mxResources.get("apply"),function(p){g(parseFloat(p))},b);this.showDialog(b.container,300,80,!0,!0);b.init()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments)):X=PROXY_URL+"?url="+encodeURIComponent(X)}return X};return l};Editor.createSvgDataUri=function(l){return"data:image/svg+xml;base64,"+btoa(unescape(encodeURIComponent(l)))};Editor.prototype.convertImageToDataUri=function(l,A){try{var N=!0,X=window.setTimeout(mxUtils.bind(this,function(){N=!1;A(Editor.svgBrokenImage.src)}),this.timeout);if(/(\.svg)$/i.test(l))mxUtils.get(l,mxUtils.bind(this,function(Z){window.clearTimeout(X);N&&A(Editor.createSvgDataUri(Z.getText()))}),function(){window.clearTimeout(X);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
GraphViewer.prototype.crop=function(){var b=this.graph,e=b.getGraphBounds(),g=b.border,p=b.view.scale;b.view.setTranslate(null!=e.x?Math.floor(b.view.translate.x-e.x/p+g):g,null!=e.y?Math.floor(b.view.translate.y-e.y/p+g):g)};GraphViewer.prototype.updateContainerWidth=function(b,e){b.style.width=e+"px"};GraphViewer.prototype.updateContainerHeight=function(b,e){if(this.forceCenter||this.zoomEnabled||!this.autoFit||"BackCompat"==document.compatMode||8==document.documentMode)b.style.height=e+"px"};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxActor);z.prototype.size=30;z.prototype.isRoundable=function(){return!0};z.prototype.redrawPath=function(c,m,v,n,t){m=Math.max(0,Math.min(n,Math.min(t,parseFloat(mxUtils.getValue(this.style,"size",this.size)))));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(m,0),new mxPoint(n,0),new mxPoint(n,t),new mxPoint(0,t),new mxPoint(0,m)],this.isRounded,v,!0);c.end()};mxCellRenderer.registerShape("card",z);mxUtils.extend(C,mxActor);C.prototype.size=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){var c=this.state.style.shape;null==mxCellRenderer.defaultShapes[c]&&null==mxStencilRegistry.getStencil(c)&&(c=mxConstants.SHAPE_CONNECTOR);c=Ab[c];return null!=c?c(this.state):null}}else Graph.createHandle=function(){},Graph.handleFactory={};var Bb=new mxPoint(1,0),vb=new mxPoint(1,0),zb=mxUtils.toRadians(-30);Bb=mxUtils.getRotatedPoint(Bb,Math.cos(zb),Math.sin(zb));var yb=mxUtils.toRadians(-150);vb=mxUtils.getRotatedPoint(vb,Math.cos(yb),Math.sin(yb));mxEdgeStyle.IsometricConnector=function(c, m,v,n,t){var B=c.view;n=null!=n&&0<n.length?n[0]:null;var D=c.absolutePoints,ha=D[0];D=D[D.length-1];null!=n&&(n=B.transformControlPoint(c,n));null==ha&&null!=m&&(ha=new mxPoint(m.getCenterX(),m.getCenterY()));null==D&&null!=v&&(D=new mxPoint(v.getCenterX(),v.getCenterY()));var I=Bb.x,va=Bb.y,na=vb.x,bb=vb.y,qb="horizontal"==mxUtils.getValue(c.style,"elbow","horizontal");if(null!=D&&null!=ha){c=function(Ga,Ja,Ia){Ga-=fb.x;var Ha=Ja-fb.y;Ja=(bb*Ga-na*Ha)/(I*bb-va*na);Ga=(va*Ga-I*Ha)/(va*na-I*bb);qb? (Ia&&(fb=new mxPoint(fb.x+I*Ja,fb.y+va*Ja),t.push(fb)),fb=new mxPoint(fb.x+na*Ga,fb.y+bb*Ga)):(Ia&&(fb=new mxPoint(fb.x+na*Ga,fb.y+bb*Ga),t.push(fb)),fb=new mxPoint(fb.x+I*Ja,fb.y+va*Ja));t.push(fb)};var fb=ha;null==n&&(n=new mxPoint(ha.x+(D.x-ha.x)/2,ha.y+(D.y-ha.y)/2));c(n.x,n.y,!0);c(D.x,D.y,!1)}};mxStyleRegistry.putValue("isometricEdgeStyle",mxEdgeStyle.IsometricConnector);var Cb=Graph.prototype.createEdgeHandler;Graph.prototype.createEdgeHandler=function(c,m){if(m==mxEdgeStyle.IsometricConnector){var v=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function Y(){mxEllipse.call(this)}function ea(){mxEllipse.call(this)}function la(){mxRhombus.call(this)}function oa(){mxEllipse.call(this)}function wa(){mxEllipse.call(this)}function sa(){mxEllipse.call(this)}function ua(){mxEllipse.call(this)}function Fa(){mxActor.call(this)}function Ua(){mxActor.call(this)}function Ra(){mxActor.call(this)}function Na(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1;this.rectStyle="square";this.size=10;this.absoluteCornerSize=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=G){var M=new ConnectionPointsDialog(p,G);p.showDialog(M.container,350,450,!0,!1,function(){M.destroy()});M.init()}},null,null,"Alt+Shift+Q").isEnabled=E};Actions.prototype.addAction=function(b,e,g,p,y){if("..."==b.substring(b.length-3)){b=b.substring(0,b.length-3);var q=mxResources.get(b)+"..."}else q=mxResources.get(b);return this.put(b,new Action(q,e,g,p,y))};Actions.prototype.put=function(b,e){return this.actions[b]=e};Actions.prototype.get=function(b){return this.actions[b]};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(C){try{z=z||"objects";Array.isArray(z)||(z=[z],d=[d],f=[f]);var F=C.transaction(z,"readwrite");F.oncomplete=k;F.onerror=u;for(C=0;C<z.length;C++)F.objectStore(z[C]).put(null!=d&&null!=d[C]?{key:d[C],data:f[C]}:f[C])}catch(K){null!=u&&u(K)}}),u)};EditorUi.prototype.removeDatabaseItem=function(d,f,k,u){this.openDatabase(mxUtils.bind(this,function(z){u=u||"objects";Array.isArray(u)||(u=[u],d=[d]);z=z.transaction(u,"readwrite");z.oncomplete=f;z.onerror=k;for(var C=0;C<u.length;C++)z.objectStore(u[C]).delete(d[C])}), k)};EditorUi.prototype.getDatabaseItem=function(d,f,k,u){this.openDatabase(mxUtils.bind(this,function(z){try{u=u||"objects";var C=z.transaction([u],"readonly").objectStore(u).get(d);C.onsuccess=function(){f(C.result)};C.onerror=k}catch(F){null!=k&&k(F)}}),k)};EditorUi.prototype.getDatabaseItems=function(d,f,k){this.openDatabase(mxUtils.bind(this,function(u){try{k=k||"objects";var z=u.transaction([k],"readonly").objectStore(k).openCursor(IDBKeyRange.lowerBound(0)),C=[];z.onsuccess=function(F){null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Qa);mxUtils.extend(Oa,mxArrowConnector);Oa.prototype.defaultWidth=10;Oa.prototype.defaultArrowWidth=20;Oa.prototype.getStartArrowWidth=function(){return this.getEdgeWidth()+mxUtils.getNumber(this.style,"startWidth",this.defaultArrowWidth)};Oa.prototype.getEndArrowWidth=function(){return this.getEdgeWidth()+mxUtils.getNumber(this.style,"endWidth",this.defaultArrowWidth)};Oa.prototype.getEdgeWidth=function(){return mxUtils.getNumber(this.style,"width",this.defaultWidth)+Math.max(0,this.strokewidth- 1)};mxCellRenderer.registerShape("flexArrow",Oa);mxUtils.extend(ta,mxActor);ta.prototype.size=30;ta.prototype.isRoundable=function(){return!0};ta.prototype.redrawPath=function(c,m,v,n,t){m=Math.min(t,parseFloat(mxUtils.getValue(this.style,"size",this.size)));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,t),new mxPoint(0,m),new mxPoint(n,0),new mxPoint(n,t)],this.isRounded,v,!0);c.end()};mxCellRenderer.registerShape("manualInput",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.setPageVisible=function(b){var e=this.editor.graph,g=mxUtils.hasScrollbars(e.container),p=0,y=0;g&&(p=e.view.translate.x*e.view.scale-e.container.scrollLeft,y=e.view.translate.y*e.view.scale-e.container.scrollTop);e.pageVisible=b;e.pageBreaksVisible=b;e.preferPageSize=b;e.view.validateBackground();if(g){var q=e.getSelectionCells();e.clearSelection();e.setSelectionCells(q)}e.sizeDidChange();g&&(e.container.scrollLeft=e.view.translate.x*e.view.scale-p,e.container.scrollTop=e.view.translate.y* e.view.scale-y);e.defaultPageVisible=b;this.fireEvent(new mxEventObject("pageViewChanged"))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxEvent.isShiftDown(R)?p.gridSize:null,!0)}:function(){e(R.keyCode,mxEvent.isShiftDown(R)?p.gridSize:null)}}return T.apply(this,arguments)};y.bindAction=mxUtils.bind(this,function(R,W,d,f){var k=this.actions.get(d);null!=k&&(d=function(){k.isEnabled()&&k.funct.apply(this,arguments)},W?f?y.bindControlShiftKey(R,d):y.bindControlKey(R,d):f?y.bindShiftKey(R,d):y.bindKey(R,d))});var G=this,M=y.escape;y.escape=function(R){M.apply(this,arguments)};y.enter=function(){};y.bindControlShiftKey(36,function(){p.exitGroup()});
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(c,m,v){c=[];var n=Math.min(m,v/2),t=Math.min(m-n,Math.max(0,parseFloat(mxUtils.getValue(this.style,"size",this.size)))*m);c.push(new mxConnectionConstraint(new mxPoint(0,.5),!1,null));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,t,0));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(t+m-n),0));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m-n,0));c.push(new mxConnectionConstraint(new mxPoint(1,.5),!1,null));c.push(new mxConnectionConstraint(new mxPoint(0, 0),!1,null,m-n,v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(t+m-n),v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,t,v));return c};xa.prototype.getConstraints=function(c,m,v){m=parseFloat(mxUtils.getValue(c,"jettyWidth",xa.prototype.jettyWidth))/2;c=parseFloat(mxUtils.getValue(c,"jettyHeight",xa.prototype.jettyHeight));var n=[new mxConnectionConstraint(new mxPoint(0,0),!1,null,m),new mxConnectionConstraint(new mxPoint(.25,0),!0),new mxConnectionConstraint(new mxPoint(.5,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0),!1,null,.5*(m-n),v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m-n),.5*(v+t)));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m-n),t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.25*m-.25*n,t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,.5*t));return c};Ba.prototype.getConstraints=function(c,m,v){c=[];var n=Math.max(0,Math.min(m,parseFloat(mxUtils.getValue(this.style, "dx",this.dx)))),t=Math.max(0,Math.min(v,parseFloat(mxUtils.getValue(this.style,"dy",this.dy))));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1));c.push(new mxConnectionConstraint(new mxPoint(.5,0),!1));c.push(new mxConnectionConstraint(new mxPoint(1,0),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,.5*t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m+n),t));c.push(new mxConnectionConstraint(new mxPoint(0, 0),!1,null,n,t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,n,.5*(v+t)));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,n,v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*n,v));c.push(new mxConnectionConstraint(new mxPoint(0,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,1),!1));return c};ya.prototype.constraints=[new mxConnectionConstraint(new mxPoint(0,0),!1),new mxConnectionConstraint(new mxPoint(0,.5),!1),new mxConnectionConstraint(new mxPoint(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e)}null!=b.graphModelNode&&(b.viewState=this.editor.graph.createViewState(b.graphModelNode))}return b};EditorUi.prototype.selectPage=function(b,e,g){try{if(b!=this.currentPage){var p=this.editor.graph;p.isEditing()&&p.stopEditing(!1);e=null!=e?e:!1;p.isMouseDown=!1;p.reset();var y=p.model.createUndoableEdit();y.ignoreEdit=!0;var q=new SelectPage(this,b,g);q.execute();y.add(q);y.notify();e||p.model.fireEvent(new mxEventObject(mxEvent.UNDO,"edit",y))}}catch(E){this.handleError(E)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!0;this.connectionHandler.setCreateTarget(!1);this.connectionHandler.insertBeforeSource=!0;this.connectionHandler.isValidSource=function(S,da){return!1};this.alternateEdgeStyle="vertical";null==p&&this.loadStylesheet();var R=this.graphHandler.getGuideStates;this.graphHandler.getGuideStates=function(){var S=R.apply(this,arguments);if(this.graph.pageVisible){var da=[],P=this.graph.pageFormat,V=this.graph.pageScale,l=P.width*V;P=P.height*V;V=this.graph.view.translate;for(var A=this.graph.view.scale, N=this.graph.getPageLayout(),X=0;X<N.width;X++)da.push(new mxRectangle(((N.x+X)*l+V.x)*A,(N.y*P+V.y)*A,l*A,P*A));for(X=1;X<N.height;X++)da.push(new mxRectangle((N.x*l+V.x)*A,((N.y+X)*P+V.y)*A,l*A,P*A));S=da.concat(S)}return S};mxDragSource.prototype.dragElementZIndex=mxPopupMenu.prototype.zIndex;mxGuide.prototype.getGuideColor=function(S,da){return null==S.cell?"#ffa500":mxConstants.GUIDE_COLOR};this.graphHandler.createPreviewShape=function(S){this.previewColor="#000000"==this.graph.background?"#ffffff":
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(Ia&&(fb=new mxPoint(fb.x+I*Ja,fb.y+va*Ja),t.push(fb)),fb=new mxPoint(fb.x+na*Ga,fb.y+bb*Ga)):(Ia&&(fb=new mxPoint(fb.x+na*Ga,fb.y+bb*Ga),t.push(fb)),fb=new mxPoint(fb.x+I*Ja,fb.y+va*Ja));t.push(fb)};var fb=ha;null==n&&(n=new mxPoint(ha.x+(D.x-ha.x)/2,ha.y+(D.y-ha.y)/2));c(n.x,n.y,!0);c(D.x,D.y,!1)}};mxStyleRegistry.putValue("isometricEdgeStyle",mxEdgeStyle.IsometricConnector);var Cb=Graph.prototype.createEdgeHandler;Graph.prototype.createEdgeHandler=function(c,m){if(m==mxEdgeStyle.IsometricConnector){var v= new mxElbowEdgeHandler(c);v.snapToTerminals=!1;return v}return Cb.apply(this,arguments)};E.prototype.constraints=[];L.prototype.getConstraints=function(c,m,v){c=[];var n=Math.tan(mxUtils.toRadians(30)),t=(.5-n)/2;n=Math.min(m,v/(.5+n));m=(m-n)/2;v=(v-n)/2;c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,v+.25*n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m+.5*n,v+n*t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m+n,v+.25*n));c.push(new mxConnectionConstraint(new mxPoint(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments);null!=W&&R&&this.graph.model.isEdge(W.cell)&&null!=W.style&&1!=W.style[mxConstants.STYLE_CURVED]&&this.validEdges.push(W);return W};var g=mxShape.prototype.paint;mxShape.prototype.paint=function(){g.apply(this,arguments);if(null!=this.state&&null!=this.node&&this.state.view.graph.enableFlowAnimation&&this.state.view.graph.model.isEdge(this.state.cell)&&"1"==mxUtils.getValue(this.state.style,"flowAnimation","0")){var M=this.node.getElementsByTagName("path");if(1<M.length){"1"!=mxUtils.getValue(this.state.style, mxConstants.STYLE_DASHED,"0")&&M[1].setAttribute("stroke-dasharray",8*this.state.view.scale);var R=this.state.view.graph.getFlowAnimationStyle();null!=R&&M[1].setAttribute("class",R.getAttribute("id"))}}};var p=mxCellRenderer.prototype.isShapeInvalid;mxCellRenderer.prototype.isShapeInvalid=function(M,R){return p.apply(this,arguments)||null!=M.routedPoints&&null!=R.routedPoints&&!mxUtils.equalPoints(R.routedPoints,M.routedPoints)};var y=mxGraphView.prototype.updateCellState;mxGraphView.prototype.updateCellState=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Uint8Array.from||(Uint8Array.from=function(){var b=Object.prototype.toString,e=function(p){return"function"===typeof p||"[object Function]"===b.call(p)},g=Math.pow(2,53)-1;return function(p){var y=Object(p);if(null==p)throw new TypeError("Array.from requires an array-like object - not null or undefined");var q=1<arguments.length?arguments[1]:void 0,E;if("undefined"!==typeof q){if(!e(q))throw new TypeError("Array.from: when provided, the second argument must be a function");2<arguments.length&&(E= arguments[2])}var L=Number(y.length);L=isNaN(L)?0:0!==L&&isFinite(L)?(0<L?1:-1)*Math.floor(Math.abs(L)):L;L=Math.min(Math.max(L,0),g);for(var T=e(this)?Object(new this(L)):Array(L),G=0,M;G<L;)M=y[G],T[G]=q?"undefined"===typeof E?q(M,G):q.call(E,M,G):M,G+=1;T.length=L;return T}}());mxConstants.POINTS=1;mxConstants.MILLIMETERS=2;mxConstants.INCHES=3;mxConstants.METERS=4;mxConstants.PIXELS_PER_MM=3.937;mxConstants.PIXELS_PER_INCH=100;mxConstants.SHADOW_OPACITY=.25;mxConstants.SHADOWCOLOR="#000000";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
y.cellEditor.stopEditing=function(P,V){try{ma.apply(this,arguments),ca()}catch(l){p.handleError(l)}};y.container.setAttribute("tabindex","0");y.container.style.cursor="default";if(window.self===window.top&&null!=y.container.parentNode)try{y.container.focus()}catch(P){}var aa=y.fireMouseEvent;y.fireMouseEvent=function(P,V,l){try{P==mxEvent.MOUSE_DOWN&&this.container.focus(),aa.apply(this,arguments)}catch(A){p.handleError(A)}};var S=y.foldCells;y.foldCells=function(P,V,l,A,N){try{S.apply(this,arguments)}catch(X){p.handleError(X)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.bind(this,function(K){this.spinner.stop();C(K)}));else if(Graph.fileSupport&&(new XMLHttpRequest).upload&&this.isRemoteFileFormat(d,f))this.isOffline()?(this.spinner.stop(),this.showError(mxResources.get("error"),mxResources.get("notInOffline"))):this.parseFile(k,mxUtils.bind(this,function(K){4==K.readyState&&(this.spinner.stop(),200<=K.status&&299>=K.status?C(K.responseText):this.handleError({message:mxResources.get(413==K.status?"drawingTooLarge":"invalidOrMissingFile")},mxResources.get("errorLoadingFile")))}));
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.createShapePicker=function(b,e,g,p,y,q,E,L,T,G,M){M=null!=M?M:!0;var R=this.editor.graph,W=null;T=null!=T?T:function(k){k=k[0];var u=0,z=0,C=k.geometry;null!=C&&(R.model.isEdge(k)&&(k=C.getTerminalPoint(!1),C=new mxRectangle(0,0,k.x,k.y)),u=C.width/2,z=C.height/2);return new mxPoint(R.snap(Math.round(b/R.view.scale)-R.view.translate.x-u),R.snap(Math.round(e/R.view.scale)-R.view.translate.y-z))};if(null!=E&&0<E.length){var d=this;R=this.editor.graph;W=document.createElement("div");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.removePage=function(b){try{var e=this.editor.graph,g=mxUtils.indexOf(this.pages,b);if(e.isEnabled()&&0<=g){this.editor.graph.isEditing()&&this.editor.graph.stopEditing(!1);e.model.beginUpdate();try{var p=this.currentPage;p==b&&1<this.pages.length?(g==this.pages.length-1?g--:g++,p=this.pages[g]):1>=this.pages.length&&(p=this.insertPage(),e.model.execute(new RenamePage(this,p,mxResources.get("pageWithNumber",[1]))));e.model.execute(new ChangePage(this,b,p))}finally{e.model.endUpdate()}}}catch(y){this.handleError(y)}return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d,f,k,u,z,C,F,K){EditorUi.logEvent("SHOULD NOT BE CALLED: loadUrl");return this.editor.loadUrl(d,f,k,u,z,C,F,K)};EditorUi.prototype.loadFonts=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: loadFonts");return this.editor.loadFonts(d)};EditorUi.prototype.createSvgDataUri=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: createSvgDataUri");return Editor.createSvgDataUri(d)};EditorUi.prototype.embedCssFonts=function(d,f){EditorUi.logEvent("SHOULD NOT BE CALLED: embedCssFonts");return this.editor.embedCssFonts(d,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.convertDataUri=function(d){if("data:"==d.substring(0,5)){var f=d.indexOf(";");0<f&&(d=d.substring(0,f)+d.substring(d.indexOf(",",f+1)))}return d};EditorUi.prototype.isRemoteFileFormat=function(d,f){return/("contentType":\s*"application\/gliffy\+json")/.test(d)};EditorUi.prototype.isLucidChartData=function(d){return null!=d&&('{"state":"{\\"Properties\\":'==d.substring(0,26)||'{"Properties":'==d.substring(0,14))};EditorUi.prototype.importLocalFile=function(d,f){if(d&&Graph.fileSupport){if(null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
if(null!=y.graphHandler){var u=y.graphHandler.start;y.graphHandler.start=function(){null!=p.hoverIcons&&p.hoverIcons.reset();u.apply(this,arguments)}}mxEvent.addListener(this.diagramContainer,"mousemove",mxUtils.bind(this,function(P){var V=mxUtils.getOffset(this.diagramContainer);0<mxEvent.getClientX(P)-V.x-this.diagramContainer.clientWidth||0<mxEvent.getClientY(P)-V.y-this.diagramContainer.clientHeight?this.diagramContainer.setAttribute("title",mxResources.get("panTooltip")):this.diagramContainer.removeAttribute("title")}));
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.share=function(){null!=this.ui.drive?this.ui.confirm(mxResources.get("saveItToGoogleDriveToCollaborate",[this.getTitle()]),mxUtils.bind(this,function(){this.ui.pickFolder(App.MODE_GOOGLE,mxUtils.bind(this,function(b){var e=this.ui.editor.graph,g=e.getSelectionCells(),p=e.getViewState(),y=this.ui.currentPage;this.ui.createFile(this.getTitle(),this.ui.getFileData(null,null,null,null,null,null,null,null,this),null,App.MODE_GOOGLE,null,!0,b,null,null,mxUtils.bind(this,function(){this.ui.restoreViewState(y, p,g);this.ui.actions.get("share").funct()}))}))}),null,mxResources.get("saveToGoogleDrive",null,"Save to Google Drive"),mxResources.get("cancel")):this.ui.alert(mxResources.get("sharingAvailable"),null,380)};DrawioFile.prototype.getHash=function(){return""};DrawioFile.prototype.getId=function(){return""};DrawioFile.prototype.isEditable=function(){return!this.ui.editor.isChromelessView()||this.ui.editor.editable};DrawioFile.prototype.getUi=function(){return this.ui};DrawioFile.prototype.getTitle=function(){return""};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.createVertexWipeAnimation=function(b,e){var g=new mxRectangle.fromRectangle(b.shape.bounds);return{execute:mxUtils.bind(this,function(p,y){null!=b.shape&&(y=p/y,e||(y=1-y),b.shape.bounds=new mxRectangle(g.x,g.y,g.width*y,g.height),b.shape.redraw(),0==p&&Graph.setOpacityForNodes(this.getNodesForCells([b.cell]),1),null!=b.text&&null!=b.text.node&&(b.text.node.style.opacity=y))}),stop:mxUtils.bind(this,function(){null!=b.shape&&(b.shape.bounds=g,b.shape.redraw(),null!=b.text&&null!=b.text.node&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments)};this.connectionHandler.insertEdge=function(S,da,P,V,l,A){var N=mxConnectionHandler.prototype.insertEdge.apply(this,arguments);null!=V&&this.graph.applyNewEdgeStyle(V,[N]);return N};var f=new mxRubberband(this);this.getRubberband=function(){return f};var k=(new Date).getTime(),u=0,z=this.connectionHandler.mouseMove;this.connectionHandler.mouseMove=function(){var S=this.currentState;z.apply(this,arguments);S!=this.currentState?(k=(new Date).getTime(),u=0):u=(new Date).getTime()-k};var C=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
64,Sidebar.prototype.thumbHeight=64);EditorUi.initTheme=function(){"atlas"==Editor.currentTheme&&(mxClient.link("stylesheet",STYLE_PATH+"/atlas.css"),"undefined"!==typeof Toolbar&&(Toolbar.prototype.unselectedBackground="linear-gradient(rgb(255, 255, 255) 0px, rgb(242, 242, 242) 100%)",Toolbar.prototype.selectedBackground="rgb(242, 242, 242)"),Editor.prototype.initialTopSpacing=3,EditorUi.prototype.menubarHeight=41,EditorUi.prototype.toolbarHeight=38);"sketch"==Editor.currentTheme&&(Editor.configurationKey= ".sketch-configuration",Editor.settingsKey=".sketch-config")};EditorUi.initTheme();EditorUi.prototype.showImageDialog=function(d,f,k,u,z,C,F){d=new ImageDialog(this,d,f,k,u,z,C,F);this.showDialog(d.container,Graph.fileSupport?480:360,Graph.fileSupport?200:90,!0,!0);d.init()};EditorUi.prototype.showLocalStorageDialog=function(d,f,k,u,z,C){var F=localStorage.getItem(f);d=new TextareaDialog(this,d,null!=F?JSON.stringify(JSON.parse(F),null,2):"",mxUtils.bind(this,function(K){if(null!=K)try{if(null!=C&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
C="json"==urlParams.proto?JSON.stringify({event:"init"}):urlParams.ready||"ready";F.postMessage(C,"*");if("json"==urlParams.proto){var K=this.editor.graph.openLink;this.editor.graph.openLink=function(O,H,ka){K.apply(this,arguments);F.postMessage(JSON.stringify({event:"openLink",href:O,target:H,allowOpener:ka}),"*")}}};EditorUi.prototype.createEmbedButton=function(d,f,k,u){var z="simple"==Editor.currentTheme||"sketch"==Editor.currentTheme||"min"==Editor.currentTheme,C=document.createElement("button");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
if(0<T.length){if(null!=this.pageId)for(var G=0;G<T.length;G++)if(this.pageId==T[G].getAttribute("id")){this.currentPage=G;break}var M=this.graph.getGlobalVariable;L=this;this.graph.getGlobalVariable=function(k){var u=T[L.currentPage];return"page"==k?u.getAttribute("name")||"Page-"+(L.currentPage+1):"pagenumber"==k?L.currentPage+1:"pagecount"==k?T.length:M.apply(this,arguments)}}}this.diagrams=[];var R=null;this.selectPage=function(k){this.handlingResize||(this.currentPage=mxUtils.mod(k,this.diagrams.length),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.saveCanvas=function(d,f,k,u,z){var C="jpeg"==k?"jpg":k;u=this.getBaseFilename(u)+(null!=f?".drawio":"")+"."+C;d=this.createImageDataUri(d,f,k,z);this.saveData(u,C,d.substring(d.lastIndexOf(",")+1),"image/"+k,!0)};EditorUi.prototype.isLocalFileSave=function(){return"remote"!=urlParams.save&&(mxClient.IS_IE||"undefined"!==typeof window.Blob&&"undefined"!==typeof window.URL)&&9!=document.documentMode&&8!=document.documentMode&&7!=document.documentMode||this.isOfflineApp()||mxClient.IS_IOS};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.installResizeHandler=function(b,e,g){e&&(b.window.setSize=function(y,q){if(!this.minimized){var E=window.innerHeight||document.body.clientHeight||document.documentElement.clientHeight;y=Math.min(y,(window.innerWidth||document.body.clientWidth||document.documentElement.clientWidth)-this.getX());q=Math.min(q,E-this.getY())}mxWindow.prototype.setSize.apply(this,arguments)});b.window.setLocation=function(y,q){var E=window.innerWidth||document.body.clientWidth||document.documentElement.clientWidth, L=window.innerHeight||document.body.clientHeight||document.documentElement.clientHeight,T=parseInt(this.div.style.width),G=parseInt(this.div.style.height);y=Math.max(0,Math.min(y,E-T));q=Math.max(0,Math.min(q,L-G));this.getX()==y&&this.getY()==q||mxWindow.prototype.setLocation.apply(this,arguments);e&&!this.minimized&&this.setSize(T,G)};var p=mxUtils.bind(this,function(){var y=b.window.getX(),q=b.window.getY();b.window.setLocation(y,q)});mxEvent.addListener(window,"resize",p);b.destroy=function(){mxEvent.removeListener(window, "resize",p);b.window.destroy();null!=g&&g()}};function ChangeGridColor(b,e){this.ui=b;this.color=e}ChangeGridColor.prototype.execute=function(){var b=this.ui.editor.graph.view.gridColor;this.ui.setGridColor(this.color);this.color=b};(function(){var b=new mxObjectCodec(new ChangeGridColor,["ui"]);mxCodecRegistry.register(b)})();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"application/font-woff2";else if("eot"==ba||/(\.eot)($|\?)/i.test(qa))ra="application/vnd.ms-fontobject";else if("sfnt"==ba||/(\.sfnt)($|\?)/i.test(qa))ra="application/font-sfnt";this.mapFontUrl(ra,qa,mxUtils.bind(this,function(pa,xa){this.loadUrl(xa,mxUtils.bind(this,function(Ca){this.cachedFonts[qa]=Ca;X--;U()}),mxUtils.bind(this,function(Ca){X--;U()}),!0,null,"data:"+pa+";charset=utf-8;base64,")}))}})(Editor.trimCssUrl(N[l].substring(0,Z)),ba)}U()}else A(l)};Editor.prototype.loadFonts=function(l){null!= this.fontCss&&null==this.resolvedFontCss?this.embedCssFonts(this.fontCss,mxUtils.bind(this,function(A){this.resolvedFontCss=A;null!=l&&l()})):null!=l&&l()};Editor.prototype.createGoogleFontCache=function(){var l={},A;for(A in Graph.fontMapping)Graph.isCssFontUrl(A)&&(l[A]=Graph.fontMapping[A]);return l};Editor.prototype.embedExtFonts=function(l){var A=this.graph.getCustomFonts();if(0<A.length){var N=[],X=0;null==this.cachedGoogleFonts&&(this.cachedGoogleFonts=this.createGoogleFontCache());for(var U=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.changeHandler=null)}}();(function(){function b(c,m,v){mxShape.call(this);this.line=c;this.stroke=m;this.strokewidth=null!=v?v:1;this.updateBoundsFromLine()}function e(){mxSwimlane.call(this)}function g(){mxSwimlane.call(this)}function p(){mxCylinder.call(this)}function y(){mxConnector.call(this)}function q(){mxCylinder.call(this)}function E(){mxActor.call(this)}function L(){mxCylinder.call(this)}function T(){mxCylinder.call(this)}function G(){mxCylinder.call(this)}function M(){mxCylinder.call(this)}function R(){mxShape.call(this)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.getImageForPage=function(b,e,g){g=null!=g?g:this.editor.graph;var p=g.getGlobalVariable,y=this.createTemporaryGraph(g.getStylesheet());y.defaultPageBackgroundColor=g.defaultPageBackgroundColor;y.shapeBackgroundColor=g.shapeBackgroundColor;y.shapeForegroundColor=g.shapeForegroundColor;var q=this.getPageIndex(null!=e?e:this.currentPage);y.getGlobalVariable=function(L){return"pagenumber"==L?q+1:"page"==L&&null!=e?e.getName():p.apply(this,arguments)};document.body.appendChild(y.container); this.updatePageRoot(b);y.model.setRoot(b.root);b=Graph.foreignObjectWarningText;Graph.foreignObjectWarningText="";g=y.getSvg(null,null,null,null,null,null,null,null,null,null,null,!0);var E=y.getGraphBounds();document.body.removeChild(y.container);Graph.foreignObjectWarningText=b;return new mxImage(Editor.createSvgDataUri(mxUtils.getXml(g)),E.width,E.height,E.x,E.y)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function W(){mxShape.call(this)}function d(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1}function f(){mxActor.call(this)}function k(){mxCylinder.call(this)}function u(){mxCylinder.call(this)}function z(){mxActor.call(this)}function C(){mxActor.call(this)}function F(){mxActor.call(this)}function K(){mxActor.call(this)}function O(){mxActor.call(this)}function H(){mxActor.call(this)}function ka(){mxActor.call(this)}function fa(c,m){this.canvas=c;this.canvas.setLineJoin("round");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=Fa&&(sa[ua].setAttribute("rel",this.linkRelation),sa[ua].setAttribute("href",Fa),null!=J&&mxEvent.addGestureListeners(sa[ua],null,null,J))}});this.model.addListener(mxEvent.CHANGE,Y);Y();var ea=this.container.style.cursor,la=this.getTolerance(),oa=this,wa={currentState:null,currentLink:null,currentTarget:null,highlight:null!=x&&""!=x&&x!=mxConstants.NONE?new mxCellHighlight(oa,x,4):null,startX:0,startY:0,scrollLeft:0,scrollTop:0,updateCurrentState:function(sa){var ua=sa.sourceState;if(null== ua||null==oa.getLinkForCell(ua.cell))sa=oa.getCellAt(sa.getGraphX(),sa.getGraphY(),null,null,null,function(Fa,Ua,Ra){return null==oa.getLinkForCell(Fa.cell)}),ua=null==ua||oa.model.isAncestor(sa,ua.cell)?oa.view.getState(sa):null;ua!=this.currentState&&(null!=this.currentState&&this.clear(),this.currentState=ua,null!=this.currentState&&this.activate(this.currentState))},mouseDown:function(sa,ua){this.startX=ua.getGraphX();this.startY=ua.getGraphY();this.scrollLeft=oa.container.scrollLeft;this.scrollTop=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
c.lineTo(m+n,v);c.lineTo(m+n,v+t);c.lineTo(m,v+t);c.lineTo(m,v+ha);c.stroke()};mxCellRenderer.registerShape("umlFrame",ba);mxPerimeter.CenterPerimeter=function(c,m,v,n){return new mxPoint(c.getCenterX(),c.getCenterY())};mxStyleRegistry.putValue("centerPerimeter",mxPerimeter.CenterPerimeter);mxPerimeter.LifelinePerimeter=function(c,m,v,n){n=Z.prototype.size;null!=m&&(n=mxUtils.getValue(m.style,"size",n)*m.view.scale);m=parseFloat(m.style[mxConstants.STYLE_STROKEWIDTH]||1)*m.view.scale/2-1;v.x<c.getCenterX()&& (m=-1*(m+1));return new mxPoint(c.getCenterX()+m,Math.min(c.y+c.height,Math.max(c.y+n,v.y)))};mxStyleRegistry.putValue("lifelinePerimeter",mxPerimeter.LifelinePerimeter);mxPerimeter.OrthogonalPerimeter=function(c,m,v,n){n=!0;return mxPerimeter.RectanglePerimeter.apply(this,arguments)};mxStyleRegistry.putValue("orthogonalPerimeter",mxPerimeter.OrthogonalPerimeter);mxPerimeter.BackbonePerimeter=function(c,m,v,n){n=parseFloat(m.style[mxConstants.STYLE_STROKEWIDTH]||1)*m.view.scale/2-1;null!=m.style.backboneSize&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k():u(100);mxEvent.consume(A)}));mxEvent.addListener(this.chromelessToolbar,"mouseleave",mxUtils.bind(this,function(A){mxEvent.isTouchEvent(A)||u(30)}));var O=b.getTolerance();b.addMouseListener({startX:0,startY:0,scrollLeft:0,scrollTop:0,mouseDown:function(A,N){this.startX=N.getGraphX();this.startY=N.getGraphY();this.scrollLeft=b.container.scrollLeft;this.scrollTop=b.container.scrollTop},mouseMove:function(A,N){},mouseUp:function(A,N){mxEvent.isTouchEvent(N.getEvent())&&Math.abs(this.scrollLeft-
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
y.editor.graph.shadowId="lightboxDropShadow";Graph.prototype.shadowId=p;y.refresh=function(){};var q=mxUtils.bind(this,function(W){27==W.keyCode&&y.destroy()}),E=this.initialOverflow,L=y.destroy;y.destroy=function(){null==b&&(mxEvent.removeListener(document.documentElement,"keydown",q),document.body.removeChild(e),document.body.removeChild(g),document.body.style.overflow=E,GraphViewer.resizeSensorEnabled=!0,L.apply(this,arguments))};var T=y.editor.graph,G=T.container;G.style.overflow="hidden";this.lightboxChrome&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.fontCss&&null==this.resolvedFontCss?this.embedCssFonts(this.fontCss,mxUtils.bind(this,function(A){this.resolvedFontCss=A;null!=l&&l()})):null!=l&&l()};Editor.prototype.createGoogleFontCache=function(){var l={},A;for(A in Graph.fontMapping)Graph.isCssFontUrl(A)&&(l[A]=Graph.fontMapping[A]);return l};Editor.prototype.embedExtFonts=function(l){var A=this.graph.getCustomFonts();if(0<A.length){var N=[],X=0;null==this.cachedGoogleFonts&&(this.cachedGoogleFonts=this.createGoogleFontCache());for(var U=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(x){return p.apply(this,arguments)||this.graph.isEdgeIgnored(x)};var y=mxConnectionHandler.prototype.isCreateTarget;mxConnectionHandler.prototype.isCreateTarget=function(x){return this.graph.isCloneEvent(x)!=y.apply(this,arguments)};mxConstraintHandler.prototype.createHighlightShape=function(){var x=new mxEllipse(null,this.highlightColor,this.highlightColor,0);x.opacity=mxConstants.HIGHLIGHT_OPACITY;return x};mxConnectionHandler.prototype.livePreview=!0;mxConnectionHandler.prototype.cursor=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null;q.cellEditor.isContentEditing()?document.execCommand("paste",!1,null):E=g.apply(this,arguments);b.updatePasteActionStates();return E};var p=this.editor.graph.cellEditor.startEditing;this.editor.graph.cellEditor.startEditing=function(){p.apply(this,arguments);b.updatePasteActionStates()};var y=this.editor.graph.cellEditor.stopEditing;this.editor.graph.cellEditor.stopEditing=function(q,E){y.apply(this,arguments);b.updatePasteActionStates()};this.updatePasteActionStates()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(function(){var b=window.requestAnimationFrame||window.mozRequestAnimationFrame||window.webkitRequestAnimationFrame||function(g){return window.setTimeout(g,20)},e=function(g,p){function y(){this.q=[];this.add=function(k){this.q.push(k)};var d,f;this.call=function(){d=0;for(f=this.q.length;d<f;d++)this.q[d].call()}}function q(d,f){return d.currentStyle?d.currentStyle[f]:window.getComputedStyle?window.getComputedStyle(d,null).getPropertyValue(f):d.style[f]}function E(d,f){if(!d.resizedAttached)d.resizedAttached=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
l.prototype.quadTo=function(Z,ba,ia,qa){this.passThrough?this.originalQuadTo.apply(this.canvas,arguments):(this.addOp(this.quadOp,Z,ba,ia,qa),this.lastX=ia,this.lastY=qa)};l.prototype.curveTo=function(Z,ba,ia,qa,ra,pa){this.passThrough?this.originalCurveTo.apply(this.canvas,arguments):(this.addOp(this.curveOp,Z,ba,ia,qa,ra,pa),this.lastX=ra,this.lastY=pa)};l.prototype.arcTo=function(Z,ba,ia,qa,ra,pa,xa){if(this.passThrough)this.originalArcTo.apply(this.canvas,arguments);else{var Ca=mxUtils.arcToCurves(this.lastX,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"change",K);mxEvent.addListener(q,"change",K);mxEvent.addListener(L,"change",function(O){C="custom"==L.value;K(O,!0)});K();return{set:function(O){g=O;y(null,null,!0)},get:function(){return F},widthInput:R,heightInput:W}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
type:"bool",getDefaultValue:function(l,A){var N=1==l.vertices.length&&0==l.edges.length?l.vertices[0]:null;A=A.editorUi.editor.graph;return null!=N&&(A.isContainer(N)&&"0"!=l.style.collapsible||!A.isContainer(N)&&"1"==l.style.collapsible)},isVisible:function(l,A){return 1==l.vertices.length&&0==l.edges.length}},{name:"recursiveResize",dispName:"Resize Children",type:"bool",defVal:!0,isVisible:function(l,A){return 1==l.vertices.length&&0==l.edges.length&&!A.editorUi.editor.graph.isSwimlane(l.vertices[0])&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
J){var Q=null!=J&&mxEvent.isShiftDown(J);if(Q||null!=window.getSelection&&null!=window.getSelection().containsNode){var Y=!0;this.graph.processElements(this.textarea,function(ea){Q||window.getSelection().containsNode(ea,!0)?(ea.removeAttribute("align"),ea.style.textAlign=null):Y=!1});Y&&this.graph.cellEditor.setAlign(x)}document.execCommand("justify"+x.toLowerCase(),!1,null)};mxCellEditor.prototype.saveSelection=function(){if(window.getSelection){var x=window.getSelection();if(x.getRangeAt&&x.rangeCount){for(var J= [],Q=0,Y=x.rangeCount;Q<Y;++Q)J.push(x.getRangeAt(Q));return J}}else if(document.selection&&document.selection.createRange)return document.selection.createRange();return null};mxCellEditor.prototype.restoreSelection=function(x){try{if(x)if(window.getSelection){sel=window.getSelection();sel.removeAllRanges();for(var J=0,Q=x.length;J<Q;++J)sel.addRange(x[J])}else document.selection&&x.select&&x.select()}catch(Y){}};var u=mxCellRenderer.prototype.initializeLabel;mxCellRenderer.prototype.initializeLabel=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.createRoughCanvas=function(l){var A=rough.canvas({getContext:function(){return l}});A.draw=function(N){var X=N.sets||[];N=N.options||this.getDefaultOptions();for(var U=0;U<X.length;U++){var Z=X[U];switch(Z.type){case "path":null!=N.stroke&&this._drawToContext(l,Z,N);break;case "fillPath":this._drawToContext(l,Z,N);break;case "fillSketch":this.fillSketch(l,Z,N)}}};A.fillSketch=function(N,X,U){var Z=l.state.strokeColor,ba=l.state.strokeWidth,ia=l.state.strokeAlpha,qa=l.state.dashed,ra=U.fillWeight; 0>ra&&(ra=U.strokeWidth/2);l.setStrokeAlpha(l.state.fillAlpha);l.setStrokeColor(U.fill||"");l.setStrokeWidth(ra);l.setDashed(!1);this._drawToContext(N,X,U);l.setDashed(qa);l.setStrokeWidth(ba);l.setStrokeColor(Z);l.setStrokeAlpha(ia)};A._drawToContext=function(N,X,U){N.begin();for(var Z=0;Z<X.ops.length;Z++){var ba=X.ops[Z],ia=ba.data;switch(ba.op){case "move":N.moveTo(ia[0],ia[1]);break;case "bcurveTo":N.curveTo(ia[0],ia[1],ia[2],ia[3],ia[4],ia[5]);break;case "lineTo":N.lineTo(ia[0],ia[1])}}N.end(); "fillPath"===X.type&&U.filled?N.fill():N.stroke()};return A};(function(){function l(Z,ba,ia){this.canvas=Z;this.rc=ba;this.shape=ia;this.canvas.setLineJoin("round");this.canvas.setLineCap("round");this.originalBegin=this.canvas.begin;this.canvas.begin=mxUtils.bind(this,l.prototype.begin);this.originalEnd=this.canvas.end;this.canvas.end=mxUtils.bind(this,l.prototype.end);this.originalRect=this.canvas.rect;this.canvas.rect=mxUtils.bind(this,l.prototype.rect);this.originalRoundrect=this.canvas.roundrect;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
1),!1));c.push(new mxConnectionConstraint(new mxPoint(1,.5),!1));m>=2*n&&c.push(new mxConnectionConstraint(new mxPoint(.5,0),!1));return c};p.prototype.getConstraints=function(c,m,v){c=[];var n=Math.max(0,Math.min(m,Math.min(v,parseFloat(mxUtils.getValue(this.style,"size",this.size)))));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m-n),0));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m-n,0));c.push(new mxConnectionConstraint(new mxPoint(0, 0),!1,null,m-.5*n,.5*n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,.5*(v+n)));c.push(new mxConnectionConstraint(new mxPoint(1,1),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m+n),v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,n,v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*n,v-.5*n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,v-n));c.push(new mxConnectionConstraint(new mxPoint(0, 0),!1,null,0,.5*(v-n)));return c};d.prototype.getConstraints=function(c,m,v){c=[];m=Math.max(0,Math.min(v,parseFloat(mxUtils.getValue(this.style,"size",this.size))));c.push(new mxConnectionConstraint(new mxPoint(.5,0),!1));c.push(new mxConnectionConstraint(new mxPoint(0,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(.5,1),!1));c.push(new mxConnectionConstraint(new mxPoint(1,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,m));c.push(new mxConnectionConstraint(new mxPoint(1,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.getValue(J,mxConstants.STYLE_ELBOW,mxConstants.ELBOW_HORIZONTAL)==mxConstants.ELBOW_HORIZONTAL?mxConstants.ELBOW_VERTICAL:mxConstants.ELBOW_HORIZONTAL;this.setCellStyles(mxConstants.STYLE_ELBOW,J,[x])}};Graph.prototype.isValidRoot=function(x){for(var J=this.model.getChildCount(x),Q=0,Y=0;Y<J;Y++){var ea=this.model.getChildAt(x,Y);this.model.isVertex(ea)&&(ea=this.getCellGeometry(ea),null==ea||ea.relative||Q++)}return 0<Q||this.isContainer(x)};Graph.prototype.isValidDropTarget=function(x,J, Q){for(var Y=this.getCurrentCellStyle(x),ea=!0,la=!0,oa=0;oa<J.length&&la;oa++)ea=ea&&this.isTable(J[oa]),la=la&&this.isTableRow(J[oa]);return!this.isCellLocked(x)&&(1==J.length&&null!=Q&&mxEvent.isShiftDown(Q)&&!mxEvent.isControlDown(Q)&&!mxEvent.isAltDown(Q)||this.isTargetShape(x,J,Q)||("1"!=mxUtils.getValue(Y,"part","0")||this.isContainer(x))&&"0"!=mxUtils.getValue(Y,"dropTarget","1")&&(mxGraph.prototype.isValidDropTarget.apply(this,arguments)||this.isContainer(x))&&!this.isTableRow(x)&&(!this.isTable(x)|| la||ea))};Graph.prototype.createGroupCell=function(){var x=mxGraph.prototype.createGroupCell.apply(this,arguments);x.setStyle("group");return x};Graph.prototype.isExtendParentsOnAdd=function(x){var J=mxGraph.prototype.isExtendParentsOnAdd.apply(this,arguments);if(J&&null!=x&&null!=this.layoutManager){var Q=this.model.getParent(x);null!=Q&&(Q=this.layoutManager.getLayout(Q),null!=Q&&Q.constructor==mxStackLayout&&(J=!1))}return J};Graph.prototype.getPreferredSizeForCell=function(x){var J=mxGraph.prototype.getPreferredSizeForCell.apply(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.getPngFileProperties=function(d){var f=1,k=0;if(null!=d){if(d.hasAttribute("scale")){var u=parseFloat(d.getAttribute("scale"));!isNaN(u)&&0<u&&(f=u)}d.hasAttribute("border")&&(u=parseInt(d.getAttribute("border")),!isNaN(u)&&0<u&&(k=u))}return{scale:f,border:k}};EditorUi.prototype.getEmbeddedPng=function(d,f,k,u,z){try{var C=this.editor.graph,F=null!=C.themes&&"darkTheme"==C.defaultThemeName,K=null;if(null!=k&&0<k.length)C=this.createTemporaryGraph(F?C.getDefaultStylesheet():C.getStylesheet()),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ha-.5*I,I);else if("fold"==D||"default"==D&&"fold"==B)c.lineTo(n-ha-I,ha+I),c.lineTo(n-ha-I,I)};Na.prototype.paintRightInner=function(c,m,v,n,t,B,D,ha,I,va,na){va||na?!va&&na?c.lineTo(n-I,0):va&&!na?c.lineTo(n,I):va?"square"==D||"default"==D&&"square"==B?c.lineTo(n-I,I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.lineTo(n-I,ha+.5*I):c.lineTo(n-I,ha+I):c.lineTo(n-I,0):c.lineTo(n,0)};Na.prototype.paintLeftInner=function(c,m,v,n,t,B,D,ha,I,va,na){va||na?!va&&na?c.lineTo(I, t):va&&!na?c.lineTo(0,t-I):va?"square"==D||"default"==D&&"square"==B?c.lineTo(I,t-I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.lineTo(I,t-ha-.5*I):c.lineTo(I,t-ha-I):c.lineTo(I,t):c.lineTo(0,t)};Na.prototype.paintSEInner=function(c,m,v,n,t,B,D,ha,I){if("rounded"==D||"default"==D&&"rounded"==B)c.arcTo(ha-.5*I,ha-.5*I,0,0,0,n-I,t-ha-.5*I);else if("invRound"==D||"default"==D&&"invRound"==B)c.arcTo(ha+I,ha+I,0,0,1,n-I,t-ha-I);else if("snip"==D||"default"==D&&"snip"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.changeHandler=null)}}();(function(){function b(c,m,v){mxShape.call(this);this.line=c;this.stroke=m;this.strokewidth=null!=v?v:1;this.updateBoundsFromLine()}function e(){mxSwimlane.call(this)}function g(){mxSwimlane.call(this)}function p(){mxCylinder.call(this)}function y(){mxConnector.call(this)}function q(){mxCylinder.call(this)}function E(){mxActor.call(this)}function L(){mxCylinder.call(this)}function T(){mxCylinder.call(this)}function G(){mxCylinder.call(this)}function M(){mxCylinder.call(this)}function R(){mxShape.call(this)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
A);mxUtils.extend(N,mxEllipse);N.prototype.paintVertexShape=function(c,m,v,n,t){mxEllipse.prototype.paintVertexShape.apply(this,arguments);c.begin();c.moveTo(m+n/8,v+t);c.lineTo(m+7*n/8,v+t);c.end();c.stroke()};mxCellRenderer.registerShape("umlEntity",N);mxUtils.extend(X,mxShape);X.prototype.paintVertexShape=function(c,m,v,n,t){c.translate(m,v);c.begin();c.moveTo(n,0);c.lineTo(0,t);c.moveTo(0,0);c.lineTo(n,t);c.end();c.stroke()};mxCellRenderer.registerShape("umlDestroy",X);mxUtils.extend(U,mxShape);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
parseFloat(mxUtils.getValue(this.style,"size",this.size));var B=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,0),new mxPoint(n,0),new mxPoint(n,v),new mxPoint(m,v),new mxPoint(m,t),new mxPoint(0,t)],this.isRounded,B,!0);c.end()};mxCellRenderer.registerShape("corner",Ba);mxUtils.extend(ya,mxActor);ya.prototype.redrawPath=function(c,m,v,n,t){c.moveTo(0,0);c.lineTo(0,t);c.end();c.moveTo(n,0);c.lineTo(n,t);c.end();c.moveTo(0,t/2);c.lineTo(n, t/2);c.end()};mxCellRenderer.registerShape("crossbar",ya);mxUtils.extend(Va,mxActor);Va.prototype.dx=20;Va.prototype.dy=20;Va.prototype.redrawPath=function(c,m,v,n,t){m=Math.max(0,Math.min(n,parseFloat(mxUtils.getValue(this.style,"dx",this.dx))));v=Math.max(0,Math.min(t,parseFloat(mxUtils.getValue(this.style,"dy",this.dy))));parseFloat(mxUtils.getValue(this.style,"size",this.size));var B=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
if(W==g.getChildAt(p,q+T)&&null!=d&&1==mxUtils.getValue(d.style,"colspan",1)&&1==mxUtils.getValue(d.style,"rowspan",1))T++;else break}M==G*T-1&&(b.mergeCell=e[0],b.colspan=T,b.rowspan=G)}}};EditorUi.prototype.windowResized=function(){window.setTimeout(mxUtils.bind(this,function(){null!=this.editor.graph&&this.refresh()}),0)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function Y(){mxEllipse.call(this)}function ea(){mxEllipse.call(this)}function la(){mxRhombus.call(this)}function oa(){mxEllipse.call(this)}function wa(){mxEllipse.call(this)}function sa(){mxEllipse.call(this)}function ua(){mxEllipse.call(this)}function Fa(){mxActor.call(this)}function Ua(){mxActor.call(this)}function Ra(){mxActor.call(this)}function Na(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1;this.rectStyle="square";this.size=10;this.absoluteCornerSize=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
F.freehand){var ma=F.freehand.createStyle;F.freehand.createStyle=function(ia){return ma.apply(this,arguments)+"sketch=0;"}}C.editor.addListener("statusChanged",mxUtils.bind(this,function(){C.setStatusText(C.editor.getStatus())}));C.setStatusText(C.editor.getStatus());var aa=C.menus.get("viewZoom");if(null!=aa){var S=function(ia){if(mxEvent.isAltDown(ia))C.hideCurrentMenu(),C.actions.get("customZoom").funct(),mxEvent.consume(ia);else if("geMenuItem"==mxEvent.getSource(ia).className||mxEvent.isShiftDown(ia))C.hideCurrentMenu(), C.actions.get("smartFit").funct(),mxEvent.consume(ia)},da=C.actions.get("zoomIn"),P=C.actions.get("zoomOut"),V=C.actions.get("resetView"),l=C.actions.get("undo"),A=C.actions.get("redo"),N=d("",l.funct,null,mxResources.get("undo")+" ("+l.shortcut+")",l,Editor.undoImage),X=d("",A.funct,null,mxResources.get("redo")+" ("+A.shortcut+")",A,Editor.redoImage),U=d("",S,!0,mxResources.get("fit")+" ("+Editor.ctrlKey+"+H)",V,Editor.zoomFitImage);K.style.cssText="position:absolute;left:0px;right:0px;top:0px;height:30px;padding:8px;text-align:left;white-space:nowrap;";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=G){var M=new ConnectionPointsDialog(p,G);p.showDialog(M.container,350,450,!0,!1,function(){M.destroy()});M.init()}},null,null,"Alt+Shift+Q").isEnabled=E};Actions.prototype.addAction=function(b,e,g,p,y){if("..."==b.substring(b.length-3)){b=b.substring(0,b.length-3);var q=mxResources.get(b)+"..."}else q=mxResources.get(b);return this.put(b,new Action(q,e,g,p,y))};Actions.prototype.put=function(b,e){return this.actions[b]=e};Actions.prototype.get=function(b){return this.actions[b]};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0;u^=f}return u};EditorUi.prototype.descriptorChanged=function(){};EditorUi.prototype.restoreLibraries=function(){};EditorUi.prototype.saveLibrary=function(d,f,k,u,z,C,F){};EditorUi.prototype.isScratchpadEnabled=function(){return isLocalStorage||mxClient.IS_CHROMEAPP};EditorUi.prototype.toggleScratchpad=function(){this.isScratchpadEnabled()&&(null==this.scratchpad?StorageFile.getFileContent(this,".scratchpad",mxUtils.bind(this,function(d){null==d&&(d=this.emptyLibraryXml);this.loadLibrary(new StorageLibrary(this, d,".scratchpad"))})):this.closeLibrary(this.scratchpad))};EditorUi.prototype.createLibraryDataFromImages=function(d){if(!Editor.defaultCompressed)for(var f=0;f<d.length;f++)null!=d[f].xml&&"<"!=d[f].xml.charAt(0)&&(d[f].xml=mxUtils.trim(Graph.decompress(d[f].xml)));f=mxUtils.createXmlDocument();var k=f.createElement("mxlibrary");mxUtils.setTextContent(k,JSON.stringify(d,null,2));f.appendChild(k);return mxUtils.getXml(f,"\n")};EditorUi.prototype.closeLibrary=function(d){null!=d&&(this.removeLibrarySidebar(d.getHash()),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(Va){try{null!=Va&&this.addFontCss(Da,Va),this.loadFonts(ya)}catch(Wa){null!=U&&U(Wa)}}))}catch(Va){null!=U&&U(Va)}}),N,pa)}catch(Da){null!=U&&U(Da)}};Editor.crcTable=[];for(var y=0;256>y;y++)for(var q=y,E=0;8>E;E++)q=1==(q&1)?3988292384^q>>>1:q>>>1,Editor.crcTable[y]=q;Editor.updateCRC=function(l,A,N,X){for(var U=0;U<X;U++)l=Editor.crcTable[(l^A.charCodeAt(N+U))&255]^l>>>8;return l};Editor.crc32=function(l){for(var A=-1,N=0;N<l.length;N++)A=A>>>8^Editor.crcTable[(A^l.charCodeAt(N))&255]; return(A^-1)>>>0};Editor.writeGraphModelToPng=function(l,A,N,X,U){function Z(pa,xa){var Ca=qa;qa+=xa;return pa.substring(Ca,qa)}function ba(pa){pa=Z(pa,4);return pa.charCodeAt(3)+(pa.charCodeAt(2)<<8)+(pa.charCodeAt(1)<<16)+(pa.charCodeAt(0)<<24)}function ia(pa){return String.fromCharCode(pa>>24&255,pa>>16&255,pa>>8&255,pa&255)}l=l.substring(l.indexOf(",")+1);l=window.atob?atob(l):Base64.decode(l,!0);var qa=0;if(Z(l,8)!=String.fromCharCode(137)+"PNG"+String.fromCharCode(13,10,26,10))null!=U&&U();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.addTabListeners=function(b,e){mxEvent.disableContextMenu(e);var g=this.editor.graph;mxEvent.addListener(e,"dblclick",mxUtils.bind(this,function(T){this.renamePage(b);mxEvent.consume(T)}));var p=document.createElement("div");p.className="geTabMenuButton";p.style.backgroundImage="url("+mxWindow.prototype.minimizeImage+")";p.style.backgroundPosition="center center";p.style.backgroundRepeat="no-repeat";p.style.backgroundSize="10px";e.appendChild(p);var y=!1,q=!1,E=mxUtils.bind(this, function(T){y=null!=this.currentMenu;q=b==this.currentPage;g.isMouseDown||q||this.selectPage(b);this.scrollToPage()}),L=mxUtils.bind(this,function(T){if(g.isEnabled()&&!g.isMouseDown&&(q&&(mxEvent.isTouchEvent(T)||mxEvent.getSource(T)==p)||mxEvent.isPopupTrigger(T))&&(g.popupMenuHandler.hideMenu(),this.hideCurrentMenu(),!mxEvent.isTouchEvent(T)||!y)){var G=new mxPopupMenu(this.createPageMenu(b));G.div.className+=" geMenubarMenu";G.smartSeparators=!0;G.showDisabled=!0;G.autoExpand=!0;G.hideMenu=mxUtils.bind(this, function(){mxPopupMenu.prototype.hideMenu.apply(G,arguments);this.resetCurrentMenu();G.destroy()});var M=mxEvent.getClientX(T),R=mxEvent.getClientY(T);G.popup(M,R,null,T);this.setCurrentMenu(G,e)}mxEvent.consume(T)});mxEvent.addGestureListeners(p,E,null,L);mxEvent.addGestureListeners(e,E,null,L)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.saveViewState=function(b,e,g,p){g||(e.setAttribute("grid",(null==b?this.defaultGridEnabled:b.gridEnabled)?"1":"0"),e.setAttribute("page",(null==b?this.defaultPageVisible:b.pageVisible)?"1":"0"),e.setAttribute("gridSize",null!=b?b.gridSize:mxGraph.prototype.gridSize),e.setAttribute("guides",null==b||b.guidesEnabled?"1":"0"),e.setAttribute("tooltips",null==b||b.tooltips?"1":"0"),e.setAttribute("connect",null==b||b.connect?"1":"0"),e.setAttribute("arrows",null==b||b.arrows?"1":"0"),e.setAttribute("fold", null==b||b.foldingEnabled?"1":"0"));e.setAttribute("pageScale",null!=b&&null!=b.pageScale?b.pageScale:mxGraph.prototype.pageScale);g=null!=b?b.pageFormat:"undefined"===typeof mxSettings||null!=this.defaultPageFormat?mxGraph.prototype.pageFormat:mxSettings.getPageFormat();null!=g&&(e.setAttribute("pageWidth",g.width),e.setAttribute("pageHeight",g.height));null!=b&&(null!=b.background&&e.setAttribute("background",b.background),p=this.getBackgroundImageObject(b.backgroundImage,p),null!=p&&e.setAttribute("backgroundImage", JSON.stringify(p)));e.setAttribute("math",(null==b?this.defaultMathEnabled:b.mathEnabled)?"1":"0");e.setAttribute("shadow",null!=b&&b.shadowVisible?"1":"0");null!=b&&null!=b.extFonts&&0<b.extFonts.length&&e.setAttribute("extFonts",b.extFonts.map(function(y){return y.name+"^"+y.url}).join("|"))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxClient.IS_IE||mxClient.IS_IE11||mxClient.IS_FF&&mxClient.IS_WIN?"gray dotted 1px":""};var F=mxCellEditor.prototype.installListeners;mxCellEditor.prototype.installListeners=function(x){function J(ea,la){la.originalNode=ea;ea=ea.firstChild;for(var oa=la.firstChild;null!=ea&&null!=oa;)J(ea,oa),ea=ea.nextSibling,oa=oa.nextSibling;return la}function Q(ea,la){if(null!=ea)if(la.originalNode!=ea)Y(ea);else for(ea=ea.firstChild,la=la.firstChild;null!=ea;){var oa=ea.nextSibling;null==la?Y(ea):(Q(ea,la),la=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.createImageForPageLink=function(b,e,g){var p=b.indexOf(","),y=null;0<p&&(p=this.getPageById(b.substring(p+1)),null!=p&&p!=e&&(y=this.getImageForPage(p,e,g),y.originalSrc=b));null==y&&(y={originalSrc:b});return y};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0,z.x,z.y));null!=z&&u.appendChild(this.sidebar.createVertexTemplateFromCells([k],z.width,z.height,"",!0,!1,null,!1,mxUtils.bind(this,function(C){if(!mxEvent.isShiftDown(C)||null==g&&R.isSelectionEmpty()){var F=R.cloneCell(k);if(null!=p)p(F);else{var K=T([F]);R.model.isEdge(F)?F.geometry.translate(K.x,K.y):(F.geometry.x=K.x,F.geometry.y=K.y);R.model.beginUpdate();try{R.addCell(F),R.model.isVertex(F)&&R.isAutoSizeCell(F)&&R.updateCellSize(F)}finally{R.model.endUpdate()}R.setSelectionCell(F);R.scrollCellToVisible(F); M&&R.startEditing(F);null!=d.hoverIcons&&d.hoverIcons.update(R.view.getState(F))}}else F=R.getEditableCells(null!=g?[g]:R.getSelectionCells()),R.updateShapes(k,F);null!=q&&q(C);mxEvent.consume(C)}),25,25,null,null,g))});for(G=0;G<(L?Math.min(E.length,4):E.length);G++)y(E[G]);E=W.offsetTop+W.clientHeight-(R.container.scrollTop+R.container.offsetHeight);0<E&&(W.style.top=Math.max(R.container.scrollTop+22,e-E)+"px");E=W.offsetLeft+W.clientWidth-(R.container.scrollLeft+R.container.offsetWidth);0<E&&(W.style.left=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
J.getChildCells(Q,!0);if(1>=ea.length)J.remove(Q);else{this.isTableRow(Y)||(Y=ea[ea.length-1]);J.remove(Y);x=0;var la=this.getCellGeometry(Y);null!=la&&(x=la.height);var oa=this.getCellGeometry(Q);null!=oa&&(oa=oa.clone(),oa.height-=x,J.setGeometry(Q,oa))}}finally{J.endUpdate()}};Graph.prototype.insertRow=function(x,J){for(var Q=x.tBodies[0],Y=Q.rows[0].cells,ea=x=0;ea<Y.length;ea++){var la=Y[ea].getAttribute("colspan");x+=null!=la?parseInt(la):1}J=Q.insertRow(J);for(ea=0;ea<x;ea++)mxUtils.br(J.insertCell(-1)); return J.cells[0]};Graph.prototype.deleteRow=function(x,J){x.tBodies[0].deleteRow(J)};Graph.prototype.insertColumn=function(x,J){var Q=x.tHead;if(null!=Q)for(var Y=0;Y<Q.rows.length;Y++){var ea=document.createElement("th");Q.rows[Y].appendChild(ea);mxUtils.br(ea)}x=x.tBodies[0];for(Q=0;Q<x.rows.length;Q++)Y=x.rows[Q].insertCell(J),mxUtils.br(Y);return x.rows[0].cells[0<=J?J:x.rows[0].cells.length-1]};Graph.prototype.deleteColumn=function(x,J){if(0<=J){x=x.tBodies[0].rows;for(var Q=0;Q<x.length;Q++)x[Q].cells.length>
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
n,v+t/2);c.end();c.stroke()};mxCellRenderer.registerShape("sortShape",la);mxUtils.extend(oa,mxEllipse);oa.prototype.paintVertexShape=function(c,m,v,n,t){c.begin();c.moveTo(m,v);c.lineTo(m+n,v);c.lineTo(m+n/2,v+t/2);c.close();c.fillAndStroke();c.begin();c.moveTo(m,v+t);c.lineTo(m+n,v+t);c.lineTo(m+n/2,v+t/2);c.close();c.fillAndStroke()};mxCellRenderer.registerShape("collate",oa);mxUtils.extend(wa,mxEllipse);wa.prototype.paintVertexShape=function(c,m,v,n,t){var B=c.state.strokeWidth/2,D=10+2*B,ha=v+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
.4;C.prototype.redrawPath=function(c,m,v,n,t){m=t*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"size",this.size))));c.moveTo(0,m/2);c.quadTo(n/4,1.4*m,n/2,m/2);c.quadTo(3*n/4,m*(1-1.4),n,m/2);c.lineTo(n,t-m/2);c.quadTo(3*n/4,t-1.4*m,n/2,t-m/2);c.quadTo(n/4,t-m*(1-1.4),0,t-m/2);c.lineTo(0,m/2);c.close();c.end()};C.prototype.getLabelBounds=function(c){if(mxUtils.getValue(this.style,"boundedLbl",!1)){var m=mxUtils.getValue(this.style,"size",this.size),v=c.width,n=c.height;if(null==this.direction|| this.direction==mxConstants.DIRECTION_EAST||this.direction==mxConstants.DIRECTION_WEST)return m*=n,new mxRectangle(c.x,c.y+m,v,n-2*m);m*=v;return new mxRectangle(c.x+m,c.y,v-2*m,n)}return c};mxCellRenderer.registerShape("tape",C);mxUtils.extend(F,mxActor);F.prototype.size=.3;F.prototype.getLabelMargins=function(c){return mxUtils.getValue(this.style,"boundedLbl",!1)?new mxRectangle(0,0,0,parseFloat(mxUtils.getValue(this.style,"size",this.size))*c.height):null};F.prototype.redrawPath=function(c,m,v,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ha+.5*I):("invRound"==D||"default"==D&&"invRound"==B||"fold"==D||"default"==D&&"fold"==B)&&c.lineTo(I,ha+I):c.lineTo(0,0)};Na.prototype.paintFolds=function(c,m,v,n,t,B,D,ha,I,va,na,bb,qb,fb,Ga){if("fold"==B||"fold"==D||"fold"==ha||"fold"==I||"fold"==va)("fold"==D||"default"==D&&"fold"==B)&&bb&&Ga&&(c.moveTo(0,na),c.lineTo(na,na),c.lineTo(na,0)),("fold"==ha||"default"==ha&&"fold"==B)&&bb&&qb&&(c.moveTo(n-na,0),c.lineTo(n-na,na),c.lineTo(n,na)),("fold"==I||"default"==I&&"fold"==B)&&fb&&qb&&(c.moveTo(n- na,t),c.lineTo(n-na,t-na),c.lineTo(n,t-na)),("fold"==va||"default"==va&&"fold"==B)&&fb&&Ga&&(c.moveTo(0,t-na),c.lineTo(na,t-na),c.lineTo(na,t))};mxCellRenderer.registerShape(Na.prototype.cst.RECT2,Na);Na.prototype.constraints=null;mxUtils.extend(Za,mxConnector);Za.prototype.origPaintEdgeShape=Za.prototype.paintEdgeShape;Za.prototype.paintEdgeShape=function(c,m,v){for(var n=[],t=0;t<m.length;t++)n.push(mxUtils.clone(m[t]));t=c.state.dashed;var B=c.state.fixDash;Za.prototype.origPaintEdgeShape.apply(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxEdgeHandler.prototype.snapToTerminals=!0;mxGraphHandler.prototype.guidesEnabled=!0;mxGraphHandler.prototype.removeEmptyParents=!0;mxRubberband.prototype.fadeOut=!0;mxGuide.prototype.isEnabledForEvent=function(x){return!mxEvent.isAltDown(x)};var g=mxGraphLayout.prototype.isVertexIgnored;mxGraphLayout.prototype.isVertexIgnored=function(x){return g.apply(this,arguments)||this.graph.isTableRow(x)||this.graph.isTableCell(x)};var p=mxGraphLayout.prototype.isEdgeIgnored;mxGraphLayout.prototype.isEdgeIgnored=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
l=PROXY_URL+"?url="+encodeURIComponent(l)+"&"+N+(A?"&base64=1":"")}return l};Editor.prototype.isCorsEnabledForUrl=function(l){if(mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||l.substring(0,window.location.origin.length)==window.location.origin)return!0;null!=urlParams.cors&&null==this.corsRegExp&&(this.corsRegExp=new RegExp(decodeURIComponent(urlParams.cors)));return null!=this.corsRegExp&&this.corsRegExp.test(l)||"https://raw.githubusercontent.com/"===l.substring(0,34)||"https://fonts.googleapis.com/"=== l.substring(0,29)||"https://fonts.gstatic.com/"===l.substring(0,26)};Editor.prototype.createImageUrlConverter=function(){var l=new mxUrlConverter;l.updateBaseUrl();var A=l.convert,N=this;l.convert=function(X){if(null!=X){var U="http://"==X.substring(0,7)||"https://"==X.substring(0,8);U&&!navigator.onLine?X=Editor.svgBrokenImage.src:!U||X.substring(0,l.baseUrl.length)==l.baseUrl||N.crossOriginImages&&N.isCorsEnabledForUrl(X)?"chrome-extension://"==X.substring(0,19)||mxClient.IS_CHROMEAPP||(X=A.apply(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k.x+u.x-this.panDx+" "+(k.y+u.y-this.panDy)+" "+(k.width+1)+" "+(k.height+1));this.container.style.backgroundColor=E.style.backgroundColor;this.fireEvent(new mxEventObject(mxEvent.SIZE,"bounds",k))}}this.graphConfig.move&&(this.graph.isMoveCellsEvent=function(k){return!0});this.lightboxClickEnabled&&(b.style.cursor="pointer");this.editor=new Editor(!0,null,null,this.graph);this.editor.editBlankUrl=this.editBlankUrl;this.graph.lightbox=!0;this.graph.centerZoom=!1;this.graph.autoExtend=!1;this.graph.autoScroll=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
C&&u.apply(this,arguments)}),O=mxUtils.bind(this,function(){window.clearTimeout(F);C&&z.apply(this,arguments)});k=k||{};k.callbackId=this.remoteInvokeCallbacks.length;this.remoteInvokeCallbacks.push({callback:K,error:O});d=JSON.stringify({event:"remoteInvoke",funtionName:d,functionArgs:f,msgMarkers:k});null!=this.remoteWin?this.remoteWin.postMessage(d,"*"):this.remoteInvokeQueue.push(d)};EditorUi.prototype.handleRemoteInvoke=function(d,f){var k=mxUtils.bind(this,function(H,ka){var fa={event:"remoteInvokeResponse", msgMarkers:d.msgMarkers};null!=ka?fa.error={errResp:ka}:null!=H&&(fa.resp=H);this.remoteWin.postMessage(JSON.stringify(fa),"*")});try{var u=d.funtionName,z=this.remoteInvokableFns[u];if(null!=z&&"function"===typeof this[u]){if(z.allowedDomains){for(var C=!1,F=0;F<z.allowedDomains.length;F++)if(f=="https://"+z.allowedDomains[F]){C=!0;break}if(!C){k(null,"Invalid Call: "+u+" is not allowed.");return}}var K=d.functionArgs;Array.isArray(K)||(K=[]);if(z.isAsync)K.push(function(){k(Array.prototype.slice.apply(arguments))}), K.push(function(H){k(null,H||"Unkown Error")}),this[u].apply(this,K);else{var O=this[u].apply(this,K);k([O])}}else k(null,"Invalid Call: "+u+" is not found.")}catch(H){k(null,"Invalid Call: An error occurred, "+H.message)}};EditorUi.prototype.openDatabase=function(d,f){if(null==this.database){var k=window.indexedDB||window.mozIndexedDB||window.webkitIndexedDB;if(null!=k)try{var u=k.open("database",2);u.onupgradeneeded=function(z){try{var C=u.result;1>z.oldVersion&&C.createObjectStore("objects",{keyPath:"key"});
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable