code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
n=0;n<this.line.length&&!m;n++){var t=this.line[n];null!=t&&null!=v&&(m=mxUtils.rectangleIntersectsSegment(c,v,t));v=t}return m};mxCellRenderer.registerShape("tableLine",b);mxUtils.extend(e,mxSwimlane);e.prototype.getLabelBounds=function(c){return 0==this.getTitleSize()?mxShape.prototype.getLabelBounds.apply(this,arguments):mxSwimlane.prototype.getLabelBounds.apply(this,arguments)};e.prototype.paintVertexShape=function(c,m,v,n,t){var B=null!=this.state?this.state.view.graph.isCellCollapsed(this.state.cell):
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.createTimeout=function(b,e,g){var p=!0,y=null,q=mxUtils.bind(this,function(L){y.clear()&&(p=!1,L=null!=L?L:{code:App.ERROR_TIMEOUT,message:mxResources.get("timeout"),retry:mxUtils.bind(this,function(){this.createTimeout(b,e,g)})},null!=g?g(L):this.handleError(L))}),E=window.setTimeout(q,null!=b?b:this.timeout);y={clear:function(){window.clearTimeout(E);return p},isAlive:function(){return p}};null!=e&&this.tryAndHandle(mxUtils.bind(this,function(){e(y)}),q);return y};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.dblClick=function(x,J){this.isEnabled()&&(J=this.insertTextForEvent(x,J),mxGraph.prototype.dblClick.call(this,x,J))};Graph.prototype.insertTextForEvent=function(x,J){var Q=mxUtils.convertPoint(this.container,mxEvent.getClientX(x),mxEvent.getClientY(x));if(null!=x&&!this.model.isVertex(J)){var Y=this.model.isEdge(J)?this.view.getState(J):null,ea=mxEvent.getSource(x);this.firstClickState!=Y||this.firstClickSource!=ea||null!=Y&&null!=Y.text&&null!=Y.text.node&&null!=Y.text.boundingBox&& (mxUtils.contains(Y.text.boundingBox,Q.x,Q.y)||mxUtils.isAncestorNode(Y.text.node,mxEvent.getSource(x)))||(null!=Y||this.isCellLocked(this.getDefaultParent()))&&(null==Y||this.isCellLocked(Y.cell))||!(null!=Y||mxClient.IS_SVG&&ea==this.view.getCanvas().ownerSVGElement)||(null==Y&&(Y=this.view.getState(this.getCellAt(Q.x,Q.y))),J=this.addText(Q.x,Q.y,Y))}return J};Graph.prototype.getInsertPoint=function(){var x=this.getGridSize(),J=this.container.scrollLeft/this.view.scale-this.view.translate.x,Q=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
300,80,!0,!1);F.init()}}));mxEvent.addListener(k,"change",mxUtils.bind(this,function(){k.checked&&(null==f||f.checked)?C.removeAttribute("disabled"):C.setAttribute("disabled","disabled")}));mxUtils.br(d);return{getLink:function(){return k.checked?"blank"===C.value?"_blank":z:null},getEditInput:function(){return k},getEditSelect:function(){return C}}};EditorUi.prototype.addLinkSection=function(d,f){function k(){var K=document.createElement("div");K.style.width="100%";K.style.height="100%";K.style.boxSizing=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
na,t),c.lineTo(n-na,t-na),c.lineTo(n,t-na)),("fold"==va||"default"==va&&"fold"==B)&&fb&&Ga&&(c.moveTo(0,t-na),c.lineTo(na,t-na),c.lineTo(na,t))};mxCellRenderer.registerShape(Na.prototype.cst.RECT2,Na);Na.prototype.constraints=null;mxUtils.extend(Za,mxConnector);Za.prototype.origPaintEdgeShape=Za.prototype.paintEdgeShape;Za.prototype.paintEdgeShape=function(c,m,v){for(var n=[],t=0;t<m.length;t++)n.push(mxUtils.clone(m[t]));t=c.state.dashed;var B=c.state.fixDash;Za.prototype.origPaintEdgeShape.apply(this, [c,n,v]);3<=c.state.strokeWidth&&(n=mxUtils.getValue(this.style,"fillColor",null),null!=n&&(c.setStrokeColor(n),c.setStrokeWidth(c.state.strokeWidth-2),c.setDashed(t,B),Za.prototype.origPaintEdgeShape.apply(this,[c,m,v])))};mxCellRenderer.registerShape("filledEdge",Za);"undefined"!==typeof StyleFormatPanel&&function(){var c=StyleFormatPanel.prototype.getCustomColors;StyleFormatPanel.prototype.getCustomColors=function(){var m=this.editorUi.getSelectionState(),v=c.apply(this,arguments);"umlFrame"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.graph.setTooltips(0!=this.graphConfig.tooltips);this.graph.initialViewState={translate:this.graph.view.translate.clone(),scale:this.graph.view.scale};null!=G&&this.setLayersVisible(G);this.graph.customLinkClicked=function(k){try{if(Graph.isPageLink(k)){var u=k.indexOf(",");L.selectPageById(k.substring(u+1))||alert(mxResources.get("pageNotFound")||"Page not found")}else this.handleCustomLink(k)}catch(z){alert(z.message)}return!0};var f=this.graph.foldTreeCell;this.graph.foldTreeCell=mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.pickColor=function(b,e){var g=this.editor.graph,p=g.cellEditor.saveSelection(),y=230+17*(Math.ceil(ColorDialog.prototype.presetColors.length/12)+Math.ceil(ColorDialog.prototype.defaultColors.length/12));b=new ColorDialog(this,mxUtils.rgba2hex(b)||"none",function(q){g.cellEditor.restoreSelection(p);e(q)},function(){g.cellEditor.restoreSelection(p)});this.showDialog(b.container,230,y,!0,!1);b.init()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
g.dialogs||0==g.dialogs.length)};y.isControlDown=function(R){return mxEvent.isControlDown(R)||mxClient.IS_MAC&&R.metaKey};var E=null,L={37:mxConstants.DIRECTION_WEST,38:mxConstants.DIRECTION_NORTH,39:mxConstants.DIRECTION_EAST,40:mxConstants.DIRECTION_SOUTH},T=y.getFunction;mxKeyHandler.prototype.getFunction=function(R){if(p.isEnabled()){if(mxEvent.isShiftDown(R)&&mxEvent.isAltDown(R)){var W=g.actions.get(g.altShiftActions[R.keyCode]);if(null!=W)return W.funct}if(null!=L[R.keyCode]&&!p.isSelectionEmpty())if(!this.isControlDown(R)&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Pa.getAlternateText=function(nb,ub,gb,tb,ob,pb,hb,Ab,Db,Bb,vb,zb,yb){if(null!=pb&&0<this.state.fontSize)try{mxUtils.isNode(pb)?pb=pb.innerText:(eb.innerHTML=pb,pb=mxUtils.extractTextWithWhitespace(eb.childNodes));for(var Cb=Math.ceil(2*tb/this.state.fontSize),c=[],m=0,v=0;(0==Cb||m<Cb)&&v<pb.length;){var n=pb.charCodeAt(v);if(10==n||13==n){if(0<m)break}else c.push(pb.charAt(v)),255>n&&m++;v++}c.length<pb.length&&1<pb.length-c.length&&(pb=mxUtils.trim(c.join(""))+"...");return pb}catch(t){return jb.apply(this, arguments)}else return jb.apply(this,arguments)};var ib=this.backgroundImage;if(null!=ib){x=Sa/J;var mb=this.view.translate;Ra=new mxRectangle((ib.x+mb.x)*x,(ib.y+mb.y)*x,ib.width*x,ib.height*x);mxUtils.intersects(cb,Ra)&&Pa.image(ib.x+mb.x,ib.y+mb.y,ib.width,ib.height,ib.src,!0)}Pa.scale(Y);Pa.textEnabled=oa;wa=null!=wa?wa:this.createSvgImageExport();var wb=wa.drawCellState,xb=wa.getLinkForCellState;wa.getLinkForCellState=function(nb,ub){var gb=xb.apply(this,arguments);return null==gb||nb.view.graph.isCustomLink(gb)?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function Y(){mxEllipse.call(this)}function ea(){mxEllipse.call(this)}function la(){mxRhombus.call(this)}function oa(){mxEllipse.call(this)}function wa(){mxEllipse.call(this)}function sa(){mxEllipse.call(this)}function ua(){mxEllipse.call(this)}function Fa(){mxActor.call(this)}function Ua(){mxActor.call(this)}function Ra(){mxActor.call(this)}function Na(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1;this.rectStyle="square";this.size=10;this.absoluteCornerSize=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
1)};mxCellRenderer.registerShape("flexArrow",Oa);mxUtils.extend(ta,mxActor);ta.prototype.size=30;ta.prototype.isRoundable=function(){return!0};ta.prototype.redrawPath=function(c,m,v,n,t){m=Math.min(t,parseFloat(mxUtils.getValue(this.style,"size",this.size)));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,t),new mxPoint(0,m),new mxPoint(n,0),new mxPoint(n,t)],this.isRounded,v,!0);c.end()};mxCellRenderer.registerShape("manualInput",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxGraphView.prototype.updateFloatingTerminalPoint=function(M,R,W,d){if(null==R||null==M||"1"!=R.style.snapToPoint&&"1"!=M.style.snapToPoint)L.apply(this,arguments);else{R=this.getTerminalPort(M,R,d);var f=this.getNextPoint(M,W,d),k=this.graph.isOrthogonal(M),u=mxUtils.toRadians(Number(R.style[mxConstants.STYLE_ROTATION]||"0")),z=new mxPoint(R.getCenterX(),R.getCenterY());if(0!=u){var C=Math.cos(-u),F=Math.sin(-u);f=mxUtils.getRotatedPoint(f,C,F,z)}C=parseFloat(M.style[mxConstants.STYLE_PERIMETER_SPACING]|| 0);C+=parseFloat(M.style[d?mxConstants.STYLE_SOURCE_PERIMETER_SPACING:mxConstants.STYLE_TARGET_PERIMETER_SPACING]||0);f=this.getPerimeterPoint(R,f,0==u&&k,C);0!=u&&(C=Math.cos(u),F=Math.sin(u),f=mxUtils.getRotatedPoint(f,C,F,z));M.setAbsoluteTerminalPoint(this.snapToAnchorPoint(M,R,W,d,f),d)}};mxGraphView.prototype.snapToAnchorPoint=function(M,R,W,d,f){if(null!=R&&null!=M){M=this.graph.getAllConnectionConstraints(R);d=W=null;if(null!=M)for(var k=0;k<M.length;k++){var u=this.graph.getConnectionPoint(R,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f.isForceRubberbandEvent;f.isForceRubberbandEvent=function(S){return K.apply(this,arguments)||mxClient.IS_CHROMEOS&&mxEvent.isShiftDown(S.getEvent())||mxUtils.hasScrollbars(this.graph.container)&&mxClient.IS_FF&&mxClient.IS_WIN&&null==S.getState()&&mxEvent.isTouchEvent(S.getEvent())};var O=null;this.panningHandler.addListener(mxEvent.PAN_START,mxUtils.bind(this,function(){this.isEnabled()&&(O=this.container.style.cursor,this.container.style.cursor="move")}));this.panningHandler.addListener(mxEvent.PAN_END,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null==E&&(E=T.hasAttribute(L)?null!=T.getAttribute(L)?T.getAttribute(L):"":null)),T=this.model.getParent(T);null==E&&(E=this.getGlobalVariable(L));null==E&&null!=g&&(E=g[L])}p.push(e.substring(y,match.index)+(null!=E?E:q));y=match.index+q.length}}p.push(e.substring(y))}return p.join("")};Graph.prototype.restoreSelection=function(b){if(null!=b&&0<b.length){for(var e=[],g=0;g<b.length;g++){var p=this.model.getCell(b[g].id);null!=p&&e.push(p)}this.setSelectionCells(e)}else this.clearSelection()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
parseFloat(mxUtils.getValue(this.style,"dy",this.dy))));c.begin();c.moveTo(m,v+B);c.lineTo(m+n,v+B);c.end();c.stroke();c.begin();c.moveTo(m+D,v);c.lineTo(m+D,v+t);c.end();c.stroke()};mxCellRenderer.registerShape("internalStorage",Da);mxUtils.extend(Ba,mxActor);Ba.prototype.dx=20;Ba.prototype.dy=20;Ba.prototype.redrawPath=function(c,m,v,n,t){m=Math.max(0,Math.min(n,parseFloat(mxUtils.getValue(this.style,"dx",this.dx))));v=Math.max(0,Math.min(t,parseFloat(mxUtils.getValue(this.style,"dy",this.dy)))); parseFloat(mxUtils.getValue(this.style,"size",this.size));var B=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,0),new mxPoint(n,0),new mxPoint(n,v),new mxPoint(m,v),new mxPoint(m,t),new mxPoint(0,t)],this.isRounded,B,!0);c.end()};mxCellRenderer.registerShape("corner",Ba);mxUtils.extend(ya,mxActor);ya.prototype.redrawPath=function(c,m,v,n,t){c.moveTo(0,0);c.lineTo(0,t);c.end();c.moveTo(n,0);c.lineTo(n,t);c.end();c.moveTo(0,t/2);c.lineTo(n,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
b.view.getState(p[q])&&y.push(p[q]);b.setSelectionCells(y)}};e.addListener(mxEvent.UNDO,g);e.addListener(mxEvent.REDO,g);return e};Editor.prototype.initStencilRegistry=function(){};Editor.prototype.destroy=function(){null!=this.graph&&(this.graph.destroy(),this.graph=null)};OpenFile=function(b){this.consumer=this.producer=null;this.done=b;this.args=null};OpenFile.prototype.setConsumer=function(b){this.consumer=b;this.execute()};OpenFile.prototype.setData=function(){this.args=arguments;this.execute()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null;q.cellEditor.isContentEditing()?document.execCommand("paste",!1,null):E=g.apply(this,arguments);b.updatePasteActionStates();return E};var p=this.editor.graph.cellEditor.startEditing;this.editor.graph.cellEditor.startEditing=function(){p.apply(this,arguments);b.updatePasteActionStates()};var y=this.editor.graph.cellEditor.stopEditing;this.editor.graph.cellEditor.stopEditing=function(q,E){y.apply(this,arguments);b.updatePasteActionStates()};this.updatePasteActionStates()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.state.style[mxConstants.STYLE_ARCSIZE]=Math.round(Math.max(0,Math.min(v.width,2*(v.x+v.width-n.x)))):this.state.style[mxConstants.STYLE_ARCSIZE]=Math.round(Math.min(50,Math.max(0,100*(v.width-n.x+v.x)/Math.min(v.width,v.height))))})},hb=function(c,m,v,n,t,B,D){var ha=new mxHandle(c,null,mxVertexHandler.prototype.secondaryHandleImage);ha.execute=function(va){for(var na=0;na<m.length;na++)this.copyStyle(m[na]);D&&D(va)};ha.getPosition=v;ha.setPosition=n;ha.ignoreGrid=null!=t?t:!0;if(B){var I=ha.positionChanged;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0);m+=B;v+=B;n-=2*B;t-=2*B;0<n&&0<t&&(c.setShadow(!1),ib.apply(this,[c,m,v,n,t]))}};mxUtils.extend(P,mxRectangleShape);P.prototype.isHtmlAllowed=function(){return!1};P.prototype.getLabelBounds=function(c){if(1==this.style["double"]){var m=(Math.max(2,this.strokewidth+1)+parseFloat(this.style[mxConstants.STYLE_MARGIN]||0))*this.scale;return new mxRectangle(c.x+m,c.y+m,c.width-2*m,c.height-2*m)}return c};P.prototype.paintForeground=function(c,m,v,n,t){if(null!=this.style){if(!this.outline&&1==this.style["double"]){var B=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.scale,0,0,0):null};M.prototype.getLabelMargins=function(c){if(mxUtils.getValue(this.style,"boundedLbl",!1)){var m=mxUtils.getValue(this.style,"size",15);return new mxRectangle(0,Math.min(c.height*this.scale,m*this.scale),0,Math.max(0,m*this.scale))}return null};mxUtils.extend(K,mxActor);K.prototype.size=.2;K.prototype.fixedSize=20;K.prototype.isRoundable=function(){return!0};K.prototype.redrawPath=function(c,m,v,n,t){m="0"!=mxUtils.getValue(this.style,"fixedSize","0")?Math.max(0,Math.min(n,parseFloat(mxUtils.getValue(this.style, "size",this.fixedSize)))):n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"size",this.size))));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,t),new mxPoint(m,0),new mxPoint(n,0),new mxPoint(n-m,t)],this.isRounded,v,!0);c.end()};mxCellRenderer.registerShape("parallelogram",K);mxUtils.extend(O,mxActor);O.prototype.size=.2;O.prototype.fixedSize=20;O.prototype.isRoundable=function(){return!0};O.prototype.redrawPath=function(c,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.showImageDialog=function(b,e,g,p){p=this.editor.graph.cellEditor;var y=p.saveSelection(),q=mxUtils.prompt(b,e);p.restoreSelection(y);if(null!=q&&0<q.length){var E=new Image;E.onload=function(){g(q,E.width,E.height)};E.onerror=function(){g(null);mxUtils.alert(mxResources.get("fileNotFound"))};E.src=q}else g(null)};EditorUi.prototype.showLinkDialog=function(b,e,g){b=new LinkDialog(this,b,e,g);this.showDialog(b.container,420,90,!0,!0);b.init()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.addExtFont=function(b,e,g){if(b&&e){"1"!=urlParams["ext-fonts"]&&(Graph.recentCustomFonts[b.toLowerCase()]={name:b,url:e});var p="extFont_"+b;if(null==document.getElementById(p))if(0==e.indexOf(Editor.GOOGLE_FONTS))mxClient.link("stylesheet",e,null,p);else{document.getElementsByTagName("head");var y=document.createElement("style");y.appendChild(document.createTextNode('@font-face {\n\tfont-family: "'+b+'";\n\tsrc: url("'+e+'");\n}'));y.setAttribute("id",p);document.getElementsByTagName("head")[0].appendChild(y)}if(!g){null== this.extFonts&&(this.extFonts=[]);g=this.extFonts;p=!0;for(y=0;y<g.length;y++)if(g[y].name==b){p=!1;break}p&&this.extFonts.push({name:b,url:e})}}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
steps:ja.view.gridSteps,color:ja.view.gridColor});Graph.translateDiagram&&(z.diagramLanguage=Graph.diagramLanguage);return{format:f,from:aa,to:S,allPages:da,bg:null!=C?C:mxConstants.NONE,base64:u,embedXml:H,xml:k,filename:null!=d?d:"",extras:JSON.stringify(z),scale:F,border:K,w:fa&&isFinite(fa)?fa:null,h:ca&&isFinite(ca)?ca:null}};EditorUi.prototype.setMode=function(d,f){this.mode=d};EditorUi.prototype.getDiagramId=function(){var d=window.location.hash;null!=d&&0<d.length&&(d=d.substring(1));if(null!= d&&1<d.length){var f=d.indexOf("#");0<=f&&(d=d.substring(0,f))}return d};EditorUi.prototype.getHashObject=function(){var d=window.location.hash,f={};if(null!=d&&0<d.length){var k=d.lastIndexOf("#");if(0<k){d=decodeURIComponent(d.substring(k+1));try{f=JSON.parse(d)}catch(u){}}}return f};EditorUi.prototype.updateHashObject=function(){if(null!=this.currentFile&&""!=this.currentFile.getHash()&&null!=this.currentPage&&0<this.getSelectedPageIndex()){var d=this.getHashObject();d.pageId=this.currentPage.getId();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(X){d.handleError(X)})},null,null,400,220);d.showDialog(V.container,420,300,!0,!0);V.init()};var k=f.cellEditor.startEditing;f.cellEditor.startEditing=function(P,V){try{var l=this.graph.getAttributeForCell(P,"plantUmlData");if(null!=l)this.editPlantUmlData(P,V,l);else if(l=this.graph.getAttributeForCell(P,"mermaidData"),null!=l)this.editMermaidData(P,V,l);else{var A=f.getCellStyle(P);"1"==mxUtils.getValue(A,"metaEdit","0")?d.showDataDialog(P):k.apply(this,arguments)}}catch(N){d.handleError(N)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
l.prototype.quadTo=function(Z,ba,ia,qa){this.passThrough?this.originalQuadTo.apply(this.canvas,arguments):(this.addOp(this.quadOp,Z,ba,ia,qa),this.lastX=ia,this.lastY=qa)};l.prototype.curveTo=function(Z,ba,ia,qa,ra,pa){this.passThrough?this.originalCurveTo.apply(this.canvas,arguments):(this.addOp(this.curveOp,Z,ba,ia,qa,ra,pa),this.lastX=ra,this.lastY=pa)};l.prototype.arcTo=function(Z,ba,ia,qa,ra,pa,xa){if(this.passThrough)this.originalArcTo.apply(this.canvas,arguments);else{var Ca=mxUtils.arcToCurves(this.lastX, this.lastY,Z,ba,ia,qa,ra,pa,xa);if(null!=Ca)for(var Aa=0;Aa<Ca.length;Aa+=6)this.curveTo(Ca[Aa],Ca[Aa+1],Ca[Aa+2],Ca[Aa+3],Ca[Aa+4],Ca[Aa+5]);this.lastX=pa;this.lastY=xa}};l.prototype.rect=function(Z,ba,ia,qa){this.passThrough?this.originalRect.apply(this.canvas,arguments):(this.path=[],this.nextShape=this.rc.generator.rectangle(Z,ba,ia,qa,this.getStyle(!0,!0)))};l.prototype.ellipse=function(Z,ba,ia,qa){this.passThrough?this.originalEllipse.apply(this.canvas,arguments):(this.path=[],this.nextShape=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxCellRenderer.registerShape("ext",P);mxUtils.extend(V,mxCylinder);V.prototype.redrawPath=function(c,m,v,n,t,B){B?(c.moveTo(0,0),c.lineTo(n/2,t/2),c.lineTo(n,0),c.end()):(c.moveTo(0,0),c.lineTo(n,0),c.lineTo(n,t),c.lineTo(0,t),c.close())};mxCellRenderer.registerShape("message",V);mxUtils.extend(l,mxShape);l.prototype.paintBackground=function(c,m,v,n,t){c.translate(m,v);c.ellipse(n/4,0,n/2,t/4);c.fillAndStroke();c.begin();c.moveTo(n/2,t/4);c.lineTo(n/2,2*t/3);c.moveTo(n/2,t/3);c.lineTo(0,t/3);c.moveTo(n/
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
F.target.result?d(C):(C.push(F.target.result.value),F.target.result.continue())};z.onerror=f}catch(F){null!=f&&f(F)}}),f)};EditorUi.prototype.getDatabaseItemKeys=function(d,f,k){this.openDatabase(mxUtils.bind(this,function(u){try{k=k||"objects";var z=u.transaction([k],"readonly").objectStore(k).getAllKeys();z.onsuccess=function(){d(z.result)};z.onerror=f}catch(C){null!=f&&f(C)}}),f)};EditorUi.prototype.commentsSupported=function(){var d=this.getCurrentFile();return null!=d?d.commentsSupported():!1};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.init=function(){var b=this.editor.graph;if(!b.standalone){"0"!=urlParams["shape-picker"]&&this.installShapePicker();mxEvent.addListener(b.container,"scroll",mxUtils.bind(this,function(){b.tooltipHandler.hide();null!=b.connectionHandler&&null!=b.connectionHandler.constraintHandler&&b.connectionHandler.constraintHandler.reset()}));b.addListener(mxEvent.ESCAPE,mxUtils.bind(this,function(){b.tooltipHandler.hide();var p=b.getRubberband();null!=p&&p.cancel()}));mxEvent.addListener(b.container, "keydown",mxUtils.bind(this,function(p){this.onKeyDown(p)}));mxEvent.addListener(b.container,"keypress",mxUtils.bind(this,function(p){this.onKeyPress(p)}));this.addUndoListener();this.addBeforeUnloadListener();b.getSelectionModel().addListener(mxEvent.CHANGE,mxUtils.bind(this,function(){this.updateActionStates()}));b.getModel().addListener(mxEvent.CHANGE,mxUtils.bind(this,function(){this.updateActionStates()}));var e=b.setDefaultParent,g=this;this.editor.graph.setDefaultParent=function(){e.apply(this, arguments);g.updateActionStates()};b.showLinkDialog=mxUtils.bind(g,g.showLinkDialog);b.editLink=g.actions.get("editLink").funct;this.updateActionStates();this.initClipboard();this.initCanvas();null!=this.format&&this.format.init()}};EditorUi.prototype.clearSelectionState=function(){this.selectionState=null};EditorUi.prototype.getSelectionState=function(){null==this.selectionState&&(this.selectionState=this.createSelectionState());return this.selectionState};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments)};mxCellRenderer.registerShape("process",ca);mxCellRenderer.registerShape("process2",ca);mxUtils.extend(ja,mxRectangleShape);ja.prototype.paintBackground=function(c,m,v,n,t){c.setFillColor(mxConstants.NONE);c.rect(m,v,n,t);c.fill()};ja.prototype.paintForeground=function(c,m,v,n,t){};mxCellRenderer.registerShape("transparent",ja);mxUtils.extend(ma,mxHexagon);ma.prototype.size=30;ma.prototype.position=.5;ma.prototype.position2=.5;ma.prototype.base=20;ma.prototype.getLabelMargins=function(){return new mxRectangle(0, 0,0,parseFloat(mxUtils.getValue(this.style,"size",this.size))*this.scale)};ma.prototype.isRoundable=function(){return!0};ma.prototype.redrawPath=function(c,m,v,n,t){m=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;v=Math.max(0,Math.min(t,parseFloat(mxUtils.getValue(this.style,"size",this.size))));var B=n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"position",this.position)))),D=n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"position2",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
2,t/3);c.lineTo(n,t/3);c.moveTo(n/2,2*t/3);c.lineTo(0,t);c.moveTo(n/2,2*t/3);c.lineTo(n,t);c.end();c.stroke()};mxCellRenderer.registerShape("umlActor",l);mxUtils.extend(A,mxShape);A.prototype.getLabelMargins=function(c){return new mxRectangle(c.width/6,0,0,0)};A.prototype.paintBackground=function(c,m,v,n,t){c.translate(m,v);c.begin();c.moveTo(0,t/4);c.lineTo(0,3*t/4);c.end();c.stroke();c.begin();c.moveTo(0,t/2);c.lineTo(n/6,t/2);c.end();c.stroke();c.ellipse(n/6,0,5*n/6,t);c.fillAndStroke()};mxCellRenderer.registerShape("umlBoundary",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"size",this.fixedSize)))):n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"size",this.size))));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,t),new mxPoint(m,0),new mxPoint(n,0),new mxPoint(n-m,t)],this.isRounded,v,!0);c.end()};mxCellRenderer.registerShape("parallelogram",K);mxUtils.extend(O,mxActor);O.prototype.size=.2;O.prototype.fixedSize=20;O.prototype.isRoundable=function(){return!0};O.prototype.redrawPath=function(c, m,v,n,t){m="0"!=mxUtils.getValue(this.style,"fixedSize","0")?Math.max(0,Math.min(.5*n,parseFloat(mxUtils.getValue(this.style,"size",this.fixedSize)))):n*Math.max(0,Math.min(.5,parseFloat(mxUtils.getValue(this.style,"size",this.size))));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,t),new mxPoint(m,0),new mxPoint(n-m,0),new mxPoint(n,t)],this.isRounded,v,!0)};mxCellRenderer.registerShape("trapezoid",O);mxUtils.extend(H,mxActor);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var X=mxVertexHandler.prototype.getHandlePadding;mxVertexHandler.prototype.getHandlePadding=function(){var x=new mxPoint(0,0),J=this.tolerance,Q=this.state.style.shape;null==mxCellRenderer.defaultShapes[Q]&&mxStencilRegistry.getStencil(Q);Q=this.graph.isTable(this.state.cell)||this.graph.cellEditor.getEditingCell()==this.state.cell;if(!Q&&null!=this.customHandles)for(var Y=0;Y<this.customHandles.length;Y++)if(null!=this.customHandles[Y]&&null!=this.customHandles[Y].shape&&null!=this.customHandles[Y].shape.bounds){var ea= this.customHandles[Y].shape.bounds,la=ea.getCenterX(),oa=ea.getCenterY();if(Math.abs(this.state.x-la)<ea.width/2||Math.abs(this.state.y-oa)<ea.height/2||Math.abs(this.state.x+this.state.width-la)<ea.width/2||Math.abs(this.state.y+this.state.height-oa)<ea.height/2){Q=!0;break}}Q&&null!=this.sizers&&0<this.sizers.length&&null!=this.sizers[0]?(J/=2,this.graph.isTable(this.state.cell)&&(J+=7),x.x=this.sizers[0].bounds.width+J,x.y=this.sizers[0].bounds.height+J):x=X.apply(this,arguments);return x};mxVertexHandler.prototype.updateHint=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
d.nodeName)k=d;else if("mxfile"==d.nodeName){var u=d.getElementsByTagName("diagram");if(0<u.length){k=u[0];var z=f.getGlobalVariable;f.getGlobalVariable=function(C){return"page"==C?k.getAttribute("name")||mxResources.get("pageWithNumber",[1]):"pagenumber"==C?1:z.apply(this,arguments)}}}null!=k&&(d=Editor.parseDiagramNode(k))}u=this.editor.graph;try{this.editor.graph=f,this.editor.setGraphXml(d)}catch(C){}finally{this.editor.graph=u}return d};EditorUi.prototype.getSvgFileProperties=function(d){return this.getPngFileProperties(d)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.prototype.createUndoManager=function(){var b=this.graph,e=new mxUndoManager;this.undoListener=function(p,y){e.undoableEditHappened(y.getProperty("edit"))};var g=mxUtils.bind(this,function(p,y){this.undoListener.apply(this,arguments)});b.getModel().addListener(mxEvent.UNDO,g);b.getView().addListener(mxEvent.UNDO,g);g=function(p,y){p=b.getSelectionCellsForChanges(y.getProperty("edit").changes,function(E){return!(E instanceof mxChildChange)});if(0<p.length){b.getModel();y=[];for(var q=0;q<p.length;q++)null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){try{if(fa>=ka.length)ca();else{var S=ka[fa];StorageFile.getFileContent(this,S,mxUtils.bind(this,function(da){null==da||".scratchpad"==S&&da==this.emptyLibraryXml?K.contentWindow.postMessage(JSON.stringify({action:"remoteInvoke",funtionName:"getLocalStorageFile",functionArgs:[S]}),"*"):ja()}),ja)}}catch(da){console.log(da)}}),aa=mxUtils.bind(this,function(S){try{this.setDatabaseItem(null,[{title:S.title,size:S.data.length,lastModified:Date.now(),type:S.isLib?"L":"F"},{title:S.title,data:S.data}], ja,ja,["filesInfo","files"])}catch(da){console.log(da)}});F=mxUtils.bind(this,function(S){try{if(S.source==K.contentWindow){var da={};try{da=JSON.parse(S.data)}catch(P){}"init"==da.event?(K.contentWindow.postMessage(JSON.stringify({action:"remoteInvokeReady"}),"*"),K.contentWindow.postMessage(JSON.stringify({action:"remoteInvoke",funtionName:"getLocalStorageFileNames"}),"*")):"remoteInvokeResponse"!=da.event||H||(O?null!=da.resp&&0<da.resp.length&&null!=da.resp[0]?(ka=da.resp[0],O=!1,ma()):ca():null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.updateGraphXml(Editor.parseDiagramNode(this.diagrams[this.currentPage])))};this.selectPageById=function(k){k=this.getIndexById(k);var u=0<=k;u&&this.selectPage(k);return u};G=mxUtils.bind(this,function(){if(null==this.xmlNode||"mxfile"!=this.xmlNode.nodeName)this.diagrams=[];this.xmlNode!=R&&(this.diagrams=this.xmlNode.getElementsByTagName("diagram"),R=this.xmlNode)});var W=this.graph.setBackgroundImage;this.graph.setBackgroundImage=function(k){if(null!=k&&Graph.isPageLink(k.src)){var u=k.src,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.getSwimlaneAt=function(b,e,g){var p=mxGraph.prototype.getSwimlaneAt.apply(this,arguments);this.isCellLocked(p)&&(p=null);return p};Graph.prototype.isCellFoldable=function(b){var e=this.getCurrentCellStyle(b);return this.foldingEnabled&&"0"!=mxUtils.getValue(e,mxConstants.STYLE_RESIZABLE,"1")&&("1"==e.treeFolding||!this.isCellLocked(b)&&(this.isContainer(b)&&"0"!=e.collapsible||!this.isContainer(b)&&"1"==e.collapsible))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"50%");x.setAttribute("y","100%");mxUtils.write(x,Graph.foreignObjectWarningText);Q.appendChild(Y);ea.appendChild(x);Q.appendChild(ea);J.appendChild(Q)}};Graph.prototype.updateSvgLinks=function(x,J,Q){x=x.getElementsByTagName("a");for(var Y=0;Y<x.length;Y++)if(null==x[Y].getAttribute("target")){var ea=x[Y].getAttribute("href");null==ea&&(ea=x[Y].getAttribute("xlink:href"));null!=ea&&(null!=J&&/^https?:\/\//.test(ea)?x[Y].setAttribute("target",J):Q&&this.isCustomLink(ea)&&x[Y].setAttribute("href", "javascript:void(0);"))}};Graph.prototype.createSvgCanvas=function(x){x=new mxSvgCanvas2D(x);x.minStrokeWidth=this.cellRenderer.minSvgStrokeWidth;x.pointerEvents=!0;return x};Graph.prototype.getSelectedTextBlocks=function(){function x(oa){if(oa.firstChild)return oa.firstChild;for(;oa;){if(oa.nextSibling)return oa.nextSibling;oa=oa.parentNode}}function J(oa){var wa=oa.startContainer,sa=oa.endContainer;oa=oa.commonAncestorContainer;var ua=[],Fa;for(Fa=wa.parentNode;Fa&&(ua.push(Fa),Fa!=oa);Fa=Fa.parentNode);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
};EditorUi.prototype.getBasenames=function(){var d={};if(null!=this.pages)for(var f=0;f<this.pages.length;f++)this.updatePageRoot(this.pages[f]),this.addBasenamesForCell(this.pages[f].root,d);else this.addBasenamesForCell(this.editor.graph.model.getRoot(),d);f=[];for(var k in d)f.push(k);return f};EditorUi.prototype.addBasenamesForCell=function(d,f){function k(F){if(null!=F){var K=F.lastIndexOf(".");0<K&&(F=F.substring(K+1,F.length));null==f[F]&&(f[F]=!0)}}var u=this.editor.graph,z=u.getCellStyle(d); k(mxStencilRegistry.getBasenameForStencil(z[mxConstants.STYLE_SHAPE]));u.model.isEdge(d)&&(k(mxMarker.getPackageForType(z[mxConstants.STYLE_STARTARROW])),k(mxMarker.getPackageForType(z[mxConstants.STYLE_ENDARROW])));z=u.model.getChildCount(d);for(var C=0;C<z;C++)this.addBasenamesForCell(u.model.getChildAt(d,C),f)};EditorUi.prototype.setGraphEnabled=function(d){this.diagramContainer.style.visibility=d?"":"hidden";this.formatContainer.style.visibility=d?"":"hidden";this.sidebarContainer.style.display=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.saveFile=function(b,e,g,p){};DrawioFile.prototype.getFileUrl=function(){return null};DrawioFile.prototype.getFolderUrl=function(b){return null};DrawioFile.prototype.getPublicUrl=function(b){b(null)};DrawioFile.prototype.isRestricted=function(){return DrawioFile.RESTRICT_EXPORT};DrawioFile.prototype.isModified=function(){return this.modified};DrawioFile.prototype.getShadowModified=function(){return this.shadowModified};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!0:mxCellMarker.prototype.intersects.apply(E,arguments)});return E};mxGraphView.prototype.createBackgroundPageShape=function(E){return new mxRectangleShape(E,"#ffffff",this.graph.defaultPageBorderColor)};mxGraphView.prototype.getBackgroundPageBounds=function(){var E=this.getGraphBounds(),L=0<E.width?E.x/this.scale-this.translate.x:0,T=0<E.height?E.y/this.scale-this.translate.y:0,G=this.graph.pageFormat,M=this.graph.pageScale,R=G.width*M;G=G.height*M;M=Math.floor(Math.min(0,L)/R);var W=Math.floor(Math.min(0, T)/G);return new mxRectangle(this.scale*(this.translate.x+M*R),this.scale*(this.translate.y+W*G),this.scale*(Math.ceil(Math.max(1,L+E.width/this.scale)/R)-M)*R,this.scale*(Math.ceil(Math.max(1,T+E.height/this.scale)/G)-W)*G)};var p=mxGraph.prototype.panGraph;mxGraph.prototype.panGraph=function(E,L){p.apply(this,arguments);this.dialect==mxConstants.DIALECT_SVG||null==this.view.backgroundPageShape||this.useScrollbarsForPanning&&mxUtils.hasScrollbars(this.container)||(this.view.backgroundPageShape.node.style.marginLeft=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.showBackgroundImageDialog=function(b,e){b=null!=b?b:mxUtils.bind(this,function(p){p=new ChangePageSetup(this,null,p);p.ignoreColor=!0;this.editor.graph.model.execute(p)});var g=mxUtils.prompt(mxResources.get("backgroundImage"),null!=e?e.src:"");null!=g&&0<g.length?(e=new Image,e.onload=function(){b(new mxImage(g,e.width,e.height),!1)},e.onerror=function(){b(null,!0);mxUtils.alert(mxResources.get("fileNotFound"))},e.src=g):b(null)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ia=!0;null!=this.style&&(ia="1"==mxUtils.getValue(this.style,mxConstants.STYLE_POINTER_EVENTS,"1"));if(null!=Z.handJiggle&&Z.handJiggle.constructor==l&&!this.outline){Z.save();var qa=this.fill,ra=this.stroke;this.stroke=this.fill=null;var pa=this.configurePointerEvents,xa=Z.setStrokeColor;Z.setStrokeColor=function(){};var Ca=Z.setFillColor;Z.setFillColor=function(){};ia||null==qa||(this.configurePointerEvents=function(){});Z.handJiggle.passThrough=!0;X.apply(this,arguments);Z.handJiggle.passThrough=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!1;Z.setFillColor=Ca;Z.setStrokeColor=xa;this.configurePointerEvents=pa;this.stroke=ra;this.fill=qa;Z.restore();ia&&null!=qa&&(Z.addTolerance=function(){})}X.apply(this,arguments);Z.addTolerance=ba};var U=mxShape.prototype.paintGlassEffect;mxShape.prototype.paintGlassEffect=function(Z,ba,ia,qa,ra,pa){null!=Z.handJiggle&&Z.handJiggle.constructor==l?(Z.handJiggle.passThrough=!0,U.apply(this,arguments),Z.handJiggle.passThrough=!1):U.apply(this,arguments)}})();Editor.fastCompress=function(l){return null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,g){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,g,p,y,q){DrawioFile.call(this,b,e);this.title=g;this.mode=p?null:App.MODE_DEVICE;this.fileHandle=y;this.desc=q};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(x){null!=x.text&&(x.text.replaceLinefeeds="0"!=mxUtils.getValue(x.style,"nl2Br","1"));u.apply(this,arguments)};var z=mxConstraintHandler.prototype.update;mxConstraintHandler.prototype.update=function(x,J){this.isKeepFocusEvent(x)||!mxEvent.isAltDown(x.getEvent())?z.apply(this,arguments):this.reset()};mxGuide.prototype.createGuideShape=function(x){return new mxPolyline([],mxConstants.GUIDE_COLOR,mxConstants.GUIDE_STROKEWIDTH)};mxCellEditor.prototype.escapeCancelsEditing=!1;var C=mxCellEditor.prototype.startEditing;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxCellEditor.prototype.isTextSelected=function(){var x="";window.getSelection?x=window.getSelection():document.getSelection?x=document.getSelection():document.selection&&(x=document.selection.createRange().text);return""!=x};mxCellEditor.prototype.insertTab=function(x){var J=this.textarea.ownerDocument.defaultView.getSelection(),Q=J.getRangeAt(0);x=Graph.createTabNode(x);Q.insertNode(x);Q.setStartAfter(x);Q.setEndAfter(x);J.removeAllRanges();J.addRange(Q)};mxCellEditor.prototype.alignText=function(x, J){var Q=null!=J&&mxEvent.isShiftDown(J);if(Q||null!=window.getSelection&&null!=window.getSelection().containsNode){var Y=!0;this.graph.processElements(this.textarea,function(ea){Q||window.getSelection().containsNode(ea,!0)?(ea.removeAttribute("align"),ea.style.textAlign=null):Y=!1});Y&&this.graph.cellEditor.setAlign(x)}document.execCommand("justify"+x.toLowerCase(),!1,null)};mxCellEditor.prototype.saveSelection=function(){if(window.getSelection){var x=window.getSelection();if(x.getRangeAt&&x.rangeCount){for(var J=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.synchronizeFile=function(b,e){if(this.savingFile)null!=e&&e({message:mxResources.get("busy")});else{var g=!0,p=window.setTimeout(mxUtils.bind(this,function(){g=!1;null!=e&&e({code:App.ERROR_TIMEOUT,message:mxResources.get("timeout"),retry:mxUtils.bind(this,function(){this.synchronizeFile(b,e)})})}),this.ui.timeout),y=mxUtils.bind(this,function(E){g&&(window.clearTimeout(p),null!=e&&e(E))}),q=mxUtils.bind(this,function(){return!g});null!=this.sync?this.sync.fileChanged(mxUtils.bind(this, function(E){g&&(window.clearTimeout(p),this.sync.cleanup(b,e,E))}),y,q):this.updateFile(mxUtils.bind(this,function(){g&&(window.clearTimeout(p),null!=b&&b())}),y,q)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.originalFill.apply(this.canvas,arguments):this.drawPath(this.getStyle(!1,!0))};l.prototype.fillAndStroke=function(){this.passThrough?this.originalFillAndStroke.apply(this.canvas,arguments):this.drawPath(this.getStyle(!0,!0))};l.prototype.destroy=function(){this.canvas.lineTo=this.originalLineTo;this.canvas.moveTo=this.originalMoveTo;this.canvas.close=this.originalClose;this.canvas.quadTo=this.originalQuadTo;this.canvas.curveTo=this.originalCurveTo;this.canvas.arcTo=this.originalArcTo;this.canvas.close= this.originalClose;this.canvas.fill=this.originalFill;this.canvas.stroke=this.originalStroke;this.canvas.fillAndStroke=this.originalFillAndStroke;this.canvas.begin=this.originalBegin;this.canvas.end=this.originalEnd;this.canvas.rect=this.originalRect;this.canvas.ellipse=this.originalEllipse;this.canvas.roundrect=this.originalRoundrect};mxShape.prototype.createRoughCanvas=function(Z){return new l(Z,Editor.createRoughCanvas(Z),this)};var A=mxShape.prototype.createHandJiggle;mxShape.prototype.createHandJiggle=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
M.width/e),g.getElementsByTagName("svg")[0].setAttribute("height",M.height/p))}catch(R){}finally{document.body.removeChild(g)}}b=Editor.createSvgDataUri(mxUtils.getXml(q[0]))}}}catch(R){}return b};Graph.stripQuotes=function(b){null!=b&&("'"==b.charAt(0)&&(b=b.substring(1)),"'"==b.charAt(b.length-1)&&(b=b.substring(0,b.length-1)),'"'==b.charAt(0)&&(b=b.substring(1)),'"'==b.charAt(b.length-1)&&(b=b.substring(0,b.length-1)));return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
b,g);this.replaceDefaultColor(e,mxConstants.STYLE_LABEL_BORDERCOLOR,g,b);this.replaceDefaultColor(e,mxConstants.STYLE_SWIMLANE_FILLCOLOR,b,g);this.replaceDefaultColor(e,mxConstants.STYLE_LABEL_BACKGROUNDCOLOR,b,g)}return e};Graph.prototype.replaceDefaultColor=function(b,e,g,p){null!=b&&"default"==b[e]&&null!=g&&(b[e]=this.getDefaultColor(b,e,g,p))};Graph.prototype.getDefaultColor=function(b,e,g,p){e="default"+e.charAt(0).toUpperCase()+e.substring(1);"invert"==b[e]&&(g=p);return g};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.view.currentRoot:this.model.root;wa.drawState(this.getView().getState(rb),Pa);this.updateSvgLinks(db,sa,!0);this.addForeignObjectWarning(Pa,db);return db}finally{Na&&(this.useCssTransforms=!0,this.view.revalidate(),this.sizeDidChange())}};Graph.prototype.addForeignObjectWarning=function(x,J){if("0"!=urlParams["svg-warning"]&&0<J.getElementsByTagName("foreignObject").length){var Q=x.createElement("switch"),Y=x.createElement("g");Y.setAttribute("requiredFeatures","http://www.w3.org/TR/SVG11/feature#Extensibility"); var ea=x.createElement("a");ea.setAttribute("transform","translate(0,-5)");null==ea.setAttributeNS||J.ownerDocument!=document&&null==document.documentMode?(ea.setAttribute("xlink:href",Graph.foreignObjectWarningLink),ea.setAttribute("target","_blank")):(ea.setAttributeNS(mxConstants.NS_XLINK,"xlink:href",Graph.foreignObjectWarningLink),ea.setAttributeNS(mxConstants.NS_XLINK,"target","_blank"));x=x.createElement("text");x.setAttribute("text-anchor","middle");x.setAttribute("font-size","10px");x.setAttribute("x", "50%");x.setAttribute("y","100%");mxUtils.write(x,Graph.foreignObjectWarningText);Q.appendChild(Y);ea.appendChild(x);Q.appendChild(ea);J.appendChild(Q)}};Graph.prototype.updateSvgLinks=function(x,J,Q){x=x.getElementsByTagName("a");for(var Y=0;Y<x.length;Y++)if(null==x[Y].getAttribute("target")){var ea=x[Y].getAttribute("href");null==ea&&(ea=x[Y].getAttribute("xlink:href"));null!=ea&&(null!=J&&/^https?:\/\//.test(ea)?x[Y].setAttribute("target",J):Q&&this.isCustomLink(ea)&&x[Y].setAttribute("href",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
GraphViewer.getElementsByClassName=function(b){if(document.getElementsByClassName){var e=document.getElementsByClassName(b);b=[];for(var g=0;g<e.length;g++)b.push(e[g]);return b}var p=document.getElementsByTagName("*");e=[];for(g=0;g<p.length;g++){var y=p[g].className;null!=y&&0<y.length&&(y=y.split(" "),0<=mxUtils.indexOf(y,b)&&e.push(p[g]))}return e};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k)};EditorUi.prototype.getDatabaseItem=function(d,f,k,u){this.openDatabase(mxUtils.bind(this,function(z){try{u=u||"objects";var C=z.transaction([u],"readonly").objectStore(u).get(d);C.onsuccess=function(){f(C.result)};C.onerror=k}catch(F){null!=k&&k(F)}}),k)};EditorUi.prototype.getDatabaseItems=function(d,f,k){this.openDatabase(mxUtils.bind(this,function(u){try{k=k||"objects";var z=u.transaction([k],"readonly").objectStore(k).openCursor(IDBKeyRange.lowerBound(0)),C=[];z.onsuccess=function(F){null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D&&"snip"==B||"fold"==D||"default"==D&&"fold"==B)&&c.lineTo(n-ha,t);else c.lineTo(n,t)};Na.prototype.paintBottom=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(0,t):c.lineTo(ha,t)};Na.prototype.paintSW=function(c,m,v,n,t,B,D,ha,I){if(I)if("rounded"==D||"default"==D&&"rounded"==B||"invRound"==D||"default"==D&&"invRound"==B){m=0;if("rounded"==D||"default"==D&&"rounded"==B)m=1;c.arcTo(ha,ha,0,0,m,0,t-ha)}else("snip"==D||"default"==D&&"snip"==B||"fold"==D||"default"== D&&"fold"==B)&&c.lineTo(0,t-ha);else c.lineTo(0,t)};Na.prototype.paintNWInner=function(c,m,v,n,t,B,D,ha,I){if("rounded"==D||"default"==D&&"rounded"==B)c.arcTo(ha-.5*I,ha-.5*I,0,0,0,I,.5*I+ha);else if("invRound"==D||"default"==D&&"invRound"==B)c.arcTo(ha+I,ha+I,0,0,1,I,I+ha);else if("snip"==D||"default"==D&&"snip"==B)c.lineTo(I,.5*I+ha);else if("fold"==D||"default"==D&&"fold"==B)c.lineTo(I+ha,I+ha),c.lineTo(I,I+ha)};Na.prototype.paintTopInner=function(c,m,v,n,t,B,D,ha,I,va,na){va||na?!va&&na?c.lineTo(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor=function(b,e,g,p,y){mxEventSource.call(this);this.chromeless=null!=b?b:this.chromeless;this.initStencilRegistry();this.graph=p||this.createGraph(e,g);this.editable=null!=y?y:!b;this.undoManager=this.createUndoManager();this.status="";this.getOrCreateFilename=function(){return this.filename||mxResources.get("drawing",[Editor.pageCounter])+".xml"};this.getFilename=function(){return this.filename};this.setStatus=function(q,E){this.status=q;this.statusFunction=E;this.fireEvent(new mxEventObject("statusChanged"))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
F.push("nav=1"));k&&null!=this.currentPage&&null!=this.pages&&this.currentPage!=this.pages[0]&&F.push("page-id="+this.currentPage.getId());return F};EditorUi.prototype.createLink=function(d,f,k,u,z,C,F,K,O,H){O=this.createUrlParameters(d,f,k,u,z,C,O);d=this.getCurrentFile();f=!0;null!=F?k="#U"+encodeURIComponent(F):(d=this.getCurrentFile(),K||null==d||d.constructor!=window.DriveFile?k="#R"+encodeURIComponent(k?this.getFileData(!0,null,null,null,null,null,null,!0,null,!1):Graph.compress(mxUtils.getXml(this.editor.getGraphXml()))): (k="#"+d.getHash(),f=!1));f&&null!=d&&null!=d.getTitle()&&d.getTitle()!=this.defaultFilename&&O.push("title="+encodeURIComponent(d.getTitle()));H&&1<k.length&&(O.push("open="+k.substring(1)),k="");return(u&&"1"!=urlParams.dev?EditorUi.lightboxHost:mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||!/.*\.draw\.io$/.test(window.location.hostname)?EditorUi.drawHost:"https://"+window.location.host)+"/"+(0<O.length?"?"+O.join("&"):"")+k};EditorUi.prototype.createHtml=function(d,f,k,u,z,C,F,K,O,H,ka,fa){this.getBasenames();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
GraphViewer.logAncestorFrames()}catch(e){}};GraphViewer.cachedUrls={};GraphViewer.getUrl=function(b,e,g){if(null!=GraphViewer.cachedUrls[b])e(GraphViewer.cachedUrls[b]);else{var p=null!=navigator.userAgent&&0<navigator.userAgent.indexOf("MSIE 9")?new XDomainRequest:new XMLHttpRequest;p.open("GET",b);p.onload=function(){e(null!=p.getText?p.getText():p.responseText)};p.onerror=g;p.send()}};GraphViewer.resizeSensorEnabled=!0;GraphViewer.useResizeObserver=!0;GraphViewer.useResizeSensor=!0;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null==b?(G.style.border="1px solid #c0c0c0",G.style.margin="40px",mxEvent.addListener(document.documentElement,"keydown",q)):(e.style.display="none",g.style.display="none");var M=this;T.getImageFromBundles=function(W){return M.getImageUrl(W)};var R=y.createTemporaryGraph;y.createTemporaryGraph=function(){var W=R.apply(this,arguments);W.getImageFromBundles=function(d){return M.getImageUrl(d)};return W};this.graphConfig.move&&(T.isMoveCellsEvent=function(W){return!0});mxUtils.setPrefixedStyle(G.style,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0)};Na.prototype.paintRight=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(n,t):c.lineTo(n,t-ha)};Na.prototype.paintLeft=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(0,0):c.lineTo(0,ha)};Na.prototype.paintSE=function(c,m,v,n,t,B,D,ha,I){if(I)if("rounded"==D||"default"==D&&"rounded"==B||"invRound"==D||"default"==D&&"invRound"==B){m=0;if("rounded"==D||"default"==D&&"rounded"==B)m=1;c.arcTo(ha,ha,0,0,m,n-ha,t)}else("snip"==D||"default"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!1,V=function(){P||(P=!0,window.setTimeout(function(){var l=y.getSelectedEditingElement();null!=l&&(l=mxUtils.getCurrentStyle(l),null!=l&&null!=p.toolbar&&(p.toolbar.setFontName(Graph.stripQuotes(l.fontFamily)),p.toolbar.setFontSize(parseInt(l.fontSize))));P=!1},0))};mxEvent.addListener(y.cellEditor.textarea,"input",V);mxEvent.addListener(y.cellEditor.textarea,"touchend",V);mxEvent.addListener(y.cellEditor.textarea,"mouseup",V);mxEvent.addListener(y.cellEditor.textarea,"keyup",V);V()}};var ma=y.cellEditor.stopEditing;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
H.prototype.size=.5;H.prototype.redrawPath=function(c,m,v,n,t){c.setFillColor(null);m=n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"size",this.size))));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(n,0),new mxPoint(m,0),new mxPoint(m,t/2),new mxPoint(0,t/2),new mxPoint(m,t/2),new mxPoint(m,t),new mxPoint(n,t)],this.isRounded,v,!1);c.end()};mxCellRenderer.registerShape("curlyBracket",H);mxUtils.extend(ka,mxActor);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
GraphViewer.prototype.crop=function(){var b=this.graph,e=b.getGraphBounds(),g=b.border,p=b.view.scale;b.view.setTranslate(null!=e.x?Math.floor(b.view.translate.x-e.x/p+g):g,null!=e.y?Math.floor(b.view.translate.y-e.y/p+g):g)};GraphViewer.prototype.updateContainerWidth=function(b,e){b.style.width=e+"px"};GraphViewer.prototype.updateContainerHeight=function(b,e){if(this.forceCenter||this.zoomEnabled||!this.autoFit||"BackCompat"==document.compatMode||8==document.documentMode)b.style.height=e+"px"};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
R)R.parentNode.removeChild(R),R=null;else{R=this.graph.createLayersDialog(mxUtils.bind(this,function(){if(this.autoCrop)this.crop();else if(this.autoOrigin){var ja=this.graph.getGraphBounds(),ma=this.graph.view;0>ja.x||0>ja.y?(this.crop(),this.graph.originalViewState=this.graph.initialViewState,this.graph.initialViewState={translate:ma.translate.clone(),scale:ma.scale}):null!=this.graph.originalViewState&&0<ja.x/ma.scale+this.graph.originalViewState.translate.x-ma.translate.x&&0<ja.y/ma.scale+this.graph.originalViewState.translate.y- ma.translate.y&&(ma.setTranslate(this.graph.originalViewState.translate.x,this.graph.originalViewState.translate.y),this.graph.originalViewState=null,this.graph.initialViewState={translate:ma.translate.clone(),scale:ma.scale})}}));mxEvent.addListener(R,"mouseleave",function(){R.parentNode.removeChild(R);R=null});fa=K.getBoundingClientRect();R.style.width="140px";R.style.padding="2px 0px 2px 0px";R.style.border="1px solid #d0d0d0";R.style.backgroundColor="#eee";R.style.fontFamily=Editor.defaultHtmlFont; R.style.fontSize="11px";R.style.overflowY="auto";R.style.maxHeight=this.graph.container.clientHeight-this.toolbarHeight-10+"px";R.style.zIndex=this.toolbarZIndex+1;mxUtils.setOpacity(R,80);var ca=mxUtils.getDocumentScrollOrigin(document);R.style.left=ca.x+fa.left-1+"px";R.style.top=ca.y+fa.bottom-2+"px";document.body.appendChild(R)}}),Editor.layersImage,mxResources.get("layers")||"Layers");F.addListener(mxEvent.CHANGE,function(){K.style.display=1<F.getChildCount(F.root)?"inline-block":"none"});K.style.display=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){T&&b.hideDialog();null!=y&&y()});d.className="geBtn";g.appendChild(d);null!=E&&(p=mxUtils.button(E,function(){T&&b.hideDialog();null!=L&&L()}),p.className="geBtn gePrimaryBtn",g.appendChild(p));this.init=function(){d.focus()};R.appendChild(g);this.container=R},PrintDialog=function(b,e){this.create(b,e)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d){d=Math.floor((new Date-d)/1E3);var f=Math.floor(d/31536E3);if(1<f)return f+" "+mxResources.get("years");f=Math.floor(d/2592E3);if(1<f)return f+" "+mxResources.get("months");f=Math.floor(d/86400);if(1<f)return f+" "+mxResources.get("days");f=Math.floor(d/3600);if(1<f)return f+" "+mxResources.get("hours");f=Math.floor(d/60);return 1<f?f+" "+mxResources.get("minutes"):1==f?f+" "+mxResources.get("minute"):null};EditorUi.prototype.decodeNodeIntoGraph=function(d,f){if(null!=d){var k=null;if("diagram"== d.nodeName)k=d;else if("mxfile"==d.nodeName){var u=d.getElementsByTagName("diagram");if(0<u.length){k=u[0];var z=f.getGlobalVariable;f.getGlobalVariable=function(C){return"page"==C?k.getAttribute("name")||mxResources.get("pageWithNumber",[1]):"pagenumber"==C?1:z.apply(this,arguments)}}}null!=k&&(d=Editor.parseDiagramNode(k))}u=this.editor.graph;try{this.editor.graph=f,this.editor.setGraphXml(d)}catch(C){}finally{this.editor.graph=u}return d};EditorUi.prototype.getSvgFileProperties=function(d){return this.getPngFileProperties(d)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
e.x,b.height+=e.height+e.y),this.fitWindow(b))};Graph.prototype.fitWindow=function(b,e){e=null!=e?e:10;var g=this.container.clientWidth-e,p=this.container.clientHeight-e;this.zoomTo(Math.floor(20*Math.min(g/b.width,p/b.height))/20);if(mxUtils.hasScrollbars(this.container)){var y=this.view.translate;this.container.scrollLeft=(b.x+y.x)*this.view.scale-Math.max((g-b.width*this.view.scale)/2+e/2,0);this.container.scrollTop=(b.y+y.y)*this.view.scale-Math.max((p-b.height*this.view.scale)/2+e/2,0)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"24px",u.innerText="");return u};EditorUi.prototype.createToolbarButton=function(d,f,k,u){u=null!=u?u:24;var z=document.createElement("a");z.className="geToolbarButton geAdaptiveAsset";z.setAttribute("title",f);z.style.backgroundImage="url("+d+")";z.style.backgroundPosition="center center";z.style.backgroundRepeat="no-repeat";z.style.backgroundSize="100% 100%";z.style.display="inline-block";z.style.cursor="pointer";z.style.marginLeft="6px";z.style.width=u+"px";z.style.height=u+"px";null!=k&&(mxEvent.addListener(z, mxClient.IS_POINTER?"pointerdown":"mousedown",mxUtils.bind(this,function(C){C.preventDefault()})),mxEvent.addListener(z,"click",function(C){"disabled"!=z.getAttribute("disabled")&&k(C);mxEvent.consume(C)}));return z};EditorUi.prototype.createMenuItem=function(d,f,k){var u=this.actions.get(d),z=null!=u?u.funct:null,C=this.createToolbarButton(f,mxResources.get(d)+(null!=u&&null!=u.shortcut?" ("+u.shortcut+")":""),z);null==u||k||(d=function(){u.isEnabled()?(C.removeAttribute("disabled"),C.style.cursor=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k)};EditorUi.prototype.getDatabaseItem=function(d,f,k,u){this.openDatabase(mxUtils.bind(this,function(z){try{u=u||"objects";var C=z.transaction([u],"readonly").objectStore(u).get(d);C.onsuccess=function(){f(C.result)};C.onerror=k}catch(F){null!=k&&k(F)}}),k)};EditorUi.prototype.getDatabaseItems=function(d,f,k){this.openDatabase(mxUtils.bind(this,function(u){try{k=k||"objects";var z=u.transaction([k],"readonly").objectStore(k).openCursor(IDBKeyRange.lowerBound(0)),C=[];z.onsuccess=function(F){null== F.target.result?d(C):(C.push(F.target.result.value),F.target.result.continue())};z.onerror=f}catch(F){null!=f&&f(F)}}),f)};EditorUi.prototype.getDatabaseItemKeys=function(d,f,k){this.openDatabase(mxUtils.bind(this,function(u){try{k=k||"objects";var z=u.transaction([k],"readonly").objectStore(k).getAllKeys();z.onsuccess=function(){d(z.result)};z.onerror=f}catch(C){null!=f&&f(C)}}),f)};EditorUi.prototype.commentsSupported=function(){var d=this.getCurrentFile();return null!=d?d.commentsSupported():!1};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.replaceDefaultColors=function(b,e){if(null!=e){b=mxUtils.hex2rgb(this.shapeBackgroundColor);var g=mxUtils.hex2rgb(this.shapeForegroundColor);this.replaceDefaultColor(e,mxConstants.STYLE_FONTCOLOR,g,b);this.replaceDefaultColor(e,mxConstants.STYLE_FILLCOLOR,b,g);this.replaceDefaultColor(e,mxConstants.STYLE_GRADIENTCOLOR,g,b);this.replaceDefaultColor(e,mxConstants.STYLE_STROKECOLOR,g,b);this.replaceDefaultColor(e,mxConstants.STYLE_IMAGE_BORDER,g,b);this.replaceDefaultColor(e,mxConstants.STYLE_IMAGE_BACKGROUND, b,g);this.replaceDefaultColor(e,mxConstants.STYLE_LABEL_BORDERCOLOR,g,b);this.replaceDefaultColor(e,mxConstants.STYLE_SWIMLANE_FILLCOLOR,b,g);this.replaceDefaultColor(e,mxConstants.STYLE_LABEL_BACKGROUNDCOLOR,b,g)}return e};Graph.prototype.replaceDefaultColor=function(b,e,g,p){null!=b&&"default"==b[e]&&null!=g&&(b[e]=this.getDefaultColor(b,e,g,p))};Graph.prototype.getDefaultColor=function(b,e,g,p){e="default"+e.charAt(0).toUpperCase()+e.substring(1);"invert"==b[e]&&(g=p);return g};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0;u^=f}return u};EditorUi.prototype.descriptorChanged=function(){};EditorUi.prototype.restoreLibraries=function(){};EditorUi.prototype.saveLibrary=function(d,f,k,u,z,C,F){};EditorUi.prototype.isScratchpadEnabled=function(){return isLocalStorage||mxClient.IS_CHROMEAPP};EditorUi.prototype.toggleScratchpad=function(){this.isScratchpadEnabled()&&(null==this.scratchpad?StorageFile.getFileContent(this,".scratchpad",mxUtils.bind(this,function(d){null==d&&(d=this.emptyLibraryXml);this.loadLibrary(new StorageLibrary(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D&&"fold"==B)&&c.lineTo(0,t-ha);else c.lineTo(0,t)};Na.prototype.paintNWInner=function(c,m,v,n,t,B,D,ha,I){if("rounded"==D||"default"==D&&"rounded"==B)c.arcTo(ha-.5*I,ha-.5*I,0,0,0,I,.5*I+ha);else if("invRound"==D||"default"==D&&"invRound"==B)c.arcTo(ha+I,ha+I,0,0,1,I,I+ha);else if("snip"==D||"default"==D&&"snip"==B)c.lineTo(I,.5*I+ha);else if("fold"==D||"default"==D&&"fold"==B)c.lineTo(I+ha,I+ha),c.lineTo(I,I+ha)};Na.prototype.paintTopInner=function(c,m,v,n,t,B,D,ha,I,va,na){va||na?!va&&na?c.lineTo(0, I):va&&!na?c.lineTo(I,0):va?"square"==D||"default"==D&&"square"==B?c.lineTo(I,I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.lineTo(ha+.5*I,I):c.lineTo(ha+I,I):c.lineTo(0,I):c.lineTo(0,0)};Na.prototype.paintNEInner=function(c,m,v,n,t,B,D,ha,I){if("rounded"==D||"default"==D&&"rounded"==B)c.arcTo(ha-.5*I,ha-.5*I,0,0,0,n-ha-.5*I,I);else if("invRound"==D||"default"==D&&"invRound"==B)c.arcTo(ha+I,ha+I,0,0,1,n-ha-I,I);else if("snip"==D||"default"==D&&"snip"==B)c.lineTo(n-
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxVertexHandler.prototype.setHandlesVisible=function(aa){ja.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.style.display=aa?"":"none")};var ma=mxVertexHandler.prototype.destroy;mxVertexHandler.prototype.destroy=function(aa,S){ma.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.parentNode.removeChild(this.moveHandle),this.moveHandle=null)}};if("undefined"!==typeof Sidebar){var g=Sidebar.prototype.createAdvancedShapes;Sidebar.prototype.createAdvancedShapes=function(){var p=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.hsplit.style.bottom,this.checkTabScrollerOverflow()):(this.diagramContainer.style.left=k.x+"px",this.diagramContainer.style.right="0")}d&&this.editor.graph.sizeDidChange()}else G.apply(this,arguments)};EditorUi.prototype.createShapesPanel=function(d){var f=mxUtils.bind(this,function(u){u=this.createMenu(u,null,"geTitle");u.style.cssText="position:absolute;border-width:1px;cusor:pointer;border-style:none;height:24px;bottom:0px;text-align:center;padding:8px 6px 0 6px;border-top-style:solid;width:50%;height:32px;box-sizing:border-box;font-size:11px;"; d.appendChild(u);return u});if(Editor.enableCustomLibraries&&("1"!=urlParams.embed||"1"==urlParams.libraries))if(null!=this.actions.get("newLibrary"))f=document.createElement("div"),f.style.cssText="position:absolute;border-width:1px;cusor:pointer;border-style:none;height:24px;bottom:0px;text-align:center;padding:8px 6px 0 6px;border-top-style:solid;width:50%;height:32px;box-sizing:border-box;font-size:11px;",f.className="geTitle",mxUtils.write(f,mxResources.get("newLibrary")),d.appendChild(f),mxEvent.addListener(f, "click",this.actions.get("newLibrary").funct),f=f.cloneNode(!1),f.style.left="50%",f.style.borderLeftStyle="solid",mxUtils.write(f,mxResources.get("openLibrary")),d.appendChild(f),mxEvent.addListener(f,"click",this.actions.get("openLibrary").funct);else{var k=f("newLibrary");k.style.fontSize="11px";k.style.left="0";k=f("openLibraryFrom");k.style.borderLeftStyle="solid";k.style.fontSize="11px";k.style.left="50%"}d.appendChild(this.sidebarContainer);d.style.overflow="hidden"};EditorUi.prototype.createShapesWindow=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null,!0)}else this.graph.openLink(this.getEditBlankUrl(e)+"#R"+encodeURIComponent(b))};Editor.prototype.createGraph=function(b,e){b=new Graph(null,e,null,null,b);b.transparentBackground=!1;var g=b.isCssTransformsSupported,p=this;b.isCssTransformsSupported=function(){return g.apply(this,arguments)&&(!p.chromeless||!mxClient.IS_SF)};this.chromeless||(b.isBlankLink=function(y){return!this.isExternalProtocol(y)});return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(this.editor.graph.isEditing()&&null!=this.editor.graph.cellEditor.textarea?this.editor.graph.cellEditor.textarea.focus():(mxUtils.clearSelection(),this.editor.graph.container.focus()))}),0)))};EditorUi.prototype.ctrlEnter=function(){var b=this.editor.graph;if(b.isEnabled())try{for(var e=b.getSelectionCells(),g=new mxDictionary,p=[],y=0;y<e.length;y++){var q=b.isTableCell(e[y])?b.model.getParent(e[y]):e[y];null==q||g.get(q)||(g.put(q,!0),p.push(q))}b.setSelectionCells(b.duplicateCells(p,!1))}catch(E){this.handleError(E)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.showImageDialog=function(b,e,g,p){p=this.editor.graph.cellEditor;var y=p.saveSelection(),q=mxUtils.prompt(b,e);p.restoreSelection(y);if(null!=q&&0<q.length){var E=new Image;E.onload=function(){g(q,E.width,E.height)};E.onerror=function(){g(null);mxUtils.alert(mxResources.get("fileNotFound"))};E.src=q}else g(null)};EditorUi.prototype.showLinkDialog=function(b,e,g){b=new LinkDialog(this,b,e,g);this.showDialog(b.container,420,90,!0,!0);b.init()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"P"==g.nodeName&&"p1"==g.className&&b.parentNode.insertBefore(b.ownerDocument.createElement("br"),b);b.parentNode.removeChild(b)}e||null==b.innerHTML||(p=Graph.createTabNode(4),b.innerHTML=b.innerHTML.replace(/\t/g,p.outerHTML))}b=g}};Graph.createTabNode=function(b){var e="\t";if(null!=b)for(e="";0<b;)e+=" ",b--;b=document.createElement("span");b.style.whiteSpace="pre";b.appendChild(document.createTextNode(e));return b};Graph.sanitizeHtml=function(b,e){return Graph.domPurify(b,!1)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
S.y,S.width,S.height,null,null,P,null,!0);if(this.isToggleEvent(da))for(P=0;P<S.length;P++)this.selectCellForEvent(S[P],da);else this.selectCellsForEvent(S,da);return S};var ca=this.graphHandler.shouldRemoveCellsFromParent;this.graphHandler.shouldRemoveCellsFromParent=function(S,da,P){return this.graph.isCellSelected(S)?!1:ca.apply(this,arguments)};var ja=this.updateMouseEvent;this.updateMouseEvent=function(S){S=ja.apply(this,arguments);null!=S.state&&this.isCellLocked(this.getLayerForCell(S.getCell()))&& (S.state=null);return S};var ma=this.isCellSelectable;this.isCellSelectable=function(S){return ma.apply(this,arguments)&&!this.isCellLocked(this.getLayerForCell(S))};this.isCellLocked=function(S){for(;null!=S;){if("1"==mxUtils.getValue(this.getCurrentCellStyle(S),"locked","0"))return!0;S=this.model.getParent(S)}return!1};var aa=null;this.addListener(mxEvent.FIRE_MOUSE_EVENT,mxUtils.bind(this,function(S,da){"mouseDown"==da.getProperty("eventName")&&(S=da.getProperty("event").getState(),aa=null==S||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
C)}else if("view"==d.nodeName){if(d.hasAttribute("scale")&&(z.view.scale=parseFloat(d.getAttribute("scale"))),d.hasAttribute("dx")||d.hasAttribute("dy"))z.view.translate=new mxPoint(parseFloat(d.getAttribute("dx")||0),parseFloat(d.getAttribute("dy")||0))}else"fit"==d.nodeName&&(F=d.hasAttribute("max-scale")?parseFloat(d.getAttribute("max-scale")):1);d=d.nextSibling}}finally{C.endUpdate()}null!=F&&this.chromelessResize&&this.chromelessResize(!0,F)}return k};EditorUi.prototype.getCopyFilename=function(d, f){var k=null!=d&&null!=d.getTitle()?d.getTitle():this.defaultFilename;d="";var u=k.lastIndexOf(".");0<=u&&(d=k.substring(u),k=k.substring(0,u));if(f){f=k;var z=new Date;k=z.getFullYear();u=z.getMonth()+1;var C=z.getDate(),F=z.getHours(),K=z.getMinutes();z=z.getSeconds();k=f+(" "+(k+"-"+u+"-"+C+"-"+F+"-"+K+"-"+z))}return k=mxResources.get("copyOf",[k])+d};EditorUi.prototype.fileLoaded=function(d,f,k){var u=this.getCurrentFile();this.fileEditable=this.fileLoadedError=null;this.setCurrentFile(null);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var d=this,f=d.editor.graph,k=f.getModel(),u=d.menus.createPopupMenu;d.menus.createPopupMenu=function(aa,S,da){u.apply(this,arguments);if(1==f.getSelectionCount()){S=f.getSelectionCell();var P=f.getOutgoingTreeEdges(S);aa.addSeparator();0<P.length&&(p(f.getSelectionCell())&&this.addMenuItems(aa,["selectChildren"],null,da),this.addMenuItems(aa,["selectDescendants"],null,da));p(f.getSelectionCell())?(aa.addSeparator(),0<f.getIncomingTreeEdges(S).length&&this.addMenuItems(aa,["selectSiblings","selectParent"], null,da)):0<f.model.getEdgeCount(S)&&this.addMenuItems(aa,["selectConnections"],null,da)}};d.actions.addAction("selectChildren",function(aa){if(f.isEnabled()&&1==f.getSelectionCount()){var S=f.getSelectionCell();aa=mxEvent.isControlDown(aa)?null:f.getOutgoingTreeEdges(S);if(null!=aa&&0<aa.length){S=[];for(var da=0;da<aa.length;da++)S.push(f.model.getTerminal(aa[da],!1));f.setSelectionCells(S)}else f.setSelectionCells(f.model.getChildren(S))}},null,null,"Alt+Shift+C");d.actions.addAction("selectDescendants",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!0;this.indent=2;this.rectOutline="single"}function Za(){mxConnector.call(this)}function cb(c,m,v,n,t,B,D,ha,I,va){D+=I;var na=n.clone();n.x-=t*(2*D+I);n.y-=B*(2*D+I);t*=D+I;B*=D+I;return function(){c.ellipse(na.x-t-D,na.y-B-D,2*D,2*D);va?c.fillAndStroke():c.stroke()}}mxUtils.extend(b,mxShape);b.prototype.updateBoundsFromLine=function(){var c=null;if(null!=this.line)for(var m=0;m<this.line.length;m++){var v=this.line[m];null!=v&&(v=new mxRectangle(v.x,v.y,this.strokewidth,this.strokewidth),null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
GraphViewer.createViewerForElement=function(b,e){var g=b.getAttribute("data-mxgraph");if(null!=g){var p=JSON.parse(g),y=function(q){q=mxUtils.parseXml(q);q=new GraphViewer(b,q.documentElement,p);null!=e&&e(q)};null!=p.url?GraphViewer.getUrl(p.url,function(q){y(q)}):y(p.xml)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
c.end();c.stroke()};mxCellRenderer.registerShape("requiredInterface",ra);mxUtils.extend(pa,mxShape);pa.prototype.inset=2;pa.prototype.paintBackground=function(c,m,v,n,t){var B=parseFloat(mxUtils.getValue(this.style,"inset",this.inset))+this.strokewidth;c.translate(m,v);c.ellipse(0,B,n-2*B,t-2*B);c.fillAndStroke();c.begin();c.moveTo(n/2,0);c.quadTo(n,0,n,t/2);c.quadTo(n,t,n/2,t);c.end();c.stroke()};mxCellRenderer.registerShape("providedRequiredInterface",pa);mxUtils.extend(xa,mxCylinder);xa.prototype.jettyWidth=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"fillPath"===X.type&&U.filled?N.fill():N.stroke()};return A};(function(){function l(Z,ba,ia){this.canvas=Z;this.rc=ba;this.shape=ia;this.canvas.setLineJoin("round");this.canvas.setLineCap("round");this.originalBegin=this.canvas.begin;this.canvas.begin=mxUtils.bind(this,l.prototype.begin);this.originalEnd=this.canvas.end;this.canvas.end=mxUtils.bind(this,l.prototype.end);this.originalRect=this.canvas.rect;this.canvas.rect=mxUtils.bind(this,l.prototype.rect);this.originalRoundrect=this.canvas.roundrect; this.canvas.roundrect=mxUtils.bind(this,l.prototype.roundrect);this.originalEllipse=this.canvas.ellipse;this.canvas.ellipse=mxUtils.bind(this,l.prototype.ellipse);this.originalLineTo=this.canvas.lineTo;this.canvas.lineTo=mxUtils.bind(this,l.prototype.lineTo);this.originalMoveTo=this.canvas.moveTo;this.canvas.moveTo=mxUtils.bind(this,l.prototype.moveTo);this.originalQuadTo=this.canvas.quadTo;this.canvas.quadTo=mxUtils.bind(this,l.prototype.quadTo);this.originalCurveTo=this.canvas.curveTo;this.canvas.curveTo= mxUtils.bind(this,l.prototype.curveTo);this.originalArcTo=this.canvas.arcTo;this.canvas.arcTo=mxUtils.bind(this,l.prototype.arcTo);this.originalClose=this.canvas.close;this.canvas.close=mxUtils.bind(this,l.prototype.close);this.originalFill=this.canvas.fill;this.canvas.fill=mxUtils.bind(this,l.prototype.fill);this.originalStroke=this.canvas.stroke;this.canvas.stroke=mxUtils.bind(this,l.prototype.stroke);this.originalFillAndStroke=this.canvas.fillAndStroke;this.canvas.fillAndStroke=mxUtils.bind(this, l.prototype.fillAndStroke);this.path=[];this.passThrough=!1}l.prototype.moveOp="M";l.prototype.lineOp="L";l.prototype.quadOp="Q";l.prototype.curveOp="C";l.prototype.closeOp="Z";l.prototype.getStyle=function(Z,ba){var ia=1;if(null!=this.shape.state){var qa=this.shape.state.cell.id;if(null!=qa)for(var ra=0;ra<qa.length;ra++)ia=(ia<<5)-ia+qa.charCodeAt(ra)<<0}ia={strokeWidth:this.canvas.state.strokeWidth,seed:ia,preserveVertices:!0};qa=this.rc.getDefaultOptions();ia.stroke=Z?this.canvas.state.strokeColor===
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){if(null==this.sidebarWindow){var d=Math.min(this.diagramContainer.parentNode.clientWidth-10,218),f="1"==urlParams.embedInline?650:Math.min(this.diagramContainer.parentNode.clientHeight,650),k="simple"==Editor.currentTheme||"sketch"==Editor.currentTheme;this.sidebarWindow=new WrapperWindow(this,mxResources.get("shapes"),k&&"1"!=urlParams.embedInline?66:10,k&&"1"!=urlParams.embedInline?Math.max(30,(this.diagramContainer.parentNode.clientHeight-f)/2):56,d-6,f-6,mxUtils.bind(this,function(u){this.createShapesPanel(u)})); this.sidebarWindow.window.addListener(mxEvent.SHOW,mxUtils.bind(this,function(){this.sidebarWindow.window.fit()}));this.sidebarWindow.window.minimumSize=new mxRectangle(0,0,90,90);this.sidebarWindow.window.setVisible(!1)}};EditorUi.prototype.setSketchMode=function(d){this.spinner.spin(document.body,mxResources.get("working")+"...")&&window.setTimeout(mxUtils.bind(this,function(){this.spinner.stop();this.doSetSketchMode(d);null==urlParams.rough&&(mxSettings.settings.sketchMode=d,mxSettings.save());
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.bbox&&mxUtils.contains(this.bbox,p.getGraphX(),p.getGraphY())?(this.setDisplay(""),this.repaint()):mxEvent.isTouchEvent(g)||this.reset();e=!1;this.resetActiveArrow()})})};HoverIcons.prototype.isResetEvent=function(b,e){return mxEvent.isAltDown(b)||null==this.activeArrow&&mxEvent.isShiftDown(b)||mxEvent.isPopupTrigger(b)&&!this.graph.isCloneEvent(b)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0,La,$a),Ea.fillStyle=ta,Ea.fill());1!=ia&&Ea.scale(ia,ia);if(za){var Ka=xa.view,x=Ka.scale;Ka.scale=1;var J=btoa(unescape(encodeURIComponent(Ka.createSvgGrid(Ka.gridColor))));Ka.scale=x;J="data:image/svg+xml;base64,"+J;var Q=xa.gridSize*Ka.gridSteps*ia,Y=xa.getGraphBounds(),ea=Ka.translate.x*x,la=Ka.translate.y*x,oa=ea+(Y.x-ea)/x-Ca,wa=la+(Y.y-la)/x-Ca,sa=new Image;sa.onload=function(){try{for(var ua=-Math.round(Q-mxUtils.mod((ea-oa)*ia,Q)),Fa=-Math.round(Q-mxUtils.mod((la-wa)*ia,Q));ua<La;ua+=Q)for(var Ua= Fa;Ua<$a;Ua+=Q)Ea.drawImage(sa,ua/ia,Ua/ia);Va()}catch(Ra){null!=U&&U(Ra)}};sa.onerror=function(ua){null!=U&&U(ua)};sa.src=J}else Va()}catch(ua){null!=U&&U(ua)}});Ba.onerror=function(Va){null!=U&&U(Va)};ra&&this.graph.addSvgShadow(Da);this.graph.mathEnabled&&this.addMathCss(Da);var ya=mxUtils.bind(this,function(){try{null!=this.resolvedFontCss&&this.addFontCss(Da,this.resolvedFontCss),Ba.src=Editor.createSvgDataUri(mxUtils.getXml(Da))}catch(Va){null!=U&&U(Va)}});this.embedExtFonts(mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
2/this.view.scale-this.view.translate.x-x.width/2)),this.snap(Math.round(this.container.clientHeight/2/this.view.scale-this.view.translate.y-x.height/2)))};Graph.prototype.isMouseInsertPoint=function(){return!1};Graph.prototype.addText=function(x,J,Q){var Y=new mxCell;Y.value="Text";Y.geometry=new mxGeometry(0,0,0,0);Y.vertex=!0;if(null!=Q&&this.model.isEdge(Q.cell)){Y.style="edgeLabel;html=1;align=center;verticalAlign=middle;resizable=0;points=[];";Y.geometry.relative=!0;Y.connectable=!1;var ea=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
J){var Q=this.graph.getModel(),Y=Q.getParent(this.state.cell),ea=this.graph.getCellGeometry(this.state.cell);(this.getHandleForEvent(J)==mxEvent.ROTATION_HANDLE||!Q.isEdge(Y)||null==ea||!ea.relative||null==this.state||2<=this.state.width||2<=this.state.height)&&Qa.apply(this,arguments)};mxVertexHandler.prototype.rotateClick=function(){var x=mxUtils.getValue(this.state.style,mxConstants.STYLE_STROKECOLOR,mxConstants.NONE),J=mxUtils.getValue(this.state.style,mxConstants.STYLE_FILLCOLOR,mxConstants.NONE); this.state.view.graph.model.isVertex(this.state.cell)&&x==mxConstants.NONE&&J==mxConstants.NONE?(x=mxUtils.mod(mxUtils.getValue(this.state.style,mxConstants.STYLE_ROTATION,0)+90,360),this.state.view.graph.setCellStyles(mxConstants.STYLE_ROTATION,x,[this.state.cell])):this.state.view.graph.turnShapes([this.state.cell])};var Oa=mxVertexHandler.prototype.mouseMove;mxVertexHandler.prototype.mouseMove=function(x,J){Oa.apply(this,arguments);null!=this.graph.graphHandler.first&&(null!=this.rotationShape&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
n)/c.view.scale-v})},wb=function(c,m,v,n,t){return hb(c,m,function(B){var D=c.absolutePoints;if(null!=D&&0<D.length){var ha=D.length-1;B=c.view.translate;var I=c.view.scale,va=v?D[0]:D[ha];D=v?D[1]:D[ha-1];ha=D.x-va.x;var na=D.y-va.y,bb=Math.sqrt(ha*ha+na*na);va=n.call(this,bb,ha/bb,na/bb,va,D);return new mxPoint(va.x/I-B.x,va.y/I-B.y)}return null},function(B,D,ha){var I=c.absolutePoints,va=I.length-1;B=c.view.translate;var na=c.view.scale,bb=v?I[0]:I[va];I=v?I[1]:I[va-1];va=I.x-bb.x;var qb=I.y-bb.y, fb=Math.sqrt(va*va+qb*qb);D.x=(D.x+B.x)*na;D.y=(D.y+B.y)*na;t.call(this,fb,va/fb,qb/fb,bb,I,D,ha)})},xb=function(c,m){return function(v){return[wb(v,["startWidth"],!0,function(n,t,B,D,ha){ha=mxUtils.getNumber(v.style,"startWidth",c)*v.view.scale+m;return new mxPoint(D.x+t*n/4+B*ha/2,D.y+B*n/4-t*ha/2)},function(n,t,B,D,ha,I){n=Math.sqrt(mxUtils.ptSegDistSq(D.x,D.y,ha.x,ha.y,I.x,I.y));v.style.startWidth=Math.round(2*n)/v.view.scale-m})]}},rb=function(c){return function(m){return[hb(m,["arrowWidth",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function X(){mxShape.call(this)}function U(){mxShape.call(this)}function Z(){mxRectangleShape.call(this)}function ba(){mxShape.call(this)}function ia(){mxShape.call(this)}function qa(){mxShape.call(this)}function ra(){mxShape.call(this)}function pa(){mxShape.call(this)}function xa(){mxCylinder.call(this)}function Ca(){mxCylinder.call(this)}function Aa(){mxRectangleShape.call(this)}function za(){mxDoubleEllipse.call(this)}function Ma(){mxDoubleEllipse.call(this)}function Qa(){mxArrowConnector.call(this);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d,f,k,u,z,C,F,K){EditorUi.logEvent("SHOULD NOT BE CALLED: loadUrl");return this.editor.loadUrl(d,f,k,u,z,C,F,K)};EditorUi.prototype.loadFonts=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: loadFonts");return this.editor.loadFonts(d)};EditorUi.prototype.createSvgDataUri=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: createSvgDataUri");return Editor.createSvgDataUri(d)};EditorUi.prototype.embedCssFonts=function(d,f){EditorUi.logEvent("SHOULD NOT BE CALLED: embedCssFonts");return this.editor.embedCssFonts(d, f)};EditorUi.prototype.embedExtFonts=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: embedExtFonts");return this.editor.embedExtFonts(d)};EditorUi.prototype.exportToCanvas=function(d,f,k,u,z,C,F,K,O,H,ka,fa,ca,ja,ma,aa){EditorUi.logEvent("SHOULD NOT BE CALLED: exportToCanvas");return this.editor.exportToCanvas(d,f,k,u,z,C,F,K,O,H,ka,fa,ca,ja,ma,aa)};EditorUi.prototype.createImageUrlConverter=function(){EditorUi.logEvent("SHOULD NOT BE CALLED: createImageUrlConverter");return this.editor.createImageUrlConverter()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,g){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,g,p,y,q){DrawioFile.call(this,b,e);this.title=g;this.mode=p?null:App.MODE_DEVICE;this.fileHandle=y;this.desc=q};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
y.editor.graph.shadowId="lightboxDropShadow";Graph.prototype.shadowId=p;y.refresh=function(){};var q=mxUtils.bind(this,function(W){27==W.keyCode&&y.destroy()}),E=this.initialOverflow,L=y.destroy;y.destroy=function(){null==b&&(mxEvent.removeListener(document.documentElement,"keydown",q),document.body.removeChild(e),document.body.removeChild(g),document.body.style.overflow=E,GraphViewer.resizeSensorEnabled=!0,L.apply(this,arguments))};var T=y.editor.graph,G=T.container;G.style.overflow="hidden";this.lightboxChrome&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
N=this.graph.getPageLayout(),X=0;X<N.width;X++)da.push(new mxRectangle(((N.x+X)*l+V.x)*A,(N.y*P+V.y)*A,l*A,P*A));for(X=1;X<N.height;X++)da.push(new mxRectangle((N.x*l+V.x)*A,((N.y+X)*P+V.y)*A,l*A,P*A));S=da.concat(S)}return S};mxDragSource.prototype.dragElementZIndex=mxPopupMenu.prototype.zIndex;mxGuide.prototype.getGuideColor=function(S,da){return null==S.cell?"#ffa500":mxConstants.GUIDE_COLOR};this.graphHandler.createPreviewShape=function(S){this.previewColor="#000000"==this.graph.background?"#ffffff":
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.createEdgeWipeAnimation=function(b,e){var g=b.absolutePoints.slice(),p=b.segments,y=b.length,q=g.length;return{execute:mxUtils.bind(this,function(E,L){if(null!=b.shape){var T=[g[0]];L=E/L;e||(L=1-L);for(var G=y*L,M=1;M<q;M++)if(G<=p[M-1]){T.push(new mxPoint(g[M-1].x+(g[M].x-g[M-1].x)*G/p[M-1],g[M-1].y+(g[M].y-g[M-1].y)*G/p[M-1]));break}else G-=p[M-1],T.push(g[M]);b.shape.points=T;b.shape.redraw();0==E&&Graph.setOpacityForNodes(this.getNodesForCells([b.cell]),1);null!=b.text&&null!= b.text.node&&(b.text.node.style.opacity=L)}}),stop:mxUtils.bind(this,function(){null!=b.shape&&(b.shape.points=g,b.shape.redraw(),null!=b.text&&null!=b.text.node&&(b.text.node.style.opacity=""),Graph.setOpacityForNodes(this.getNodesForCells([b.cell]),e?1:0))})}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"_blank")}};EditorUi.prototype.createEchoRequest=function(d,f,k,u,z,C){d="xml="+encodeURIComponent(d);return new mxXmlRequest(SAVE_URL,d+(null!=k?"&mime="+k:"")+(null!=z?"&format="+z:"")+(null!=C?"&base64="+C:"")+(null!=f?"&filename="+encodeURIComponent(f):"")+(u?"&binary=1":""))};EditorUi.prototype.base64ToBlob=function(d,f){f=f||"";d=atob(d);for(var k=d.length,u=Math.ceil(k/1024),z=Array(u),C=0;C<u;++C){for(var F=1024*C,K=Math.min(F+1024,k),O=Array(K-F),H=0;F<K;++H,++F)O[H]=d[F].charCodeAt(0);z[C]= new Uint8Array(O)}return new Blob(z,{type:f})};EditorUi.prototype.saveLocalFile=function(d,f,k,u,z,C,F,K){C=null!=C?C:!1;F=null!=F?F:"vsdx"!=z&&(!mxClient.IS_IOS||!navigator.standalone);z=this.getServiceCount(C);isLocalStorage&&z++;var O=4>=z?2:6<z?4:3;f=new CreateDialog(this,f,mxUtils.bind(this,function(H,ka){try{if("_blank"==ka)if(null!=k&&"image/"==k.substring(0,6))this.openInNewWindow(d,k,u);else if(null!=k&&"text/html"==k.substring(0,9)){var fa=new EmbedDialog(this,d);this.showDialog(fa.container,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ta);mxUtils.extend(Da,mxRectangleShape);Da.prototype.dx=20;Da.prototype.dy=20;Da.prototype.isHtmlAllowed=function(){return!1};Da.prototype.paintForeground=function(c,m,v,n,t){mxRectangleShape.prototype.paintForeground.apply(this,arguments);var B=0;if(this.isRounded){var D=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,100*mxConstants.RECTANGLE_ROUNDING_FACTOR)/100;B=Math.max(B,Math.min(n*D,t*D))}D=Math.max(B,Math.min(n,parseFloat(mxUtils.getValue(this.style,"dx",this.dx))));B=Math.max(B,Math.min(t, parseFloat(mxUtils.getValue(this.style,"dy",this.dy))));c.begin();c.moveTo(m,v+B);c.lineTo(m+n,v+B);c.end();c.stroke();c.begin();c.moveTo(m+D,v);c.lineTo(m+D,v+t);c.end();c.stroke()};mxCellRenderer.registerShape("internalStorage",Da);mxUtils.extend(Ba,mxActor);Ba.prototype.dx=20;Ba.prototype.dy=20;Ba.prototype.redrawPath=function(c,m,v,n,t){m=Math.max(0,Math.min(n,parseFloat(mxUtils.getValue(this.style,"dx",this.dx))));v=Math.max(0,Math.min(t,parseFloat(mxUtils.getValue(this.style,"dy",this.dy))));
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.initCanvas=function(){var b=this.editor.graph;b.timerAutoScroll=!0;b.getPagePadding=function(){return new mxPoint(Math.max(0,Math.round((b.container.offsetWidth-34)/b.view.scale)),Math.max(0,Math.round((b.container.offsetHeight-34)/b.view.scale)))};b.view.getBackgroundPageBounds=function(){var A=this.graph.getPageLayout(),N=this.graph.getPageSize();return new mxRectangle(this.scale*(this.translate.x+A.x*N.width),this.scale*(this.translate.y+A.y*N.height),this.scale*A.width*N.width,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable