code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
d.pages&&1<d.pages.length?470:390,!0,!0)};this.defaultFilename=mxResources.get("untitledDiagram");var ka=f.getExportVariables;f.getExportVariables=function(){var P=ka.apply(this,arguments),V=d.getCurrentFile();null!=V&&(P.filename=V.getTitle());P.pagecount=null!=d.pages?d.pages.length:1;P.page=null!=d.currentPage?d.currentPage.getName():"";P.pagenumber=null!=d.pages&&null!=d.currentPage?mxUtils.indexOf(d.pages,d.currentPage)+1:1;return P};var fa=f.getGlobalVariable;f.getGlobalVariable=function(P){var V=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
b.view.getState(p[q])&&y.push(p[q]);b.setSelectionCells(y)}};e.addListener(mxEvent.UNDO,g);e.addListener(mxEvent.REDO,g);return e};Editor.prototype.initStencilRegistry=function(){};Editor.prototype.destroy=function(){null!=this.graph&&(this.graph.destroy(),this.graph=null)};OpenFile=function(b){this.consumer=this.producer=null;this.done=b;this.args=null};OpenFile.prototype.setConsumer=function(b){this.consumer=b;this.execute()};OpenFile.prototype.setData=function(){this.args=arguments;this.execute()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
B,v),c.lineTo(m+n-B,v),c.quadTo(m+n,v,m+n,v+B),c.lineTo(m+n,v+t-B),c.quadTo(m+n,v+t,m+n-B,v+t),c.lineTo(m+B,v+t),c.quadTo(m,v+t,m,v+t-B),c.lineTo(m,v+B),c.quadTo(m,v,m+B,v)):(c.moveTo(m,v),c.lineTo(m+n,v),c.lineTo(m+n,v+t),c.lineTo(m,v+t),c.lineTo(m,v)),c.close(),c.end(),c.fillAndStroke()}};mxUtils.extend(ca,mxRectangleShape);ca.prototype.size=.1;ca.prototype.fixedSize=!1;ca.prototype.isHtmlAllowed=function(){return!1};ca.prototype.getLabelBounds=function(c){if(mxUtils.getValue(this.state.style,mxConstants.STYLE_HORIZONTAL, !0)==(null==this.direction||this.direction==mxConstants.DIRECTION_EAST||this.direction==mxConstants.DIRECTION_WEST)){var m=c.width,v=c.height;c=new mxRectangle(c.x,c.y,m,v);var n=m*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"size",this.size))));if(this.isRounded){var t=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,100*mxConstants.RECTANGLE_ROUNDING_FACTOR)/100;n=Math.max(n,Math.min(m*t,v*t))}c.x+=Math.round(n);c.width-=Math.round(2*n);return c}return c};ca.prototype.paintForeground=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.br(d);return{getColor:function(){return C},getTarget:function(){return u.value},focus:function(){u.focus()}}};EditorUi.prototype.createUrlParameters=function(d,f,k,u,z,C,F){F=null!=F?F:[];u&&("https://viewer.diagrams.net"==EditorUi.lightboxHost&&"1"!=urlParams.dev||F.push("lightbox=1"),"auto"!=d&&F.push("target="+d),null!=f&&f!=mxConstants.NONE&&F.push("highlight="+("#"==f.charAt(0)?f.substring(1):f)),null!=z&&0<z.length&&F.push("edit="+encodeURIComponent(z)),C&&F.push("layers=1"),this.editor.graph.foldingEnabled&& F.push("nav=1"));k&&null!=this.currentPage&&null!=this.pages&&this.currentPage!=this.pages[0]&&F.push("page-id="+this.currentPage.getId());return F};EditorUi.prototype.createLink=function(d,f,k,u,z,C,F,K,O,H){O=this.createUrlParameters(d,f,k,u,z,C,O);d=this.getCurrentFile();f=!0;null!=F?k="#U"+encodeURIComponent(F):(d=this.getCurrentFile(),K||null==d||d.constructor!=window.DriveFile?k="#R"+encodeURIComponent(k?this.getFileData(!0,null,null,null,null,null,null,!0,null,!1):Graph.compress(mxUtils.getXml(this.editor.getGraphXml()))):
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(G){return this.isTreeEdge(G)}))};Graph.prototype.getIncomingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function p(aa){return k.isVertex(aa)&&q(aa)}function y(aa){var S=!1;null!=aa&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.bind(this,function(fa){q(100)}));mxEvent.addListener(e,"mousemove",mxUtils.bind(this,function(fa){q(100);mxEvent.consume(fa)}));mxEvent.addListener(e,"mouseleave",mxUtils.bind(this,function(fa){mxEvent.isTouchEvent(fa)||q(30)}));var E=this.graph,L=E.getTolerance();E.addMouseListener({startX:0,startY:0,scrollLeft:0,scrollTop:0,mouseDown:function(fa,ca){this.startX=ca.getGraphX();this.startY=ca.getGraphY();this.scrollLeft=E.container.scrollLeft;this.scrollTop=E.container.scrollTop},mouseMove:function(fa,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
b.view.getState(p[q])&&y.push(p[q]);b.setSelectionCells(y)}};e.addListener(mxEvent.UNDO,g);e.addListener(mxEvent.REDO,g);return e};Editor.prototype.initStencilRegistry=function(){};Editor.prototype.destroy=function(){null!=this.graph&&(this.graph.destroy(),this.graph=null)};OpenFile=function(b){this.consumer=this.producer=null;this.done=b;this.args=null};OpenFile.prototype.setConsumer=function(b){this.consumer=b;this.execute()};OpenFile.prototype.setData=function(){this.args=arguments;this.execute()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
N=this.graph.getPageLayout(),X=0;X<N.width;X++)da.push(new mxRectangle(((N.x+X)*l+V.x)*A,(N.y*P+V.y)*A,l*A,P*A));for(X=1;X<N.height;X++)da.push(new mxRectangle((N.x*l+V.x)*A,((N.y+X)*P+V.y)*A,l*A,P*A));S=da.concat(S)}return S};mxDragSource.prototype.dragElementZIndex=mxPopupMenu.prototype.zIndex;mxGuide.prototype.getGuideColor=function(S,da){return null==S.cell?"#ffa500":mxConstants.GUIDE_COLOR};this.graphHandler.createPreviewShape=function(S){this.previewColor="#000000"==this.graph.background?"#ffffff": mxGraphHandler.prototype.previewColor;return mxGraphHandler.prototype.createPreviewShape.apply(this,arguments)};var W=this.graphHandler.getCells;this.graphHandler.getCells=function(S){for(var da=W.apply(this,arguments),P=new mxDictionary,V=[],l=0;l<da.length;l++){var A=this.graph.isTableCell(S)&&this.graph.isTableCell(da[l])&&this.graph.isCellSelected(da[l])?this.graph.model.getParent(da[l]):this.graph.isTableRow(S)&&this.graph.isTableRow(da[l])&&this.graph.isCellSelected(da[l])?da[l]:this.graph.getCompositeParent(da[l]);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k.focus(),null!=C.clipboardData&&(Graph.removePasteFormatting(k.firstChild),this.pasteCells(C,k,!0,!0)),!mxEvent.isConsumed(C)){var F=f.container.scrollLeft,K=f.container.scrollTop;window.setTimeout(mxUtils.bind(this,function(){try{f.container.scrollLeft=F,f.container.scrollTop=K,Graph.removePasteFormatting(k.firstChild),this.pasteCells(C,k,!1,!0)}catch(O){this.handleError(O)}}),0)}}catch(O){this.handleError(O)}}),!0);var z=this.isSelectionAllowed;this.isSelectionAllowed=function(C){return mxEvent.getSource(C)== k?!0:z.apply(this,arguments)}};EditorUi.prototype.setCurrentTheme=function(d,f){mxSettings.setUi(d);(f=this.doSetCurrentTheme(d)||f)||this.alert(mxResources.get("restartForChangeRequired"))};EditorUi.prototype.isDefaultTheme=function(d){return""==d||"dark"==d||"default"==d||"kennedy"==d||null==d};EditorUi.prototype.doSetCurrentTheme=function(d,f,k){function u(O){return"simple"==O||0==f&&"sketch"==O}f=null!=f?f:150;var z=Editor.currentTheme,C=u(z)&&this.isDefaultTheme(d)||this.isDefaultTheme(z)&&u(d),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
x.shape&&null!=x.shape.bounds){Y=x.shape.direction;J=x.shape.bounds;var ea=x.shape.scale;Q=J.width/ea;J=J.height/ea;if(Y==mxConstants.DIRECTION_NORTH||Y==mxConstants.DIRECTION_SOUTH)Y=Q,Q=J,J=Y;J=x.shape.getConstraints(x.style,Q,J);if(null!=J)return J;if(null!=x.shape.stencil&&null!=x.shape.stencil.constraints)return x.shape.stencil.constraints;if(null!=x.shape.constraints)return x.shape.constraints}}return null};Graph.prototype.flipEdge=function(x){if(null!=x){var J=this.getCurrentCellStyle(x);J= mxUtils.getValue(J,mxConstants.STYLE_ELBOW,mxConstants.ELBOW_HORIZONTAL)==mxConstants.ELBOW_HORIZONTAL?mxConstants.ELBOW_VERTICAL:mxConstants.ELBOW_HORIZONTAL;this.setCellStyles(mxConstants.STYLE_ELBOW,J,[x])}};Graph.prototype.isValidRoot=function(x){for(var J=this.model.getChildCount(x),Q=0,Y=0;Y<J;Y++){var ea=this.model.getChildAt(x,Y);this.model.isVertex(ea)&&(ea=this.getCellGeometry(ea),null==ea||ea.relative||Q++)}return 0<Q||this.isContainer(x)};Graph.prototype.isValidDropTarget=function(x,J,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.rewritePageLinks=function(b){function e(p,y){var q=p.getAttribute(y);null!=q&&Graph.isPageLink(q)&&p.setAttribute(y,"#"+q.substring(q.indexOf(":")+1))}b=b.getElementsByTagName("a");for(var g=0;g<b.length;g++)e(b[g],"href"),e(b[g],"xlink:href")};Graph.isLink=function(b){return null!=b&&Graph.linkPattern.test(b)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u.onreadystatechange=function(){f(u)};u.send("format=xml&filename="+encodeURIComponent(k)+"&data="+encodeURIComponent(d));try{EditorUi.logEvent({category:"GLIFFY-IMPORT-FILE",action:"size_"+file.size})}catch(z){}};EditorUi.prototype.isResampleImageSize=function(d,f){f=null!=f?f:this.resampleThreshold;return d>f};EditorUi.prototype.resizeImage=function(d,f,k,u,z,C,F){z=null!=z?z:this.maxImageSize;var K=Math.max(1,d.width),O=Math.max(1,d.height);if(u&&this.isResampleImageSize(null!=F?F:f.length,C))try{var H= Math.max(K/z,O/z);if(1<H){var ka=Math.round(K/H),fa=Math.round(O/H),ca=document.createElement("canvas");ca.width=ka;ca.height=fa;ca.getContext("2d").drawImage(d,0,0,ka,fa);var ja=ca.toDataURL();if(ja.length<f.length){var ma=document.createElement("canvas");ma.width=ka;ma.height=fa;var aa=ma.toDataURL();ja!==aa&&(f=ja,K=ka,O=fa)}}}catch(S){}k(f,K,O)};EditorUi.prototype.extractGraphModelFromPng=function(d){return Editor.extractGraphModelFromPng(d)};EditorUi.prototype.loadImage=function(d,f,k){try{var u=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
l||0==l.length||"undefined"===typeof pako?l:Graph.arrayBufferToString(pako.deflateRaw(l))};Editor.fastDecompress=function(l){return null==l||0==l.length||"undefined"===typeof pako?l:pako.inflateRaw(Graph.stringToArrayBuffer(atob(l)),{to:"string"})};Editor.extractGraphModel=function(l,A,N){if(null!=l&&"undefined"!==typeof pako){var X=l.ownerDocument.getElementsByTagName("div"),U=[];if(null!=X&&0<X.length)for(var Z=0;Z<X.length;Z++)if("mxgraph"==X[Z].getAttribute("class")){U.push(X[Z]);break}0<U.length&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.duplicatePage=function(b,e){var g=null;try{var p=this.editor.graph;if(p.isEnabled()){p.isEditing()&&p.stopEditing();var y=b.node.cloneNode(!1);y.removeAttribute("id");var q={},E=p.createCellLookup([p.model.root]);g=new DiagramPage(y);g.root=p.cloneCell(p.model.root,null,q);var L=new mxGraphModel;L.prefix=Editor.guid()+"-";L.setRoot(g.root);p.updateCustomLinks(p.createCellMapping(q,E),[g.root]);g.viewState=b==this.currentPage?p.getViewState():b.viewState;this.initDiagramNode(g); g.viewState.scale=1;delete g.viewState.scrollLeft;delete g.viewState.scrollTop;delete g.viewState.currentRoot;delete g.viewState.defaultParent;g.setName(e);g=this.insertPage(g,mxUtils.indexOf(this.pages,b)+1)}}catch(T){this.handleError(T)}return g};EditorUi.prototype.initDiagramNode=function(b){var e=(new mxCodec(mxUtils.createXmlDocument())).encode(new mxGraphModel(b.root));this.editor.graph.saveViewState(b.viewState,e);mxUtils.setTextContent(b.node,Graph.compressNode(e))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.fitPages=function(b,e){var g=1;null==b&&(g=this.getPageLayout(),b=g.width,g=g.height);var p=this.pageScale,y=this.pageFormat,q=this.container.clientHeight-10,E=(this.container.clientWidth-10)/(b*y.width)/p;this.zoomTo(Math.floor(20*(e?E:Math.min(E,q/(g*y.height)/p)))/20);mxUtils.hasScrollbars(this.container)&&(g=this.getPagePadding(),this.container.scrollLeft=Math.min(g.x*this.view.scale,(this.container.scrollWidth-this.container.clientWidth)/2)-1,e||(this.container.scrollTop=2<=b? Math.min(g.y,(this.container.scrollHeight-this.container.clientHeight)/2):g.y*this.view.scale-1))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function Y(){mxEllipse.call(this)}function ea(){mxEllipse.call(this)}function la(){mxRhombus.call(this)}function oa(){mxEllipse.call(this)}function wa(){mxEllipse.call(this)}function sa(){mxEllipse.call(this)}function ua(){mxEllipse.call(this)}function Fa(){mxActor.call(this)}function Ua(){mxActor.call(this)}function Ra(){mxActor.call(this)}function Na(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1;this.rectStyle="square";this.size=10;this.absoluteCornerSize=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments);var ba=mxUtils.bind(this,function(ia,qa){null!=this.graph.container&&this.graph.mathEnabled&&Editor.MathJaxRender(this.graph.container)});this.graph.model.addListener(mxEvent.CHANGE,ba);this.graph.addListener(mxEvent.REFRESH,ba)};A=document.getElementsByTagName("script");if(null!=A&&0<A.length){var Z=document.createElement("script");Z.setAttribute("type","text/javascript");Z.setAttribute("src",l);A[0].parentNode.appendChild(Z)}}};Editor.prototype.csvToArray=function(l){if(0<l.length){var A= "",N=[""],X=0,U=!0,Z;l=$jscomp.makeIterator(l);for(Z=l.next();!Z.done;Z=l.next())Z=Z.value,'"'===Z?(U&&Z===A&&(N[X]+=Z),U=!U):","===Z&&U?Z=N[++X]="":N[X]+=Z,A=Z;return N}return[]};Editor.prototype.getProxiedUrl=function(l){if((/test\.draw\.io$/.test(window.location.hostname)||/app\.diagrams\.net$/.test(window.location.hostname))&&!this.isCorsEnabledForUrl(l)){var A=/(\.v(dx|sdx?))($|\?)/i.test(l)||/(\.vs(x|sx?))($|\?)/i.test(l);A=/\.png$/i.test(l)||/\.pdf$/i.test(l)||A;var N="t="+(new Date).getTime();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(ma){this.spinner.stop();try{this.saveCanvas(ma,z?this.getFileData(!0,null,null,null,k,K):null,O,null==this.pages||0==this.pages.length,ka)}catch(aa){this.handleError(aa)}}),null,this.thumbImageCache,null,mxUtils.bind(this,function(ma){this.spinner.stop();this.handleError(ma)}),null,k,d||1,f,u,null,null,C,F,H,fa,ca)}catch(ma){this.spinner.stop(),this.handleError(ma)}}};EditorUi.prototype.isCorsEnabledForUrl=function(d){return this.editor.isCorsEnabledForUrl(d)};EditorUi.prototype.importXml=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"0"))return mxCellEditorGetCurrentValue.apply(this,arguments);var J=Graph.sanitizeHtml(this.textarea.innerHTML,!0);return J="1"==mxUtils.getValue(x.style,"nl2Br","1")?J.replace(/\r\n/g,"<br/>").replace(/\n/g,"<br/>"):J.replace(/\r\n/g,"").replace(/\n/g,"")};var O=mxCellEditor.prototype.stopEditing;mxCellEditor.prototype.stopEditing=function(x){this.codeViewMode&&this.toggleViewMode();O.apply(this,arguments);this.focusContainer()};mxCellEditor.prototype.focusContainer=function(){try{this.graph.container.focus()}catch(x){}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=X&&0<X.length)l=mxUtils.parseXml(X).documentElement;else throw{message:mxResources.get("notADiagramFile")};null==l||A||(U=null,"diagram"==l.nodeName?U=l:"mxfile"==l.nodeName&&(X=l.getElementsByTagName("diagram"),0<X.length&&(U=X[Math.max(0,Math.min(X.length-1,urlParams.page||0))])),null!=U&&(l=Editor.parseDiagramNode(U,N)));null==l||"mxGraphModel"==l.nodeName||A&&"mxfile"==l.nodeName||(l=null);return l};Editor.parseDiagramNode=function(l,A){var N=mxUtils.trim(mxUtils.getTextContent(l)),X=null; 0<N.length?(l=Graph.decompress(N,null,A),null!=l&&0<l.length&&(X=mxUtils.parseXml(l).documentElement)):(l=mxUtils.getChildNodes(l),0<l.length&&(X=mxUtils.createXmlDocument(),X.appendChild(X.importNode(l[0],!0)),X=X.documentElement));return X};Editor.getDiagramNodeXml=function(l){var A=mxUtils.getTextContent(l),N=null;0<A.length?N=Graph.decompress(A):null!=l.firstChild&&(N=mxUtils.getXml(l.firstChild));return N};Editor.extractGraphModelFromPdf=function(l){l=l.substring(l.indexOf(",")+1);l=window.atob&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
y.cellEditor.stopEditing=function(P,V){try{ma.apply(this,arguments),ca()}catch(l){p.handleError(l)}};y.container.setAttribute("tabindex","0");y.container.style.cursor="default";if(window.self===window.top&&null!=y.container.parentNode)try{y.container.focus()}catch(P){}var aa=y.fireMouseEvent;y.fireMouseEvent=function(P,V,l){try{P==mxEvent.MOUSE_DOWN&&this.container.focus(),aa.apply(this,arguments)}catch(A){p.handleError(A)}};var S=y.foldCells;y.foldCells=function(P,V,l,A,N){try{S.apply(this,arguments)}catch(X){p.handleError(X)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=X&&0<X.length)l=mxUtils.parseXml(X).documentElement;else throw{message:mxResources.get("notADiagramFile")};null==l||A||(U=null,"diagram"==l.nodeName?U=l:"mxfile"==l.nodeName&&(X=l.getElementsByTagName("diagram"),0<X.length&&(U=X[Math.max(0,Math.min(X.length-1,urlParams.page||0))])),null!=U&&(l=Editor.parseDiagramNode(U,N)));null==l||"mxGraphModel"==l.nodeName||A&&"mxfile"==l.nodeName||(l=null);return l};Editor.parseDiagramNode=function(l,A){var N=mxUtils.trim(mxUtils.getTextContent(l)),X=null;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
300,80,!0,!1);F.init()}}));mxEvent.addListener(k,"change",mxUtils.bind(this,function(){k.checked&&(null==f||f.checked)?C.removeAttribute("disabled"):C.setAttribute("disabled","disabled")}));mxUtils.br(d);return{getLink:function(){return k.checked?"blank"===C.value?"_blank":z:null},getEditInput:function(){return k},getEditSelect:function(){return C}}};EditorUi.prototype.addLinkSection=function(d,f){function k(){var K=document.createElement("div");K.style.width="100%";K.style.height="100%";K.style.boxSizing=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
q);mxUtils.extend(E,mxActor);E.prototype.size=20;E.prototype.redrawPath=function(c,m,v,n,t){m=Math.min(n,t/Sa);c.translate((n-m)/2,(t-m)/2+m/4);c.moveTo(0,.25*m);c.lineTo(.5*m,m*db);c.lineTo(m,.25*m);c.lineTo(.5*m,(.5-db)*m);c.lineTo(0,.25*m);c.close();c.end()};mxCellRenderer.registerShape("isoRectangle",E);mxUtils.extend(L,mxCylinder);L.prototype.size=20;L.prototype.redrawPath=function(c,m,v,n,t,B){m=Math.min(n,t/(.5+Sa));B?(c.moveTo(0,.25*m),c.lineTo(.5*m,(.5-db)*m),c.lineTo(m,.25*m),c.moveTo(.5*
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ka.prototype.redrawPath=function(c,m,v,n,t){c.setStrokeWidth(1);c.setFillColor(this.stroke);m=n/5;c.rect(0,0,m,t);c.fillAndStroke();c.rect(2*m,0,m,t);c.fillAndStroke();c.rect(4*m,0,m,t);c.fillAndStroke()};mxCellRenderer.registerShape("parallelMarker",ka);fa.prototype.moveTo=function(c,m){this.originalMoveTo.apply(this.canvas,arguments);this.lastX=c;this.lastY=m;this.firstX=c;this.firstY=m};fa.prototype.close=function(){null!=this.firstX&&null!=this.firstY&&(this.lineTo(this.firstX,this.firstY),this.originalClose.apply(this.canvas,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function W(){mxShape.call(this)}function d(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1}function f(){mxActor.call(this)}function k(){mxCylinder.call(this)}function u(){mxCylinder.call(this)}function z(){mxActor.call(this)}function C(){mxActor.call(this)}function F(){mxActor.call(this)}function K(){mxActor.call(this)}function O(){mxActor.call(this)}function H(){mxActor.call(this)}function ka(){mxActor.call(this)}function fa(c,m){this.canvas=c;this.canvas.setLineJoin("round");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){return!this.outline&&(null==this.style||"0"==mxUtils.getValue(this.style,"comic","0")&&"0"==mxUtils.getValue(this.style,"sketch","1"==urlParams.rough?"1":"0"))&&eb.apply(this,arguments)};var jb=mxRectangleShape.prototype.paintBackground;mxRectangleShape.prototype.paintBackground=function(c,m,v,n,t){if(null==c.handJiggle||c.handJiggle.constructor!=fa)jb.apply(this,arguments);else{var B=!0;null!=this.style&&(B="1"==mxUtils.getValue(this.style,mxConstants.STYLE_POINTER_EVENTS,"1"));if(B||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D||"default"==D&&"square"==B?c.moveTo(I,I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.moveTo(I,ha+.5*I):("invRound"==D||"default"==D&&"invRound"==B||"fold"==D||"default"==D&&"fold"==B)&&c.moveTo(I,ha+I):c.moveTo(0,0)};Na.prototype.lineNWInner=function(c,m,v,n,t,B,D,ha,I,va,na){va||na?!va&&na?c.lineTo(I,0):va&&!na?c.lineTo(0,I):"square"==D||"default"==D&&"square"==B?c.lineTo(I,I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.lineTo(I, ha+.5*I):("invRound"==D||"default"==D&&"invRound"==B||"fold"==D||"default"==D&&"fold"==B)&&c.lineTo(I,ha+I):c.lineTo(0,0)};Na.prototype.paintFolds=function(c,m,v,n,t,B,D,ha,I,va,na,bb,qb,fb,Ga){if("fold"==B||"fold"==D||"fold"==ha||"fold"==I||"fold"==va)("fold"==D||"default"==D&&"fold"==B)&&bb&&Ga&&(c.moveTo(0,na),c.lineTo(na,na),c.lineTo(na,0)),("fold"==ha||"default"==ha&&"fold"==B)&&bb&&qb&&(c.moveTo(n-na,0),c.lineTo(n-na,na),c.lineTo(n,na)),("fold"==I||"default"==I&&"fold"==B)&&fb&&qb&&(c.moveTo(n-
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.handleError(ja)}))})))}}),mxUtils.bind(this,function(){this.hideDialog()}),mxResources.get("saveAs"),mxResources.get("download"),!1,!1,F,null,1<K,O,u,C,z);K=this.isServices(K)?4<K?390:280:160;this.showDialog(d.container,420,K,!0,!0);d.init()};EditorUi.prototype.isServices=function(d){return 1!=d};EditorUi.prototype.getEditBlankXml=function(){return this.getFileData(!0)};EditorUi.prototype.exportFile=function(d,f,k,u,z,C){};EditorUi.prototype.getServiceForName=function(d){return null};EditorUi.prototype.getTitleForService=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.handleError({message:mxResources.get("errorLoadingFile")}));null!=F&&null!=F.parentNode&&0<f.length&&(F.parentNode.removeChild(F),F=null)});null!=ia&&null!=Z&&(/(\.v(dx|sdx?))($|\?)/i.test(Z)||/(\.vs(x|sx?))($|\?)/i.test(Z))?this.importVisio(ia,function(pa){ra(pa,"text/xml")},null,Z):(new XMLHttpRequest).upload&&this.isRemoteFileFormat(V,Z)&&null!=ia?this.isExternalDataComms()?this.parseFile(ia,mxUtils.bind(this,function(pa){4==pa.readyState&&(this.spinner.stop(),200<=pa.status&&299>=pa.status?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.generatePlantUmlImage=function(d,f,k,u){function z(K,O,H){c1=K>>2;c2=(K&3)<<4|O>>4;c3=(O&15)<<2|H>>6;c4=H&63;r="";r+=C(c1&63);r+=C(c2&63);r+=C(c3&63);return r+=C(c4&63)}function C(K){if(10>K)return String.fromCharCode(48+K);K-=10;if(26>K)return String.fromCharCode(65+K);K-=26;if(26>K)return String.fromCharCode(97+K);K-=26;return 0==K?"-":1==K?"_":"?"}var F=new XMLHttpRequest;F.open("GET",("txt"==f?PLANT_URL+"/txt/":"png"==f?PLANT_URL+"/png/":PLANT_URL+"/svg/")+function(K){r="";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
xa=Array(pa.length);for(var Ca=0;Ca<pa.length;Ca++)xa[Ca]=String.fromCharCode(pa[Ca]);xa=xa.join("")}Z=null!=Z?Z:"data:image/png;base64,";xa=Z+Editor.base64Encode(xa)}A(xa)}}else null!=N&&(0==pa.getStatus()?N({message:mxResources.get("accessDenied")},pa):404==pa.getStatus()?N({message:mxResources.get("fileNotFound"),code:pa.getStatus()},pa):N({message:this.getErrorMessage(pa)},pa))}),function(pa){null!=N&&N({message:mxResources.get("error")+" "+pa.getStatus()})},qa,this.timeout,function(){U&&null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function W(){mxShape.call(this)}function d(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1}function f(){mxActor.call(this)}function k(){mxCylinder.call(this)}function u(){mxCylinder.call(this)}function z(){mxActor.call(this)}function C(){mxActor.call(this)}function F(){mxActor.call(this)}function K(){mxActor.call(this)}function O(){mxActor.call(this)}function H(){mxActor.call(this)}function ka(){mxActor.call(this)}function fa(c,m){this.canvas=c;this.canvas.setLineJoin("round");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.linkHint&&"none"!=this.linkHint.style.display&&null!=this.graph.graphHandler&&null!=this.graph.graphHandler.first&&(this.linkHint.style.display="none")};var Z=mxEdgeHandler.prototype.mouseUp;mxEdgeHandler.prototype.mouseUp=function(x,J){Z.apply(this,arguments);null!=this.linkHint&&"none"==this.linkHint.style.display&&(this.linkHint.style.display="")};mxEdgeHandler.prototype.updateHint=function(x,J){null==this.hint&&(this.hint=b(),this.state.view.graph.container.appendChild(this.hint));var Q= this.graph.view.translate,Y=this.graph.view.scale,ea=this.roundLength(J.x/Y-Q.x);Q=this.roundLength(J.y/Y-Q.y);Y=this.graph.view.unit;this.hint.innerHTML=e(ea,Y)+", "+e(Q,Y);this.hint.style.visibility="visible";if(this.isSource||this.isTarget)null!=this.constraintHandler&&null!=this.constraintHandler.currentConstraint&&null!=this.constraintHandler.currentFocus?(ea=this.constraintHandler.currentConstraint.point,this.hint.innerHTML="["+Math.round(100*ea.x)+"%, "+Math.round(100*ea.y)+"%]"):this.marker.hasValidState()&& (this.hint.style.visibility="hidden");this.hint.style.left=Math.round(x.getGraphX()-this.hint.clientWidth/2)+"px";this.hint.style.top=Math.max(x.getGraphY(),J.y)+Editor.hintOffset+"px";null!=this.linkHint&&(this.linkHint.style.display="none")};Graph.prototype.expandedImage=Graph.createSvgImage(9,9,'<defs><linearGradient id="grad1" x1="50%" y1="0%" x2="50%" y2="100%"><stop offset="30%" style="stop-color:#f0f0f0;" /><stop offset="100%" style="stop-color:#AFB0B6;" /></linearGradient></defs><rect x="0" y="0" width="9" height="9" stroke="#8A94A5" fill="url(#grad1)" stroke-width="2"/><path d="M 2 4.5 L 7 4.5 z" stroke="#000"/>');
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxResources.get("download"),!1,C,F,null,1<z,O,d,k,u);C=this.isServices(z)?z>O?390:280:160;this.showDialog(f.container,420,C,!0,!0);f.init()};EditorUi.prototype.openInNewWindow=function(d,f,k){var u=window.open("about:blank");null==u||null==u.document?mxUtils.popup(d,!0):("image/svg+xml"!=f||mxClient.IS_SVG?"image/svg+xml"!=f||k?(d=k?d:btoa(unescape(encodeURIComponent(d))),u.document.write('<html><img style="max-width:100%;" src="data:'+f+";base64,"+d+'"/></html>')):u.document.write("<html>"+d+"</html>"): u.document.write("<html><pre>"+mxUtils.htmlEntities(d,!1)+"</pre></html>"),u.document.close())};var p=EditorUi.prototype.addChromelessToolbarItems;EditorUi.prototype.isChromelessImageExportEnabled=function(){return"draw.io"!=this.getServiceName()||/.*\.draw\.io$/.test(window.location.hostname)||/.*\.diagrams\.net$/.test(window.location.hostname)};EditorUi.prototype.addChromelessToolbarItems=function(d){if(null!=urlParams.tags){this.tagsDialog=this.tagsComponent=null;var f=d(mxUtils.bind(this,function(u){null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"fold"==B)&&c.lineTo(ha,0);else c.lineTo(0,0)};Na.prototype.paintTop=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(n,0):c.lineTo(n-ha,0)};Na.prototype.paintNE=function(c,m,v,n,t,B,D,ha,I){if(I)if("rounded"==D||"default"==D&&"rounded"==B||"invRound"==D||"default"==D&&"invRound"==B){m=0;if("rounded"==D||"default"==D&&"rounded"==B)m=1;c.arcTo(ha,ha,0,0,m,n,ha)}else("snip"==D||"default"==D&&"snip"==B||"fold"==D||"default"==D&&"fold"==B)&&c.lineTo(n,ha);else c.lineTo(n, 0)};Na.prototype.paintRight=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(n,t):c.lineTo(n,t-ha)};Na.prototype.paintLeft=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(0,0):c.lineTo(0,ha)};Na.prototype.paintSE=function(c,m,v,n,t,B,D,ha,I){if(I)if("rounded"==D||"default"==D&&"rounded"==B||"invRound"==D||"default"==D&&"invRound"==B){m=0;if("rounded"==D||"default"==D&&"rounded"==B)m=1;c.arcTo(ha,ha,0,0,m,n-ha,t)}else("snip"==D||"default"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
1),"image/png");d=new ClipboardItem({"image/png":z,"text/html":new Blob(['<img src="'+d+'" width="'+f+'" height="'+k+'">'],{type:"text/html"})});navigator.clipboard.write([d])["catch"](u)};EditorUi.prototype.copyCells=function(d,f){var k=this.editor.graph;if(k.isSelectionEmpty())d.innerText="";else{var u=mxUtils.sortCells(k.model.getTopmostCells(k.getSelectionCells())),z=mxUtils.getXml(k.encodeCells(u));mxUtils.setTextContent(d,encodeURIComponent(z));f?(k.removeCells(u,!1),k.lastPasteXml=null):(k.lastPasteXml= z,k.pasteCounter=0);d.focus();document.execCommand("selectAll",!1,null)}};EditorUi.prototype.copyXml=function(){var d=null;if(Editor.enableNativeCipboard){var f=this.editor.graph;f.isSelectionEmpty()||(d=mxUtils.sortCells(f.getExportableCells(f.model.getTopmostCells(f.getSelectionCells()))),f=mxUtils.getXml(f.encodeCells(d)),navigator.clipboard.writeText(f))}return d};EditorUi.prototype.pasteXml=function(d,f,k,u){var z=this.editor.graph,C=null;z.lastPasteXml==d?z.pasteCounter++:(z.lastPasteXml=d,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxEvent.isMetaDown(J.getEvent())};var aa=mxVertexHandler.prototype.isRotationHandleVisible;mxVertexHandler.prototype.isRotationHandleVisible=function(){return aa.apply(this,arguments)&&!this.graph.isTableCell(this.state.cell)&&!this.graph.isTableRow(this.state.cell)&&!this.graph.isTable(this.state.cell)};mxVertexHandler.prototype.getSizerBounds=function(){return this.graph.isTableCell(this.state.cell)?this.graph.view.getState(this.graph.model.getParent(this.graph.model.getParent(this.state.cell))): this.bounds};var S=mxVertexHandler.prototype.isParentHighlightVisible;mxVertexHandler.prototype.isParentHighlightVisible=function(){return S.apply(this,arguments)&&!this.graph.isTableCell(this.state.cell)&&!this.graph.isTableRow(this.state.cell)};var da=mxVertexHandler.prototype.isCustomHandleVisible;mxVertexHandler.prototype.isCustomHandleVisible=function(x){return x.tableHandle||da.apply(this,arguments)&&(!this.graph.isTable(this.state.cell)||this.graph.isCellSelected(this.state.cell))};mxVertexHandler.prototype.getSelectionBorderInset=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.outerStroke&&(c.ellipse(m,v,n,t),c.stroke())};mxCellRenderer.registerShape("endState",za);mxUtils.extend(Ma,za);Ma.prototype.outerStroke=!1;mxCellRenderer.registerShape("startState",Ma);mxUtils.extend(Qa,mxArrowConnector);Qa.prototype.defaultWidth=4;Qa.prototype.isOpenEnded=function(){return!0};Qa.prototype.getEdgeWidth=function(){return mxUtils.getNumber(this.style,"width",this.defaultWidth)+Math.max(0,this.strokewidth-1)};Qa.prototype.isArrowRounded=function(){return this.isRounded};mxCellRenderer.registerShape("link",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
la&&Math.abs(this.scrollTop-oa.container.scrollTop)<la&&Math.abs(this.startX-ua.getGraphX())<la&&Math.abs(this.startY-ua.getGraphY())<la&&Q(ua.getEvent()));this.clear()},activate:function(sa){this.currentLink=oa.getAbsoluteUrl(oa.getLinkForCell(sa.cell));null!=this.currentLink&&(this.currentTarget=oa.getLinkTargetForCell(sa.cell),oa.container.style.cursor="pointer",null!=this.highlight&&this.highlight.highlight(sa))},clear:function(){null!=oa.container&&(oa.container.style.cursor=ea);this.currentLink=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){return p.apply(this,arguments)||null!=e.shapePicker||null!=e.currentMenu};var y=b.dblClick;b.dblClick=function(T,G){if(this.isEnabled())if(null!=G||null==e.sidebar||mxEvent.isShiftDown(T)||b.isCellLocked(b.getDefaultParent()))y.apply(this,arguments);else{var M=mxUtils.convertPoint(this.container,mxEvent.getClientX(T),mxEvent.getClientY(T));mxEvent.consume(T);window.setTimeout(mxUtils.bind(this,function(){e.showShapePicker(M.x,M.y)}),30)}};if(null!=this.hoverIcons){this.hoverIcons.addListener("reset",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=ua&&ua.relative&&0>=ua.x&&this.model.remove(Fa[J]);var Ua=this.model.getTerminal(Q,!1);if(null!=Ua){var Ra=this.getCurrentCellStyle(Ua);null!=Ra&&"1"==Ra.snapToPoint&&(this.setCellStyles(mxConstants.STYLE_EXIT_X,null,[x]),this.setCellStyles(mxConstants.STYLE_EXIT_Y,null,[x]),this.setCellStyles(mxConstants.STYLE_ENTRY_X,null,[Q]),this.setCellStyles(mxConstants.STYLE_ENTRY_Y,null,[Q]))}}finally{this.model.endUpdate()}return Q};var R=Graph.prototype.selectCell;Graph.prototype.selectCell=function(x, J,Q){if(J||Q)R.apply(this,arguments);else{var Y=this.getSelectionCell(),ea=null,la=[],oa=mxUtils.bind(this,function(wa){if(null!=this.view.getState(wa)&&(this.model.isVertex(wa)||this.model.isEdge(wa)))if(la.push(wa),wa==Y)ea=la.length-1;else if(x&&null==Y&&0<la.length||null!=ea&&x&&la.length>ea||!x&&0<ea)return;for(var sa=0;sa<this.model.getChildCount(wa);sa++)oa(this.model.getChildAt(wa,sa))});oa(this.model.root);0<la.length&&(ea=null!=ea?mxUtils.mod(ea+(x?1:-1),la.length):0,this.setSelectionCell(la[ea]))}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
oa))||(la=!1);la&&x.push(ea.cell)}}mxGraph.prototype.cellsRemoved.apply(this,arguments)};Graph.prototype.removeCellsAfterUngroup=function(x){for(var J=[],Q=0;Q<x.length;Q++)this.isCellDeletable(x[Q])&&this.isTransparentState(this.view.getState(x[Q]))&&J.push(x[Q]);x=J;mxGraph.prototype.removeCellsAfterUngroup.apply(this,arguments)};Graph.prototype.setLinkForCell=function(x,J){this.setAttributeForCell(x,"link",J)};Graph.prototype.setTooltipForCell=function(x,J){var Q="tooltip";Graph.translateDiagram&& null!=Graph.diagramLanguage&&mxUtils.isNode(x.value)&&x.value.hasAttribute("tooltip_"+Graph.diagramLanguage)&&(Q="tooltip_"+Graph.diagramLanguage);this.setAttributeForCell(x,Q,J)};Graph.prototype.getAttributeForCell=function(x,J,Q){x=null!=x.value&&"object"===typeof x.value?x.value.getAttribute(J):null;return null!=x?x:Q};Graph.prototype.setAttributeForCell=function(x,J,Q){if(null!=x.value&&"object"==typeof x.value)var Y=x.value.cloneNode(!0);else Y=mxUtils.createXmlDocument().createElement("UserObject"),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.init=function(b){mxGraph.prototype.init.apply(this,arguments);this.cellRenderer.initializeLabel=function(g,p){mxCellRenderer.prototype.initializeLabel.apply(this,arguments);var y=g.view.graph.tolerance,q=!0,E=null,L=mxUtils.bind(this,function(M){q=!0;E=new mxPoint(mxEvent.getClientX(M),mxEvent.getClientY(M))}),T=mxUtils.bind(this,function(M){q=q&&null!=E&&Math.abs(E.x-mxEvent.getClientX(M))<y&&Math.abs(E.y-mxEvent.getClientY(M))<y}),G=mxUtils.bind(this,function(M){if(q)for(var R=mxEvent.getSource(M);null!= R&&R!=p.node;){if("a"==R.nodeName.toLowerCase()){g.view.graph.labelLinkClicked(g,R,M);break}R=R.parentNode}});mxEvent.addGestureListeners(p.node,L,T,G);mxEvent.addListener(p.node,"click",function(M){mxEvent.consume(M)})};if(null!=this.tooltipHandler){var e=this.tooltipHandler.init;this.tooltipHandler.init=function(){e.apply(this,arguments);null!=this.div&&mxEvent.addListener(this.div,"click",mxUtils.bind(this,function(g){var p=mxEvent.getSource(g);"A"==p.nodeName&&(p=p.getAttribute("href"),null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.fileSaved=function(b,e,g,p,y,q,E){this.lastSaved=new Date;this.ageStart=null;this.stats.saved++;try{this.invalidChecksum=this.inConflictState=!1;q=null!=q?q:this.ui.getPagesForXml(b);try{null==this.sync||this.isOptimisticSync()?(this.setShadowPages(q),null!=this.sync&&(this.sync.lastModified=this.getLastModifiedDate(),this.sync.resetUpdateStatusThread(),this.isRealtime()&&this.sync.scheduleCleanup()),null!=g&&g()):this.sync.fileSaved(q,e,g,p,y,E)}catch(G){this.invalidChecksum= this.inConflictState=!0;this.descriptorChanged();null!=p&&p(G);try{if(this.errorReportsEnabled)this.sendErrorReport("Error in fileSaved",null,G);else{var L=this.getCurrentUser(),T=null!=L?L.id:"unknown";EditorUi.logError("Error in fileSaved",null,this.getMode()+"."+this.getId(),T,G)}}catch(M){}}EditorUi.debug("DrawioFile.fileSaved",[this],"savedData",[b],"desc",[e],"inConflictState",this.inConflictState,"invalidChecksum",this.invalidChecksum)}catch(G){this.descriptorChanged(),null!=p&&p(G)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
.5*c.width,.5*(c.height-m));n||(B=0);return"left"==mxUtils.getValue(this.style,"tabPosition",this.tabPosition)?new mxRectangle(B,0,Math.min(c.width,c.width-v),Math.min(c.height,c.height-m)):new mxRectangle(Math.min(c.width,c.width-v),0,B,Math.min(c.height,c.height-m))}return new mxRectangle(0,Math.min(c.height,m),0,0)}return null};u.prototype.getLabelMargins=function(c){return mxUtils.getValue(this.style,"boundedLbl",!1)&&null!=mxUtils.getValue(this.style,"umlStateConnection",null)?new mxRectangle(10* this.scale,0,0,0):null};M.prototype.getLabelMargins=function(c){if(mxUtils.getValue(this.style,"boundedLbl",!1)){var m=mxUtils.getValue(this.style,"size",15);return new mxRectangle(0,Math.min(c.height*this.scale,m*this.scale),0,Math.max(0,m*this.scale))}return null};mxUtils.extend(K,mxActor);K.prototype.size=.2;K.prototype.fixedSize=20;K.prototype.isRoundable=function(){return!0};K.prototype.redrawPath=function(c,m,v,n,t){m="0"!=mxUtils.getValue(this.style,"fixedSize","0")?Math.max(0,Math.min(n,parseFloat(mxUtils.getValue(this.style,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
t-I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.lineTo(n-I,t-ha-.5*I):("invRound"==D||"default"==D&&"invRound"==B||"fold"==D||"default"==D&&"fold"==B)&&c.lineTo(n-I,t-ha-I):c.lineTo(n-I,t)};Na.prototype.moveNEInner=function(c,m,v,n,t,B,D,ha,I,va){va?"square"==D||"default"==D&&"square"==B||va?c.moveTo(n-I,I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.moveTo(n-I,ha+.5*I):("invRound"==D||"default"==D&&"invRound"==B||"fold"==D||"default"== D&&"fold"==B)&&c.moveTo(n-I,ha+I):c.moveTo(n,I)};Na.prototype.lineNEInner=function(c,m,v,n,t,B,D,ha,I,va){va?"square"==D||"default"==D&&"square"==B||va?c.lineTo(n-I,I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.lineTo(n-I,ha+.5*I):("invRound"==D||"default"==D&&"invRound"==B||"fold"==D||"default"==D&&"fold"==B)&&c.lineTo(n-I,ha+I):c.lineTo(n,I)};Na.prototype.moveNWInner=function(c,m,v,n,t,B,D,ha,I,va,na){va||na?!va&&na?c.moveTo(I,0):va&&!na?c.moveTo(0,I):"square"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.synchronizeFile(g,p)}))};DrawioFile.prototype.getErrorMessage=function(b){var e=null!=b?null!=b.error?b.error.message:b.message:null;null==e&&null!=b&&b.code==App.ERROR_TIMEOUT?e=mxResources.get("timeout"):"0"==e&&(e=mxResources.get("noResponse"));return e};DrawioFile.prototype.isOverdue=function(){return null!=this.ageStart&&Date.now()-this.ageStart.getTime()>=this.ui.warnInterval};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxStencilRegistry.parseStencilSet=function(b,e,g){if("stencils"==b.nodeName)for(var p=b.firstChild;null!=p;)"shapes"==p.nodeName&&mxStencilRegistry.parseStencilSet(p,e,g),p=p.nextSibling;else{g=null!=g?g:!0;p=b.firstChild;var y="";b=b.getAttribute("name");for(null!=b&&(y=b+".");null!=p;){if(p.nodeType==mxConstants.NODETYPE_ELEMENT&&(b=p.getAttribute("name"),null!=b)){y=y.toLowerCase();var q=b.replace(/ /g,"_");g&&mxStencilRegistry.addStencil(y+q.toLowerCase(),new mxStencil(p));if(null!=e){var E=p.getAttribute("w"), L=p.getAttribute("h");E=null==E?80:parseInt(E,10);L=null==L?80:parseInt(L,10);e(y,q,b,E,L)}}p=p.nextSibling}}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxCellEditor.prototype.getInitialValue;mxCellEditor.prototype.getInitialValue=function(x,J){if("0"==mxUtils.getValue(x.style,"html","0"))return mxCellEditorGetInitialValue.apply(this,arguments);var Q=this.graph.getEditingValue(x.cell,J);"1"==mxUtils.getValue(x.style,"nl2Br","1")&&(Q=Q.replace(/\n/g,"<br/>"));return Q=Graph.sanitizeHtml(Q,!0)};mxCellEditorGetCurrentValue=mxCellEditor.prototype.getCurrentValue;mxCellEditor.prototype.getCurrentValue=function(x){if("0"==mxUtils.getValue(x.style,"html", "0"))return mxCellEditorGetCurrentValue.apply(this,arguments);var J=Graph.sanitizeHtml(this.textarea.innerHTML,!0);return J="1"==mxUtils.getValue(x.style,"nl2Br","1")?J.replace(/\r\n/g,"<br/>").replace(/\n/g,"<br/>"):J.replace(/\r\n/g,"").replace(/\n/g,"")};var O=mxCellEditor.prototype.stopEditing;mxCellEditor.prototype.stopEditing=function(x){this.codeViewMode&&this.toggleViewMode();O.apply(this,arguments);this.focusContainer()};mxCellEditor.prototype.focusContainer=function(){try{this.graph.container.focus()}catch(x){}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,g){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,g,p,y,q){DrawioFile.call(this,b,e);this.title=g;this.mode=p?null:App.MODE_DEVICE;this.fileHandle=y;this.desc=q};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments);this.lastX=c;this.lastY=m};fa.prototype.destroy=function(){this.canvas.lineTo=this.originalLineTo;this.canvas.moveTo=this.originalMoveTo;this.canvas.close=this.originalClose;this.canvas.quadTo=this.originalQuadTo;this.canvas.curveTo=this.originalCurveTo;this.canvas.arcTo=this.originalArcTo};var kb=mxShape.prototype.beforePaint;mxShape.prototype.beforePaint=function(c){kb.apply(this,arguments);null==c.handJiggle&&(c.handJiggle=this.createHandJiggle(c))};var Pa=mxShape.prototype.afterPaint;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.createWipeAnimations=function(b,e){for(var g=[],p=0;p<b.length;p++){var y=this.view.getState(b[p]);null!=y&&null!=y.shape&&(this.model.isEdge(y.cell)&&null!=y.absolutePoints&&1<y.absolutePoints.length?g.push(this.createEdgeWipeAnimation(y,e)):this.model.isVertex(y.cell)&&null!=y.shape.bounds&&g.push(this.createVertexWipeAnimation(y,e)))}return g};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null==ra&&(Aa.style.marginRight="4px");null!=pa&&Aa.setAttribute("title",pa);null!=xa&&(ia=function(){xa.isEnabled()?(Aa.removeAttribute("disabled"),Aa.style.cursor="pointer"):(Aa.setAttribute("disabled","disabled"),Aa.style.cursor="default")},xa.addListener("stateChanged",ia),F.addListener("enabledChanged",ia),ia());return Aa}function f(ia,qa,ra){ra=document.createElement("div");ra.className="geMenuItem";ra.style.display="inline-block";ra.style.verticalAlign="top";ra.style.marginRight="6px";ra.style.padding= "0 4px 0 4px";ra.style.height="30px";ra.style.position="relative";ra.style.top="0px";for(var pa=0;pa<ia.length;pa++)null!=ia[pa]&&(ia[pa].style.margin="0px",ia[pa].style.boxShadow="none",ra.appendChild(ia[pa]));null!=qa&&mxUtils.setOpacity(ra,qa);null!=C.statusContainer?K.insertBefore(ra,C.statusContainer):K.appendChild(ra);return ra}function k(){for(var ia=K.firstChild;null!=ia;){var qa=ia.nextSibling;"geMenuItem"!=ia.className&&"geItem"!=ia.className||ia.parentNode.removeChild(ia);ia=qa}O=K.firstChild;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.isViewer=function(){return!1};Graph.prototype.labelLinkClicked=function(b,e,g){var p=e.getAttribute("href");p!=Graph.sanitizeLink(p)&&Graph.sanitizeNode(e);if(null!=p&&!this.isCustomLink(p)&&(mxEvent.isLeftMouseButton(g)&&!mxEvent.isPopupTrigger(g)||mxEvent.isTouchEvent(g))){if(!this.isEnabled()||this.isCellLocked(b.cell))b=this.isBlankLink(p)?this.linkTarget:"_top",this.openLink(this.getAbsoluteUrl(p),b);mxEvent.consume(g)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.createTimeout=function(b,e,g){var p=!0,y=null,q=mxUtils.bind(this,function(L){y.clear()&&(p=!1,L=null!=L?L:{code:App.ERROR_TIMEOUT,message:mxResources.get("timeout"),retry:mxUtils.bind(this,function(){this.createTimeout(b,e,g)})},null!=g?g(L):this.handleError(L))}),E=window.setTimeout(q,null!=b?b:this.timeout);y={clear:function(){window.clearTimeout(E);return p},isAlive:function(){return p}};null!=e&&this.tryAndHandle(mxUtils.bind(this,function(){e(y)}),q);return y};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.bind(this,fa.prototype.curveTo);this.originalArcTo=this.canvas.arcTo;this.canvas.arcTo=mxUtils.bind(this,fa.prototype.arcTo)}function ca(){mxRectangleShape.call(this)}function ja(){mxRectangleShape.call(this)}function ma(){mxActor.call(this)}function aa(){mxActor.call(this)}function S(){mxActor.call(this)}function da(){mxRectangleShape.call(this)}function P(){mxRectangleShape.call(this)}function V(){mxCylinder.call(this)}function l(){mxShape.call(this)}function A(){mxShape.call(this)}function N(){mxEllipse.call(this)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m,v,n,t){var B=c.view;n=null!=n&&0<n.length?n[0]:null;var D=c.absolutePoints,ha=D[0];D=D[D.length-1];null!=n&&(n=B.transformControlPoint(c,n));null==ha&&null!=m&&(ha=new mxPoint(m.getCenterX(),m.getCenterY()));null==D&&null!=v&&(D=new mxPoint(v.getCenterX(),v.getCenterY()));var I=Bb.x,va=Bb.y,na=vb.x,bb=vb.y,qb="horizontal"==mxUtils.getValue(c.style,"elbow","horizontal");if(null!=D&&null!=ha){c=function(Ga,Ja,Ia){Ga-=fb.x;var Ha=Ja-fb.y;Ja=(bb*Ga-na*Ha)/(I*bb-va*na);Ga=(va*Ga-I*Ha)/(va*na-I*bb);qb? (Ia&&(fb=new mxPoint(fb.x+I*Ja,fb.y+va*Ja),t.push(fb)),fb=new mxPoint(fb.x+na*Ga,fb.y+bb*Ga)):(Ia&&(fb=new mxPoint(fb.x+na*Ga,fb.y+bb*Ga),t.push(fb)),fb=new mxPoint(fb.x+I*Ja,fb.y+va*Ja));t.push(fb)};var fb=ha;null==n&&(n=new mxPoint(ha.x+(D.x-ha.x)/2,ha.y+(D.y-ha.y)/2));c(n.x,n.y,!0);c(D.x,D.y,!1)}};mxStyleRegistry.putValue("isometricEdgeStyle",mxEdgeStyle.IsometricConnector);var Cb=Graph.prototype.createEdgeHandler;Graph.prototype.createEdgeHandler=function(c,m){if(m==mxEdgeStyle.IsometricConnector){var v=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
B,D,m+n/2,v+t/2);s=this.scale;m=this.bounds.x/s;v=this.bounds.y/s;n=this.bounds.width/s;t=this.bounds.height/s;this.paintTableForeground(c,m,v,n,t)}};e.prototype.paintTableForeground=function(c,m,v,n,t){n=this.state.view.graph.getTableLines(this.state.cell,"0"!=mxUtils.getValue(this.state.style,"rowLines","1"),"0"!=mxUtils.getValue(this.state.style,"columnLines","1"));for(t=0;t<n.length;t++)b.prototype.paintTableLine(c,n[t],m,v)};e.prototype.configurePointerEvents=function(c){0==this.getTitleSize()? c.pointerEvents=!1:mxSwimlane.prototype.configurePointerEvents.apply(this,arguments)};mxCellRenderer.registerShape("table",e);mxUtils.extend(g,e);g.prototype.paintForeground=function(){};mxCellRenderer.registerShape("tableRow",g);mxUtils.extend(p,mxCylinder);p.prototype.size=20;p.prototype.darkOpacity=0;p.prototype.darkOpacity2=0;p.prototype.paintVertexShape=function(c,m,v,n,t){var B=Math.max(0,Math.min(n,Math.min(t,parseFloat(mxUtils.getValue(this.style,"size",this.size))))),D=Math.max(-1,Math.min(1,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,g){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,g,p,y,q){DrawioFile.call(this,b,e);this.title=g;this.mode=p?null:App.MODE_DEVICE;this.fileHandle=y;this.desc=q};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
TableLayout.prototype.getRowLayout=function(b,e){var g=this.graph.model.getChildCells(b,!0),p=this.graph.getActualStartSize(b,!0);b=this.getSize(g,!0);e=e-p.x-p.width;var y=[];p=p.x;for(var q=0;q<g.length;q++){var E=this.graph.getCellGeometry(g[q]);null!=E&&(p+=(null!=E.alternateBounds?E.alternateBounds.width:E.width)*e/b,y.push(Math.round(p)))}return y};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.moveTo(n,t):c.moveTo(n,t-ha)};Na.prototype.moveSW=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.moveTo(0,t):c.moveTo(ha,t)};Na.prototype.paintNW=function(c,m,v,n,t,B,D,ha,I){if(I)if("rounded"==D||"default"==D&&"rounded"==B||"invRound"==D||"default"==D&&"invRound"==B){m=0;if("rounded"==D||"default"==D&&"rounded"==B)m=1;c.arcTo(ha,ha,0,0,m,ha,0)}else("snip"==D||"default"==D&&"snip"==B||"fold"==D||"default"==D&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d,f,k,u,z){var C=document.createElement("div");C.style.whiteSpace="nowrap";var F=this.editor.graph;if(null!=f){var K=document.createElement("h3");mxUtils.write(K,f);K.style.cssText="width:100%;text-align:center;margin-top:0px;margin-bottom:4px";C.appendChild(K)}var O=this.addCheckbox(C,mxResources.get("fit"),!0),H=this.addCheckbox(C,mxResources.get("shadow"),F.shadowVisible&&u,!u),ka=this.addCheckbox(C,k),fa=this.addCheckbox(C,mxResources.get("lightbox"),!0),ca=this.addEditButton(C,fa),ja= ca.getEditInput(),ma=1<F.model.getChildCount(F.model.getRoot()),aa=this.addCheckbox(C,mxResources.get("layers"),ma,!ma);aa.style.marginLeft=ja.style.marginLeft;aa.style.marginBottom="12px";aa.style.marginTop="8px";mxEvent.addListener(fa,"change",function(){fa.checked?(ma&&aa.removeAttribute("disabled"),ja.removeAttribute("disabled")):(aa.setAttribute("disabled","disabled"),ja.setAttribute("disabled","disabled"));ja.checked&&fa.checked?ca.getEditSelect().removeAttribute("disabled"):ca.getEditSelect().setAttribute("disabled", "disabled")});f=new CustomDialog(this,C,mxUtils.bind(this,function(){d(O.checked,H.checked,ka.checked,fa.checked,ca.getLink(),aa.checked)}),null,mxResources.get("embed"),z);this.showDialog(f.container,280,300,!0,!0)};EditorUi.prototype.createEmbedImage=function(d,f,k,u,z,C,F,K){function O(ja){var ma=" ",aa="";u&&(ma=" onclick=\"(function(img){if(img.wnd!=null&&!img.wnd.closed){img.wnd.focus();}else{var r=function(evt){if(evt.data=='ready'&&evt.source==img.wnd){img.wnd.postMessage(decodeURIComponent(img.getAttribute('src')),'*');window.removeEventListener('message',r);}};window.addEventListener('message',r);img.wnd=window.open('"+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
z=u.indexOf(",");0<z&&(z=L.getIndexById(u.substring(z+1)),0<=z&&(k=L.getImageForGraphModel(Editor.parseDiagramNode(L.diagrams[z])),k.originalSrc=u))}W.apply(this,arguments)};var d=this.graph.getGraphBounds;this.graph.getGraphBounds=function(k){var u=d.apply(this,arguments);k=this.backgroundImage;if(null!=k){var z=this.view.translate,C=this.view.scale;u=mxRectangle.fromRectangle(u);u.add(new mxRectangle((z.x+k.x)*C,(z.y+k.y)*C,k.width*C,k.height*C))}return u};this.addListener("xmlNodeChanged",G);G();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
n=0;n<this.line.length&&!m;n++){var t=this.line[n];null!=t&&null!=v&&(m=mxUtils.rectangleIntersectsSegment(c,v,t));v=t}return m};mxCellRenderer.registerShape("tableLine",b);mxUtils.extend(e,mxSwimlane);e.prototype.getLabelBounds=function(c){return 0==this.getTitleSize()?mxShape.prototype.getLabelBounds.apply(this,arguments):mxSwimlane.prototype.getLabelBounds.apply(this,arguments)};e.prototype.paintVertexShape=function(c,m,v,n,t){var B=null!=this.state?this.state.view.graph.isCellCollapsed(this.state.cell): !1,D=this.isHorizontal(),ha=this.getTitleSize();0==ha||this.outline?sa.prototype.paintVertexShape.apply(this,arguments):(mxSwimlane.prototype.paintVertexShape.apply(this,arguments),c.translate(-m,-v));B||this.outline||!(D&&ha<t||!D&&ha<n)||this.paintForeground(c,m,v,n,t)};e.prototype.paintForeground=function(c,m,v,n,t){if(null!=this.state){var B=this.flipH,D=this.flipV;if(this.direction==mxConstants.DIRECTION_NORTH||this.direction==mxConstants.DIRECTION_SOUTH){var ha=B;B=D;D=ha}c.rotate(-this.getShapeRotation(),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
if(0<T.length){if(null!=this.pageId)for(var G=0;G<T.length;G++)if(this.pageId==T[G].getAttribute("id")){this.currentPage=G;break}var M=this.graph.getGlobalVariable;L=this;this.graph.getGlobalVariable=function(k){var u=T[L.currentPage];return"page"==k?u.getAttribute("name")||"Page-"+(L.currentPage+1):"pagenumber"==k?L.currentPage+1:"pagecount"==k?T.length:M.apply(this,arguments)}}}this.diagrams=[];var R=null;this.selectPage=function(k){this.handlingResize||(this.currentPage=mxUtils.mod(k,this.diagrams.length), this.updateGraphXml(Editor.parseDiagramNode(this.diagrams[this.currentPage])))};this.selectPageById=function(k){k=this.getIndexById(k);var u=0<=k;u&&this.selectPage(k);return u};G=mxUtils.bind(this,function(){if(null==this.xmlNode||"mxfile"!=this.xmlNode.nodeName)this.diagrams=[];this.xmlNode!=R&&(this.diagrams=this.xmlNode.getElementsByTagName("diagram"),R=this.xmlNode)});var W=this.graph.setBackgroundImage;this.graph.setBackgroundImage=function(k){if(null!=k&&Graph.isPageLink(k.src)){var u=k.src,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
urlParams.page=L.currentPage;G=null;this.graph.getModel().beginUpdate();try{urlParams.nav=0!=this.graphConfig.nav?"1":"0",this.editor.setGraphXml(this.xmlNode),this.graph.view.scale=this.graphConfig.zoom||1,G=this.setLayersVisible(),this.responsive||(this.graph.border=null!=this.graphConfig.border?this.graphConfig.border:8)}finally{this.graph.getModel().endUpdate()}this.responsive||(this.graph.panningHandler.isForcePanningEvent=function(k){return!mxEvent.isPopupTrigger(k.getEvent())&&"auto"==this.graph.container.style.overflow}, this.graph.panningHandler.useLeftButtonForPanning=!0,this.graph.panningHandler.ignoreCell=!0,this.graph.panningHandler.usePopupTrigger=!1,this.graph.panningHandler.pinchEnabled=!1);this.graph.setPanning(!1);null!=this.graphConfig.toolbar?this.addToolbar():null!=this.graphConfig.title&&this.showTitleAsTooltip&&b.setAttribute("title",this.graphConfig.title);this.responsive||this.addSizeHandler();!this.showLayers(this.graph)||this.forceCenter||this.layersEnabled&&!this.autoCrop||this.crop();this.addClickHandler(this.graph); this.graph.setTooltips(0!=this.graphConfig.tooltips);this.graph.initialViewState={translate:this.graph.view.translate.clone(),scale:this.graph.view.scale};null!=G&&this.setLayersVisible(G);this.graph.customLinkClicked=function(k){try{if(Graph.isPageLink(k)){var u=k.indexOf(",");L.selectPageById(k.substring(u+1))||alert(mxResources.get("pageNotFound")||"Page not found")}else this.handleCustomLink(k)}catch(z){alert(z.message)}return!0};var f=this.graph.foldTreeCell;this.graph.foldTreeCell=mxUtils.bind(this, function(){this.treeCellFolded=!0;return f.apply(this.graph,arguments)});this.fireEvent(new mxEventObject("render"))});g=window.MutationObserver||window.WebKitMutationObserver||window.MozMutationObserver;if(this.checkVisibleState&&0==b.offsetWidth&&"undefined"!==typeof g){var y=this.getObservableParent(b),q=new g(mxUtils.bind(this,function(E){0<b.offsetWidth&&(q.disconnect(),p())}));q.observe(y,{attributes:!0})}else p()}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Dialog.prototype.getDocumentSize=function(){return new mxRectangle(0,0,Math.max(document.documentElement.clientWidth||0,window.innerWidth||0),Math.max(document.documentElement.clientHeight||0,window.innerHeight||0))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null,null,C))}),u)};EditorUi.prototype.createMermaidXml=function(d,f,k,u,z){var C=new Graph(document.createElement("div"));k=C.insertVertex(null,null,null,0,0,u,z,"shape=image;noLabel=1;verticalAlign=top;imageAspect=1;image="+k+";");C.setAttributeForCell(k,"mermaidData",JSON.stringify({data:d,config:f},null,2));d=(new mxCodec).encode(C.getModel());return mxUtils.getXml(d)};EditorUi.prototype.generateOpenAiMermaidDiagram=function(d,f,k){var u=0,z=mxUtils.bind(this,function(){this.spinner.spin(document.body,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
N&&N({code:App.ERROR_TIMEOUT,retry:ra})},ia)});ra()}catch(pa){null!=N&&N(pa)}};Editor.prototype.getErrorMessage=function(l){var A=mxResources.get("error")+" "+l.getStatus();try{var N=l.getText(),X=JSON.parse(N);null!=X&&null!=X.error&&null!=X.error.message&&(A=X.error.message+" ("+A+")")}catch(U){}return A};Editor.prototype.absoluteCssFonts=function(l){var A=null;if(null!=l){var N=l.split("url(");if(0<N.length){A=[N[0]];l=window.location.pathname;var X=null!=l?l.lastIndexOf("/"):-1;0<=X&&(l=l.substring(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function Y(){mxEllipse.call(this)}function ea(){mxEllipse.call(this)}function la(){mxRhombus.call(this)}function oa(){mxEllipse.call(this)}function wa(){mxEllipse.call(this)}function sa(){mxEllipse.call(this)}function ua(){mxEllipse.call(this)}function Fa(){mxActor.call(this)}function Ua(){mxActor.call(this)}function Ra(){mxActor.call(this)}function Na(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1;this.rectStyle="square";this.size=10;this.absoluteCornerSize=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(K){F.stop();null!=this.exportDialog&&null!=this.exportDialog.parentNode&&(this.exportDialog.parentNode.removeChild(this.exportDialog),this.exportDialog=null);this.handleError(K)}),null,null,null,null,null,null,null,Editor.defaultBorder)}mxEvent.consume(u)}),Editor.cameraImage,mxResources.get("export"))}};EditorUi.prototype.saveData=function(d,f,k,u,z){this.isLocalFileSave()?this.saveLocalFile(k,d,u,z,f):this.saveRequest(d,f,mxUtils.bind(this,function(C,F){return this.createEchoRequest(k, C,u,z,f,F)}),k,z,u)};EditorUi.prototype.saveRequest=function(d,f,k,u,z,C,F){F=null!=F?F:!mxClient.IS_IOS||!navigator.standalone;var K=this.getServiceCount(!1);isLocalStorage&&K++;var O=4>=K?2:6<K?4:3;d=new CreateDialog(this,d,mxUtils.bind(this,function(H,ka){if("_blank"==ka||null!=H&&0<H.length){var fa=k("_blank"==ka?null:H,ka==App.MODE_DEVICE||"download"==ka||null==ka||"_blank"==ka?"0":"1");null!=fa&&(ka==App.MODE_DEVICE||"download"==ka||"_blank"==ka?fa.simulate(document,"_blank"):this.pickFolder(ka,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f&&f(ca)}}),null,null,null,mxUtils.bind(this,function(ka){null!=f&&f(ka)}),null,null,u,null,C.shadowVisible,null,C,z,null,null,null,"diagram",null)}catch(ka){null!=f&&f(ka)}};EditorUi.prototype.getEmbeddedSvg=function(d,f,k,u,z,C,F,K,O,H,ka,fa,ca){K=null!=K?K:!0;ka=null!=ka?ka:0;F=null!=O?O:f.background;F==mxConstants.NONE&&(F=null);C=f.getSvg(F,H,ka,null,null,C,null,null,null,f.shadowVisible||fa,null,ca,"diagram");(f.shadowVisible||fa)&&f.addSvgShadow(C,null,null,0==ka);null!=d&&C.setAttribute("content", d);null!=k&&C.setAttribute("resource",k);var ja=mxUtils.bind(this,function(ma){ma=(u?"":Graph.xmlDeclaration+"\n"+Graph.svgFileComment+"\n"+Graph.svgDoctype+"\n")+mxUtils.getXml(ma);null!=z&&z(ma);return ma});f.mathEnabled&&this.editor.addMathCss(C);if(null!=z)this.embedFonts(C,mxUtils.bind(this,function(ma){K?this.editor.convertImages(ma,mxUtils.bind(this,function(aa){ja(aa)})):ja(ma)}));else return ja(C)};EditorUi.prototype.embedFonts=function(d,f){this.editor.loadFonts(mxUtils.bind(this,function(){try{null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
A.split("|").map(function(U){U=U.split("^");return{name:U[0],url:U[1]}}),N=0;N<A.length;N++)this.graph.addExtFont(A[N].name,A[N].url)}catch(U){console.log("ExtFonts format error: "+U.message)}else null!=this.graph.extFonts&&0<this.graph.extFonts.length&&(this.graph.extFonts=[])}b.apply(this,arguments)}else throw{message:mxResources.get("notADiagramFile")||"Invalid data",toString:function(){return this.message}};};var e=Editor.prototype.getGraphXml;Editor.prototype.getGraphXml=function(l,A){l=null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
z=document.createElement("div");z.style.zIndex=mxPopupMenu.prototype.zIndex+2;z.style.border="3px dotted rgb(254, 137, 12)";z.style.pointerEvents="none";z.style.position="absolute";z.style.top=f+"px";z.style.left=k+"px";z.style.width=Math.max(0,C-3)+"px";z.style.height=Math.max(0,u-3)+"px";null!=d&&d.parentNode==this.editor.graph.container?this.editor.graph.container.appendChild(z):document.body.appendChild(z);return z};EditorUi.prototype.stringToCells=function(d){d=mxUtils.parseXml(d);var f=this.editor.extractGraphModel(d.documentElement); d=[];if(null!=f){var k=new mxCodec(f.ownerDocument),u=new mxGraphModel;k.decode(f,u);f=u.getChildAt(u.getRoot(),0);for(k=0;k<u.getChildCount(f);k++)d.push(u.getChildAt(f,k))}return d};EditorUi.prototype.openFileHandle=function(d,f,k,u,z){if(null!=f&&0<f.length){if(!this.useCanvasForExport&&/(\.png)$/i.test(f)||/(\.pdf)$/i.test(f))f=f.substring(0,f.length-4),/(\.drawio)$/i.test(f)||(f+=".drawio");var C=mxUtils.bind(this,function(K){f=0<=f.lastIndexOf(".")?f.substring(0,f.lastIndexOf("."))+".drawio":
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.getCellGeometry(oa[x]);null!=Ua&&(Fa.height=Ua.height)}Q.add(oa[x],ua,ea+(J?0:1))}var Ra=this.getCellGeometry(Y);null!=Ra&&(Ra=Ra.clone(),Ra.width+=wa,Q.setGeometry(Y,Ra))}finally{Q.endUpdate()}};Graph.prototype.deleteLane=function(x){var J=this.getModel();J.beginUpdate();try{var Q=null;Q="stackLayout"==this.getCurrentCellStyle(x).childLayout?x:J.getParent(x);var Y=J.getChildCells(Q,!0);0==Y.length?J.remove(Q):(Q==x&&(x=Y[Y.length-1]),J.remove(x))}finally{J.endUpdate()}};Graph.prototype.insertLane=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.getValue(this.style,"line")?(c.moveTo(m+n/2,v),c.lineTo(m+n/2,v+t)):(c.moveTo(m,v+t/2),c.lineTo(m+n,v+t/2));c.end();c.stroke()};mxCellRenderer.registerShape("lineEllipse",ua);mxUtils.extend(Fa,mxActor);Fa.prototype.redrawPath=function(c,m,v,n,t){m=Math.min(n,t/2);c.moveTo(0,0);c.lineTo(n-m,0);c.quadTo(n,0,n,t/2);c.quadTo(n,t,n-m,t);c.lineTo(0,t);c.close();c.end()};mxCellRenderer.registerShape("delay",Fa);mxUtils.extend(Ua,mxActor);Ua.prototype.size=.2;Ua.prototype.redrawPath=function(c,m, v,n,t){m=Math.min(t,n);var B=Math.max(0,Math.min(m,m*parseFloat(mxUtils.getValue(this.style,"size",this.size))));m=(t-B)/2;v=m+B;var D=(n-B)/2;B=D+B;c.moveTo(0,m);c.lineTo(D,m);c.lineTo(D,0);c.lineTo(B,0);c.lineTo(B,m);c.lineTo(n,m);c.lineTo(n,v);c.lineTo(B,v);c.lineTo(B,t);c.lineTo(D,t);c.lineTo(D,v);c.lineTo(0,v);c.close();c.end()};mxCellRenderer.registerShape("cross",Ua);mxUtils.extend(Ra,mxActor);Ra.prototype.size=.25;Ra.prototype.redrawPath=function(c,m,v,n,t){m=Math.min(n,t/2);v=Math.min(n-
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var CommentsWindow=function(b,e,g,p,y,q){function E(){for(var ca=C.getElementsByTagName("div"),ja=0,ma=0;ma<ca.length;ma++)"none"!=ca[ma].style.display&&ca[ma].parentNode==C&&ja++;F.style.display=0==ja?"block":"none"}function L(ca,ja,ma,aa){function S(){ja.removeChild(V);ja.removeChild(l);P.style.display="block";da.style.display="block"}k={div:ja,comment:ca,saveCallback:ma,deleteOnCancel:aa};var da=ja.querySelector(".geCommentTxt"),P=ja.querySelector(".geCommentActionsList"),V=document.createElement("textarea"); V.className="geCommentEditTxtArea";V.style.minHeight=da.offsetHeight+"px";V.value=ca.content;ja.insertBefore(V,da);var l=document.createElement("div");l.className="geCommentEditBtns";var A=mxUtils.button(mxResources.get("cancel"),function(){aa?(ja.parentNode.removeChild(ja),E()):S();k=null});A.className="geCommentEditBtn";l.appendChild(A);var N=mxUtils.button(mxResources.get("save"),function(){da.innerText="";ca.content=V.value;mxUtils.write(da,ca.content);S();ma(ca);k=null});mxEvent.addListener(V, "keydown",mxUtils.bind(this,function(X){mxEvent.isConsumed(X)||((mxEvent.isControlDown(X)||mxClient.IS_MAC&&mxEvent.isMetaDown(X))&&13==X.keyCode?(N.click(),mxEvent.consume(X)):27==X.keyCode&&(A.click(),mxEvent.consume(X)))}));N.focus();N.className="geCommentEditBtn gePrimaryBtn";l.appendChild(N);ja.insertBefore(l,da);P.style.display="none";da.style.display="none";V.focus()}function T(ca,ja){ja.innerText="";ca=new Date(ca.modifiedDate);var ma=b.timeSince(ca);null==ma&&(ma=mxResources.get("lessThanAMinute"));
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var WrapperWindow=function(b,e,g,p,y,q,E){var L=b.createSidebarContainer();E(L);this.window=new mxWindow(e,L,g,p,y,q,!0,!0);this.window.destroyOnClose=!1;this.window.setMaximizable(!1);this.window.setResizable(!0);this.window.setClosable(!0);this.window.setVisible(!0);b.installResizeHandler(this,!0);mxClient.IS_SF&&(this.window.div.onselectstart=mxUtils.bind(this,function(T){null==T&&(T=window.event);return null!=T&&b.isSelectionAllowed(T)}))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
H.y-K.x*F),M.moveTo(H.x,H.y)):"arc"==k?(F*=1.3,M.curveTo(fa.x-K.y*F,fa.y+K.x*F,H.x-K.y*F,H.y+K.x*F,H.x,H.y)):(M.moveTo(H.x,H.y),u=!0),F=[H],fa=!0))}else K=null;fa||(F.push(ka),z=ka)}this.addPoints(M,F,W,d,!1,null,u);M.stroke()}};var E=mxGraphView.prototype.getFixedTerminalPoint;mxGraphView.prototype.getFixedTerminalPoint=function(M,R,W,d){return null!=R&&"centerPerimeter"==R.style[mxConstants.STYLE_PERIMETER]?new mxPoint(R.getCenterX(),R.getCenterY()):E.apply(this,arguments)};var L=mxGraphView.prototype.updateFloatingTerminalPoint;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0,0,parseFloat(mxUtils.getValue(this.style,"size",this.size))*this.scale)};ma.prototype.isRoundable=function(){return!0};ma.prototype.redrawPath=function(c,m,v,n,t){m=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;v=Math.max(0,Math.min(t,parseFloat(mxUtils.getValue(this.style,"size",this.size))));var B=n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"position",this.position)))),D=n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"position2",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.ui.pages.push(this.ui.createPage());0>mxUtils.indexOf(this.ui.pages,this.ui.currentPage)&&this.ui.selectPage(this.ui.pages[0],!0)}finally{L.container.style.visibility="";L.model.endUpdate();L.cellRenderer.redraw=R;this.changeListenerEnabled=T;g||(y.history=q,y.indexOfNextAdd=E,y.fireEvent(new mxEventObject(mxEvent.CLEAR)));if(null==this.ui.currentPage||this.ui.currentPage.needsUpdate)M!=L.mathEnabled?(this.ui.editor.updateGraphComponents(),L.refresh()):(G!=L.foldingEnabled?L.view.revalidate(): L.view.validate(),L.sizeDidChange());null!=this.sync&&this.isRealtime()&&!p&&(this.sync.snapshot=this.ui.clonePages(this.ui.pages));this.ui.editor.fireEvent(new mxEventObject("pagesPatched","patches",b))}EditorUi.debug("DrawioFile.patch",[this],"patches",b,"resolver",e,"undoable",g)}return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.sidebarWindow.window.addListener(mxEvent.SHOW,mxUtils.bind(this,function(){this.sidebarWindow.window.fit()}));this.sidebarWindow.window.minimumSize=new mxRectangle(0,0,90,90);this.sidebarWindow.window.setVisible(!1)}};EditorUi.prototype.setSketchMode=function(d){this.spinner.spin(document.body,mxResources.get("working")+"...")&&window.setTimeout(mxUtils.bind(this,function(){this.spinner.stop();this.doSetSketchMode(d);null==urlParams.rough&&(mxSettings.settings.sketchMode=d,mxSettings.save()); this.fireEvent(new mxEventObject("sketchModeChanged"))}),0)};Editor.createMinimalCss=function(){return(Editor.isDarkMode()?"html body .geMenubarContainer .geMenuItem .geMenuItem, html body .geMenubarContainer a.geMenuItem { color: #353535; }html body .geToolbarContainer .geMenuItem, html body .geToolbarContainer .geToolbarButton, html body .geMenubarContainer .geMenuItem .geMenuItem, html body .geMenubarContainer a.geMenuItem,html body .geMenubarContainer .geToolbarButton { filter: invert(1); }html > body.geEditor > div > a.geItem { background-color: "+
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.changeHandler=null)}}();(function(){function b(c,m,v){mxShape.call(this);this.line=c;this.stroke=m;this.strokewidth=null!=v?v:1;this.updateBoundsFromLine()}function e(){mxSwimlane.call(this)}function g(){mxSwimlane.call(this)}function p(){mxCylinder.call(this)}function y(){mxConnector.call(this)}function q(){mxCylinder.call(this)}function E(){mxActor.call(this)}function L(){mxCylinder.call(this)}function T(){mxCylinder.call(this)}function G(){mxCylinder.call(this)}function M(){mxCylinder.call(this)}function R(){mxShape.call(this)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(null!=Z||0<=mxUtils.indexOf(ba,mxUtils.hex2rgb(ia.fill)))?"solid":qa.fillStyle);ia.fillStyle=ba;return ia};l.prototype.begin=function(){this.passThrough?this.originalBegin.apply(this.canvas,arguments):this.path=[]};l.prototype.end=function(){this.passThrough&&this.originalEnd.apply(this.canvas,arguments)};l.prototype.addOp=function(){if(null!=this.path&&(this.path.push(arguments[0]),2<arguments.length))for(var Z=2;Z<arguments.length;Z+=2)this.lastX=arguments[Z-1],this.lastY=arguments[Z],this.path.push(this.canvas.format(this.lastX)), this.path.push(this.canvas.format(this.lastY))};l.prototype.lineTo=function(Z,ba){this.passThrough?this.originalLineTo.apply(this.canvas,arguments):(this.addOp(this.lineOp,Z,ba),this.lastX=Z,this.lastY=ba)};l.prototype.moveTo=function(Z,ba){this.passThrough?this.originalMoveTo.apply(this.canvas,arguments):(this.addOp(this.moveOp,Z,ba),this.lastX=Z,this.lastY=ba,this.firstX=Z,this.firstY=ba)};l.prototype.close=function(){this.passThrough?this.originalClose.apply(this.canvas,arguments):this.addOp(this.closeOp)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
xa=Array(pa.length);for(var Ca=0;Ca<pa.length;Ca++)xa[Ca]=String.fromCharCode(pa[Ca]);xa=xa.join("")}Z=null!=Z?Z:"data:image/png;base64,";xa=Z+Editor.base64Encode(xa)}A(xa)}}else null!=N&&(0==pa.getStatus()?N({message:mxResources.get("accessDenied")},pa):404==pa.getStatus()?N({message:mxResources.get("fileNotFound"),code:pa.getStatus()},pa):N({message:this.getErrorMessage(pa)},pa))}),function(pa){null!=N&&N({message:mxResources.get("error")+" "+pa.getStatus()})},qa,this.timeout,function(){U&&null!= N&&N({code:App.ERROR_TIMEOUT,retry:ra})},ia)});ra()}catch(pa){null!=N&&N(pa)}};Editor.prototype.getErrorMessage=function(l){var A=mxResources.get("error")+" "+l.getStatus();try{var N=l.getText(),X=JSON.parse(N);null!=X&&null!=X.error&&null!=X.error.message&&(A=X.error.message+" ("+A+")")}catch(U){}return A};Editor.prototype.absoluteCssFonts=function(l){var A=null;if(null!=l){var N=l.split("url(");if(0<N.length){A=[N[0]];l=window.location.pathname;var X=null!=l?l.lastIndexOf("/"):-1;0<=X&&(l=l.substring(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
arguments)||0>mxUtils.indexOf(C,jb)};this.executeLayout(function(){lb.execute(O.getDefaultParent());Ra()},!0,ra);ra=null}else if("organic"==za||"auto"==za&&sa.length>C.length){O.view.validate();var Pa=new mxFastOrganicLayout(O);Pa.forceConstant=3*ba;Pa.disableEdgeStyle=!1;Pa.resetEdges=!1;var eb=Pa.isVertexIgnored;Pa.isVertexIgnored=function(jb){return eb.apply(this,arguments)||0>mxUtils.indexOf(C,jb)};this.executeLayout(function(){Pa.execute(O.getDefaultParent());Ra()},!0,ra);ra=null}}this.hideDialog()}finally{O.model.endUpdate()}null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
try{p.pasteXml(M,!0)}finally{q.getModel().endUpdate()}}else mxClipboard.paste(q)}),G=!0)}catch(M){}G||mxClipboard.paste(q)}},!1,"sprite-paste",Editor.ctrlKey+"+V");this.addAction("pasteHere",function(G){function M(W){if(null!=W){for(var d=!0,f=0;f<W.length&&d;f++)d=d&&q.model.isEdge(W[f]);var k=q.view.translate;f=q.view.scale;var u=k.x,z=k.y;k=null;if(1==W.length&&d){var C=q.getCellGeometry(W[0]);null!=C&&(k=C.getTerminalPoint(!0))}k=null!=k?k:q.getBoundingBoxFromGeometry(W,d);null!=k&&(d=Math.round(q.snap(q.popupMenuHandler.triggerX/
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.showError=function(b,e,g,p,y,q,E,L,T,G,M,R,W){b=new ErrorDialog(this,b,e,g||mxResources.get("ok"),p,y,q,E,R,L,T);e=Math.ceil(null!=e?e.length/50:1);this.showDialog(b.container,G||340,M||100+20*e,!0,!1,W);b.init()};EditorUi.prototype.showDialog=function(b,e,g,p,y,q,E,L,T,G){this.editor.graph.tooltipHandler.resetTimer();this.editor.graph.tooltipHandler.hideTooltip();null==this.dialogs&&(this.dialogs=[]);this.dialog=new Dialog(this,b,e,g,p,y,q,E,L,T,G);this.dialogs.push(this.dialog)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
try{p.pasteXml(M,!0)}finally{q.getModel().endUpdate()}}else mxClipboard.paste(q)}),G=!0)}catch(M){}G||mxClipboard.paste(q)}},!1,"sprite-paste",Editor.ctrlKey+"+V");this.addAction("pasteHere",function(G){function M(W){if(null!=W){for(var d=!0,f=0;f<W.length&&d;f++)d=d&&q.model.isEdge(W[f]);var k=q.view.translate;f=q.view.scale;var u=k.x,z=k.y;k=null;if(1==W.length&&d){var C=q.getCellGeometry(W[0]);null!=C&&(k=C.getTerminalPoint(!0))}k=null!=k?k:q.getBoundingBoxFromGeometry(W,d);null!=k&&(d=Math.round(q.snap(q.popupMenuHandler.triggerX/ f-u)),f=Math.round(q.snap(q.popupMenuHandler.triggerY/f-z)),q.cellsMoved(W,d-k.x,f-k.y))}}function R(){q.getModel().beginUpdate();try{M(mxClipboard.paste(q))}finally{q.getModel().endUpdate()}}if(q.isEnabled()&&!q.isCellLocked(q.getDefaultParent())){G=!1;try{Editor.enableNativeCipboard&&(p.readGraphModelFromClipboard(function(W){if(null!=W){q.getModel().beginUpdate();try{M(p.pasteXml(W,!0))}finally{q.getModel().endUpdate()}}else R()}),G=!0)}catch(W){}G||R()}});this.addAction("copySize",function(){var G=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.dblClick=function(x,J){this.isEnabled()&&(J=this.insertTextForEvent(x,J),mxGraph.prototype.dblClick.call(this,x,J))};Graph.prototype.insertTextForEvent=function(x,J){var Q=mxUtils.convertPoint(this.container,mxEvent.getClientX(x),mxEvent.getClientY(x));if(null!=x&&!this.model.isVertex(J)){var Y=this.model.isEdge(J)?this.view.getState(J):null,ea=mxEvent.getSource(x);this.firstClickState!=Y||this.firstClickSource!=ea||null!=Y&&null!=Y.text&&null!=Y.text.node&&null!=Y.text.boundingBox&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
B)c.lineTo(n-I,t-ha-.5*I);else if("fold"==D||"default"==D&&"fold"==B)c.lineTo(n-ha-I,t-ha-I),c.lineTo(n-I,t-ha-I)};Na.prototype.paintBottomInner=function(c,m,v,n,t,B,D,ha,I,va,na){va||na?!va&&na?c.lineTo(n,t-I):va&&!na?c.lineTo(n-I,t):"square"==D||"default"==D&&"square"==B||!va?c.lineTo(n-I,t-I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.lineTo(n-ha-.5*I,t-I):c.lineTo(n-ha-I,t-I):c.lineTo(n,t)};Na.prototype.paintSWInner=function(c,m,v,n,t,B,D,ha,I,va){if(!va)c.lineTo(I, t);else if("square"==D||"default"==D&&"square"==B)c.lineTo(I,t-I);else if("rounded"==D||"default"==D&&"rounded"==B)c.arcTo(ha-.5*I,ha-.5*I,0,0,0,ha+.5*I,t-I);else if("invRound"==D||"default"==D&&"invRound"==B)c.arcTo(ha+I,ha+I,0,0,1,ha+I,t-I);else if("snip"==D||"default"==D&&"snip"==B)c.lineTo(ha+.5*I,t-I);else if("fold"==D||"default"==D&&"fold"==B)c.lineTo(I+ha,t-ha-I),c.lineTo(I+ha,t-I)};Na.prototype.moveSWInner=function(c,m,v,n,t,B,D,ha,I,va){va?"square"==D||"default"==D&&"square"==B?c.moveTo(I,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"arrowSize",this.arrowSize))));v=(t-B)/2;B=v+B;var D=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,v),new mxPoint(n-m,v),new mxPoint(n-m,0),new mxPoint(n,t/2),new mxPoint(n-m,t),new mxPoint(n-m,B),new mxPoint(0,B)],this.isRounded,D,!0);c.end()};mxCellRenderer.registerShape("singleArrow",Wa);mxUtils.extend(La,mxActor);La.prototype.redrawPath=function(c,m,v,n,t){var B=t*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"arrowWidth", Wa.prototype.arrowWidth))));m=n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"arrowSize",Wa.prototype.arrowSize))));v=(t-B)/2;B=v+B;var D=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,t/2),new mxPoint(m,0),new mxPoint(m,v),new mxPoint(n-m,v),new mxPoint(n-m,0),new mxPoint(n,t/2),new mxPoint(n-m,t),new mxPoint(n-m,B),new mxPoint(m,B),new mxPoint(m,t)],this.isRounded,D,!0);c.end()};mxCellRenderer.registerShape("doubleArrow",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.addUndoListener=function(){var b=this.editor.undoManager,e=mxUtils.bind(this,function(){this.updateActionStates()});b.addListener(mxEvent.ADD,e);b.addListener(mxEvent.UNDO,e);b.addListener(mxEvent.REDO,e);b.addListener(mxEvent.CLEAR,e);var g=this.editor.graph.cellEditor.startEditing;this.editor.graph.cellEditor.startEditing=function(){g.apply(this,arguments);e()};var p=this.editor.graph.cellEditor.stopEditing;this.editor.graph.cellEditor.stopEditing=function(y,q){p.apply(this,arguments); e()};e()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null,!0)}else this.graph.openLink(this.getEditBlankUrl(e)+"#R"+encodeURIComponent(b))};Editor.prototype.createGraph=function(b,e){b=new Graph(null,e,null,null,b);b.transparentBackground=!1;var g=b.isCssTransformsSupported,p=this;b.isCssTransformsSupported=function(){return g.apply(this,arguments)&&(!p.chromeless||!mxClient.IS_SF)};this.chromeless||(b.isBlankLink=function(y){return!this.isExternalProtocol(y)});return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
'"/>','<img style="margin-top:8px;" src="'+Editor.hiResImage+'"/>',isLocalStorage||mxClient.IS_CHROMEAPP)).container,340,isLocalStorage||mxClient.IS_CHROMEAPP?220:200,!0,!0):z(!1,u)};EditorUi.prototype.parseFile=function(d,f,k){k=null!=k?k:d.name;var u=new FileReader;u.onload=mxUtils.bind(this,function(){this.parseFileData(u.result,f,k)});u.readAsText(d)};EditorUi.prototype.parseFileData=function(d,f,k){var u=new XMLHttpRequest;u.open("POST",OPEN_URL);u.setRequestHeader("Content-Type","application/x-www-form-urlencoded"); u.onreadystatechange=function(){f(u)};u.send("format=xml&filename="+encodeURIComponent(k)+"&data="+encodeURIComponent(d));try{EditorUi.logEvent({category:"GLIFFY-IMPORT-FILE",action:"size_"+file.size})}catch(z){}};EditorUi.prototype.isResampleImageSize=function(d,f){f=null!=f?f:this.resampleThreshold;return d>f};EditorUi.prototype.resizeImage=function(d,f,k,u,z,C,F){z=null!=z?z:this.maxImageSize;var K=Math.max(1,d.width),O=Math.max(1,d.height);if(u&&this.isResampleImageSize(null!=F?F:f.length,C))try{var H=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0),new mxPoint(n,0),new mxPoint(n,v),new mxPoint((n+m)/2,v),new mxPoint((n+m)/2,t),new mxPoint((n-m)/2,t),new mxPoint((n-m)/2,v),new mxPoint(0,v)],this.isRounded,B,!0);c.end()};mxCellRenderer.registerShape("tee",Va);mxUtils.extend(Wa,mxActor);Wa.prototype.arrowWidth=.3;Wa.prototype.arrowSize=.2;Wa.prototype.redrawPath=function(c,m,v,n,t){var B=t*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"arrowWidth",this.arrowWidth))));m=n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style, "arrowSize",this.arrowSize))));v=(t-B)/2;B=v+B;var D=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,v),new mxPoint(n-m,v),new mxPoint(n-m,0),new mxPoint(n,t/2),new mxPoint(n-m,t),new mxPoint(n-m,B),new mxPoint(0,B)],this.isRounded,D,!0);c.end()};mxCellRenderer.registerShape("singleArrow",Wa);mxUtils.extend(La,mxActor);La.prototype.redrawPath=function(c,m,v,n,t){var B=t*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"arrowWidth",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.path.push(this.canvas.format(this.lastY))};l.prototype.lineTo=function(Z,ba){this.passThrough?this.originalLineTo.apply(this.canvas,arguments):(this.addOp(this.lineOp,Z,ba),this.lastX=Z,this.lastY=ba)};l.prototype.moveTo=function(Z,ba){this.passThrough?this.originalMoveTo.apply(this.canvas,arguments):(this.addOp(this.moveOp,Z,ba),this.lastX=Z,this.lastY=ba,this.firstX=Z,this.firstY=ba)};l.prototype.close=function(){this.passThrough?this.originalClose.apply(this.canvas,arguments):this.addOp(this.closeOp)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.getDataForCells=function(b){for(var e=[],g=0;g<b.length;g++){var p=null!=b[g].value?b[g].value.attributes:null,y={};y.id=b[g].id;if(null!=p)for(var q=0;q<p.length;q++)y[p[q].nodeName]=p[q].nodeValue;else y.label=this.convertValueToString(b[g]);e.push(y)}return e};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(0<K.length&&(K+="\n"),K+=F);F=new LocalFile(this,"csv"!=d.format&&0<K.length?K:this.emptyDiagramXml,null!=urlParams.title?decodeURIComponent(urlParams.title):this.defaultFilename,!0);F.getHash=function(){return u};this.fileLoaded(F);"csv"==d.format&&this.importCsv(K,mxUtils.bind(this,function(ca){this.editor.undoManager.clear();this.editor.setModified(!1);this.editor.setStatus("")}));if(null!=d.update){var O=null!=d.interval?parseInt(d.interval):6E4,H=null,ka=mxUtils.bind(this,function(){var ca=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable