code stringlengths 14 2.05k | label int64 0 1 | programming_language stringclasses 7 values | cwe_id stringlengths 6 14 | cwe_name stringlengths 5 98 ⌀ | description stringlengths 36 379 ⌀ | url stringlengths 36 48 ⌀ | label_name stringclasses 2 values |
|---|---|---|---|---|---|---|---|
Graph.prototype.getCellsForUngroup=function(E){E=p.apply(this,arguments);for(var L=[],T=0;T<E.length;T++)this.isTable(E[T])||this.isTableRow(E[T])||this.isTableCell(E[T])||L.push(E[T]);return L};Graph.prototype.updateCssTransform=function(){var E=this.view.getDrawPane();if(null!=E)if(E=E.parentNode,this.useCssTransforms){var L=E.getAttribute("transform");E.setAttribute("transformOrigin","0 0");var T=Math.round(100*this.currentScale)/100;E.setAttribute("transform","scale("+T+","+T+")translate("+Math.round(100*
this.currentTranslate.x)/100+","+Math.round(100*this.currentTranslate.y)/100+")");L!=E.getAttribute("transform")&&this.fireEvent(new mxEventObject("cssTransformChanged"),"transform",E.getAttribute("transform"))}else E.removeAttribute("transformOrigin"),E.removeAttribute("transform")};var y=mxGraphView.prototype.validateBackgroundPage;mxGraphView.prototype.validateBackgroundPage=function(){var E=this.graph.useCssTransforms,L=this.scale,T=this.translate;E&&(this.scale=this.graph.currentScale,this.translate= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c.lineTo(B,B),c.close(),c.fill()),0!=ha&&(c.setFillAlpha(Math.abs(ha)),c.setFillColor(0>ha?"#FFFFFF":"#000000"),c.begin(),c.moveTo(0,0),c.lineTo(B,B),c.lineTo(B,t),c.lineTo(0,t-B),c.close(),c.fill()),c.begin(),c.moveTo(B,t),c.lineTo(B,B),c.lineTo(0,0),c.moveTo(B,B),c.lineTo(n,B),c.end(),c.stroke())};p.prototype.getLabelMargins=function(c){return mxUtils.getValue(this.style,"boundedLbl",!1)?(c=parseFloat(mxUtils.getValue(this.style,"size",this.size))*this.scale,new mxRectangle(c,c,0,0)):null};mxCellRenderer.registerShape("cube", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"transform 0.3s ease-in-out");mxUtils.setPrefixedStyle(this.sidebarContainer.style,"transform-origin","top left");window.setTimeout(mxUtils.bind(this,function(){mxUtils.setPrefixedStyle(this.sidebarContainer.style,"transition",null);mxUtils.setPrefixedStyle(this.sidebarContainer.style,"transform",null);mxUtils.setPrefixedStyle(this.sidebarContainer.style,"transform-origin",null);0==z&&u()}),300)}),10)};EditorUi.prototype.isShapesPanelVisible=function(){return 0<this.hsplitPosition};var T=EditorUi.prototype.isFormatPanelVisible; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
return(A^-1)>>>0};Editor.writeGraphModelToPng=function(l,A,N,X,U){function Z(pa,xa){var Ca=qa;qa+=xa;return pa.substring(Ca,qa)}function ba(pa){pa=Z(pa,4);return pa.charCodeAt(3)+(pa.charCodeAt(2)<<8)+(pa.charCodeAt(1)<<16)+(pa.charCodeAt(0)<<24)}function ia(pa){return String.fromCharCode(pa>>24&255,pa>>16&255,pa>>8&255,pa&255)}l=l.substring(l.indexOf(",")+1);l=window.atob?atob(l):Base64.decode(l,!0);var qa=0;if(Z(l,8)!=String.fromCharCode(137)+"PNG"+String.fromCharCode(13,10,26,10))null!=U&&U(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
x&&(new mxCodec(x.ownerDocument)).decode(x,this.getStylesheet())};Graph.prototype.createCellLookup=function(x,J){J=null!=J?J:{};for(var Q=0;Q<x.length;Q++){var Y=x[Q];J[mxObjectIdentity.get(Y)]=Y.getId();for(var ea=this.model.getChildCount(Y),la=0;la<ea;la++)this.createCellLookup([this.model.getChildAt(Y,la)],J)}return J};Graph.prototype.createCellMapping=function(x,J,Q){Q=null!=Q?Q:{};for(var Y in x){var ea=J[Y];null==Q[ea]&&(Q[ea]=x[Y].getId()||"")}return Q};Graph.prototype.importGraphModel=function(x, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxSettings.save())));this.addListener("formatWidthChanged",function(){mxSettings.setFormatWidth(this.formatWidth);mxSettings.save()})}};EditorUi.prototype.copyImage=function(d,f,k){try{null!=navigator.clipboard&&"function"===typeof window.ClipboardItem&&this.spinner.spin(document.body,mxResources.get("exporting"))&&this.editor.exportToCanvas(mxUtils.bind(this,function(u,z){try{this.spinner.stop();var C=this.createImageDataUri(u,f,"png"),F=parseInt(z.getAttribute("width")),K=parseInt(z.getAttribute("height"));
this.writeImageToClipboard(C,F,K,mxUtils.bind(this,function(O){this.handleError(O)}))}catch(O){this.handleError(O)}}),null,null,null,mxUtils.bind(this,function(u){this.spinner.stop();this.handleError(u)}),null,null,null!=k?k:4,null==this.editor.graph.background||this.editor.graph.background==mxConstants.NONE,null,null,null,10,null,null,!1,null,0<d.length?d:null)}catch(u){this.handleError(u)}};EditorUi.prototype.writeImageToClipboard=function(d,f,k,u){var z=this.base64ToBlob(d.substring(d.indexOf(",")+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c=c.getCenterY();c=new mxPoint(va,c);n&&(v.x<D||v.x>D+I?c.y=v.y:c.x=v.x);return mxUtils.getPerimeterPoint(ha,c,v)};mxStyleRegistry.putValue("parallelogramPerimeter",mxPerimeter.ParallelogramPerimeter);mxPerimeter.TrapezoidPerimeter=function(c,m,v,n){var t="0"!=mxUtils.getValue(m.style,"fixedSize","0"),B=t?O.prototype.fixedSize:O.prototype.size;null!=m&&(B=mxUtils.getValue(m.style,"size",B));t&&(B*=m.view.scale);var D=c.x,ha=c.y,I=c.width,va=c.height;m=null!=m?mxUtils.getValue(m.style,mxConstants.STYLE_DIRECTION,
mxConstants.DIRECTION_EAST):mxConstants.DIRECTION_EAST;m==mxConstants.DIRECTION_EAST?(t=t?Math.max(0,Math.min(.5*I,B)):I*Math.max(0,Math.min(1,B)),ha=[new mxPoint(D+t,ha),new mxPoint(D+I-t,ha),new mxPoint(D+I,ha+va),new mxPoint(D,ha+va),new mxPoint(D+t,ha)]):m==mxConstants.DIRECTION_WEST?(t=t?Math.max(0,Math.min(I,B)):I*Math.max(0,Math.min(1,B)),ha=[new mxPoint(D,ha),new mxPoint(D+I,ha),new mxPoint(D+I-t,ha+va),new mxPoint(D+t,ha+va),new mxPoint(D,ha)]):m==mxConstants.DIRECTION_NORTH?(t=t?Math.max(0,
Math.min(va,B)):va*Math.max(0,Math.min(1,B)),ha=[new mxPoint(D,ha+t),new mxPoint(D+I,ha),new mxPoint(D+I,ha+va),new mxPoint(D,ha+va-t),new mxPoint(D,ha+t)]):(t=t?Math.max(0,Math.min(va,B)):va*Math.max(0,Math.min(1,B)),ha=[new mxPoint(D,ha),new mxPoint(D+I,ha+t),new mxPoint(D+I,ha+va-t),new mxPoint(D,ha+va),new mxPoint(D,ha)]);va=c.getCenterX();c=c.getCenterY();c=new mxPoint(va,c);n&&(v.x<D||v.x>D+I?c.y=v.y:c.x=v.x);return mxUtils.getPerimeterPoint(ha,c,v)};mxStyleRegistry.putValue("trapezoidPerimeter", | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.createControlTab=function(b,e,g){var p=this.createTab();p.className="geTab geControlTab";p.style.width="30px";null!=b&&p.setAttribute("title",b);b=document.createElement("div");b.className="geAdaptiveAsset";b.style.backgroundImage="url("+e+")";b.style.backgroundRepeat="no-repeat";b.style.backgroundPosition="center";b.style.backgroundSize="24px";b.style.position="relative";b.style.opacity="0.5";b.style.width="100%";b.style.height="100%";p.appendChild(b);mxEvent.addListener(p,"click",
g);return p};EditorUi.prototype.createPageInsertTab=function(){return this.createControlTab(mxResources.get("insertPage"),Editor.plusImage,mxUtils.bind(this,function(b){this.insertPage();mxEvent.consume(b)}))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.bind(this,fa.prototype.curveTo);this.originalArcTo=this.canvas.arcTo;this.canvas.arcTo=mxUtils.bind(this,fa.prototype.arcTo)}function ca(){mxRectangleShape.call(this)}function ja(){mxRectangleShape.call(this)}function ma(){mxActor.call(this)}function aa(){mxActor.call(this)}function S(){mxActor.call(this)}function da(){mxRectangleShape.call(this)}function P(){mxRectangleShape.call(this)}function V(){mxCylinder.call(this)}function l(){mxShape.call(this)}function A(){mxShape.call(this)}function N(){mxEllipse.call(this)} | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"-rev_"+this.ui.hashValue(L):"")+(null!=z?"-latest_"+z:"")+(null!=k?"-latestRev_"+this.ui.hashValue(k.getCurrentRevisionId()):""));EditorUi.logEvent({category:"CHECKSUM-ERROR-SYNC-FILE-"+W,action:y,label:"user_"+R+(null!=this.sync?"-client_"+this.sync.clientId:"-nosync")+"-bytes_"+d+"-patches_"+e.length+"-size_"+this.getSize()})}catch(C){}}),b)}}catch(k){}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
N&&N({code:App.ERROR_TIMEOUT,retry:ra})},ia)});ra()}catch(pa){null!=N&&N(pa)}};Editor.prototype.getErrorMessage=function(l){var A=mxResources.get("error")+" "+l.getStatus();try{var N=l.getText(),X=JSON.parse(N);null!=X&&null!=X.error&&null!=X.error.message&&(A=X.error.message+" ("+A+")")}catch(U){}return A};Editor.prototype.absoluteCssFonts=function(l){var A=null;if(null!=l){var N=l.split("url(");if(0<N.length){A=[N[0]];l=window.location.pathname;var X=null!=l?l.lastIndexOf("/"):-1;0<=X&&(l=l.substring(0,
X+1));X=document.getElementsByTagName("base");var U=null;null!=X&&0<X.length&&(U=X[0].getAttribute("href"));for(var Z=1;Z<N.length;Z++)if(X=N[Z].indexOf(")"),0<X){var ba=Editor.trimCssUrl(N[Z].substring(0,X));this.graph.isRelativeUrl(ba)&&(ba=null!=U?U+ba:window.location.protocol+"//"+window.location.hostname+("/"==ba.charAt(0)?"":l)+ba);A.push('url("'+ba+'"'+N[Z].substring(X))}else A.push(N[Z])}else A=[l]}return null!=A?A.join(""):null};Editor.prototype.mapFontUrl=function(l,A,N){/^https?:\/\//.test(A)&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.executeLayouts=function(b,e){this.executeLayout(mxUtils.bind(this,function(){var g=new mxCompositeLayout(this.editor.graph,b),p=this.editor.graph.getSelectionCells();g.execute(this.editor.graph.getDefaultParent(),0==p.length?null:p)}),!0,e)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"^"+U.url}),N.setAttribute("extFonts",X.join("|")));return N};Editor.prototype.isDataSvg=function(l){try{var A=mxUtils.parseXml(l).documentElement.getAttribute("content");if(null!=A&&(null!=A&&"<"!=A.charAt(0)&&"%"!=A.charAt(0)&&(A=unescape(window.atob?atob(A):Base64.decode(cont,A))),null!=A&&"%"==A.charAt(0)&&(A=decodeURIComponent(A)),null!=A&&0<A.length)){var N=mxUtils.parseXml(A).documentElement;return"mxfile"==N.nodeName||"mxGraphModel"==N.nodeName}}catch(X){}return!1};Editor.prototype.extractGraphModel= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.br(d);return{getColor:function(){return C},getTarget:function(){return u.value},focus:function(){u.focus()}}};EditorUi.prototype.createUrlParameters=function(d,f,k,u,z,C,F){F=null!=F?F:[];u&&("https://viewer.diagrams.net"==EditorUi.lightboxHost&&"1"!=urlParams.dev||F.push("lightbox=1"),"auto"!=d&&F.push("target="+d),null!=f&&f!=mxConstants.NONE&&F.push("highlight="+("#"==f.charAt(0)?f.substring(1):f)),null!=z&&0<z.length&&F.push("edit="+encodeURIComponent(z)),C&&F.push("layers=1"),this.editor.graph.foldingEnabled&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"arrowSize"],function(v){var n=Math.max(0,Math.min(1,mxUtils.getValue(this.state.style,"arrowWidth",Wa.prototype.arrowWidth))),t=Math.max(0,Math.min(c,mxUtils.getValue(this.state.style,"arrowSize",Wa.prototype.arrowSize)));return new mxPoint(v.x+(1-t)*v.width,v.y+(1-n)*v.height/2)},function(v,n){this.state.style.arrowWidth=Math.max(0,Math.min(1,Math.abs(v.y+v.height/2-n.y)/v.height*2));this.state.style.arrowSize=Math.max(0,Math.min(c,(v.x+v.width-n.x)/v.width))})]}},nb=function(c){return function(m){return[hb(m,
["size"],function(v){var n=Math.max(0,Math.min(.5*v.height,parseFloat(mxUtils.getValue(this.state.style,"size",c))));return new mxPoint(v.x,v.y+n)},function(v,n){this.state.style.size=Math.max(0,n.y-v.y)},!0)]}},ub=function(c,m,v){return function(n){var t=[hb(n,["size"],function(B){var D=Math.max(0,Math.min(B.width,Math.min(B.height,parseFloat(mxUtils.getValue(this.state.style,"size",m)))))*c;return new mxPoint(B.x+D,B.y+D)},function(B,D){this.state.style.size=Math.round(Math.max(0,Math.min(Math.min(B.width, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.keyupHandler=mxUtils.bind(this,function(P){y.container.style.cursor="";this.shiftDown=this.spaceDown=!1});mxEvent.addListener(document,"keyup",this.keyupHandler);var C=y.panningHandler.isForcePanningEvent;y.panningHandler.isForcePanningEvent=function(P){return C.apply(this,arguments)||p.isSpaceDown()||mxEvent.isMouseEvent(P.getEvent())&&(this.usePopupTrigger||!mxEvent.isPopupTrigger(P.getEvent()))&&(!mxEvent.isControlDown(P.getEvent())&&mxEvent.isRightMouseButton(P.getEvent())||mxEvent.isMiddleMouseButton(P.getEvent()))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.bind(this,fa.prototype.curveTo);this.originalArcTo=this.canvas.arcTo;this.canvas.arcTo=mxUtils.bind(this,fa.prototype.arcTo)}function ca(){mxRectangleShape.call(this)}function ja(){mxRectangleShape.call(this)}function ma(){mxActor.call(this)}function aa(){mxActor.call(this)}function S(){mxActor.call(this)}function da(){mxRectangleShape.call(this)}function P(){mxRectangleShape.call(this)}function V(){mxCylinder.call(this)}function l(){mxShape.call(this)}function A(){mxShape.call(this)}function N(){mxEllipse.call(this)} | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.prototype.cellsRemoved=function(x){if(null!=x){for(var J=new mxDictionary,Q=0;Q<x.length;Q++)J.put(x[Q],!0);var Y=[];for(Q=0;Q<x.length;Q++){var ea=this.model.getParent(x[Q]);null==ea||J.get(ea)||(J.put(ea,!0),Y.push(ea))}for(Q=0;Q<Y.length;Q++)if(ea=this.view.getState(Y[Q]),null!=ea&&(this.model.isEdge(ea.cell)||this.model.isVertex(ea.cell))&&this.isCellDeletable(ea.cell)&&this.isTransparentState(ea)){for(var la=!0,oa=0;oa<this.model.getChildCount(ea.cell)&&la;oa++)J.get(this.model.getChildAt(ea.cell,
oa))||(la=!1);la&&x.push(ea.cell)}}mxGraph.prototype.cellsRemoved.apply(this,arguments)};Graph.prototype.removeCellsAfterUngroup=function(x){for(var J=[],Q=0;Q<x.length;Q++)this.isCellDeletable(x[Q])&&this.isTransparentState(this.view.getState(x[Q]))&&J.push(x[Q]);x=J;mxGraph.prototype.removeCellsAfterUngroup.apply(this,arguments)};Graph.prototype.setLinkForCell=function(x,J){this.setAttributeForCell(x,"link",J)};Graph.prototype.setTooltipForCell=function(x,J){var Q="tooltip";Graph.translateDiagram&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.createRoughCanvas=function(l){var A=rough.canvas({getContext:function(){return l}});A.draw=function(N){var X=N.sets||[];N=N.options||this.getDefaultOptions();for(var U=0;U<X.length;U++){var Z=X[U];switch(Z.type){case "path":null!=N.stroke&&this._drawToContext(l,Z,N);break;case "fillPath":this._drawToContext(l,Z,N);break;case "fillSketch":this.fillSketch(l,Z,N)}}};A.fillSketch=function(N,X,U){var Z=l.state.strokeColor,ba=l.state.strokeWidth,ia=l.state.strokeAlpha,qa=l.state.dashed,ra=U.fillWeight; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
X+1));X=document.getElementsByTagName("base");var U=null;null!=X&&0<X.length&&(U=X[0].getAttribute("href"));for(var Z=1;Z<N.length;Z++)if(X=N[Z].indexOf(")"),0<X){var ba=Editor.trimCssUrl(N[Z].substring(0,X));this.graph.isRelativeUrl(ba)&&(ba=null!=U?U+ba:window.location.protocol+"//"+window.location.hostname+("/"==ba.charAt(0)?"":l)+ba);A.push('url("'+ba+'"'+N[Z].substring(X))}else A.push(N[Z])}else A=[l]}return null!=A?A.join(""):null};Editor.prototype.mapFontUrl=function(l,A,N){/^https?:\/\//.test(A)&&
!this.isCorsEnabledForUrl(A)&&(A=PROXY_URL+"?url="+encodeURIComponent(A));N(l,A)};Editor.prototype.embedCssFonts=function(l,A){var N=l.split("url("),X=0;null==this.cachedFonts&&(this.cachedFonts={});var U=mxUtils.bind(this,function(){if(0==X){for(var qa=[N[0]],ra=1;ra<N.length;ra++){var pa=N[ra].indexOf(")");qa.push('url("');qa.push(this.cachedFonts[Editor.trimCssUrl(N[ra].substring(0,pa))]);qa.push('"'+N[ra].substring(pa))}A(qa.join(""))}});if(0<N.length){for(l=1;l<N.length;l++){var Z=N[l].indexOf(")"), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.createTimeout=function(b,e,g){var p=!0,y=null,q=mxUtils.bind(this,function(L){y.clear()&&(p=!1,L=null!=L?L:{code:App.ERROR_TIMEOUT,message:mxResources.get("timeout"),retry:mxUtils.bind(this,function(){this.createTimeout(b,e,g)})},null!=g?g(L):this.handleError(L))}),E=window.setTimeout(q,null!=b?b:this.timeout);y={clear:function(){window.clearTimeout(E);return p},isAlive:function(){return p}};null!=e&&this.tryAndHandle(mxUtils.bind(this,function(){e(y)}),q);return y}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Qa);mxUtils.extend(Oa,mxArrowConnector);Oa.prototype.defaultWidth=10;Oa.prototype.defaultArrowWidth=20;Oa.prototype.getStartArrowWidth=function(){return this.getEdgeWidth()+mxUtils.getNumber(this.style,"startWidth",this.defaultArrowWidth)};Oa.prototype.getEndArrowWidth=function(){return this.getEdgeWidth()+mxUtils.getNumber(this.style,"endWidth",this.defaultArrowWidth)};Oa.prototype.getEdgeWidth=function(){return mxUtils.getNumber(this.style,"width",this.defaultWidth)+Math.max(0,this.strokewidth- | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
!0;try{this.rc.path(this.path.join(" "),Z)}catch(ia){}this.passThrough=!1}else if(null!=this.nextShape){for(var ba in Z)this.nextShape.options[ba]=Z[ba];Z.stroke!=mxConstants.NONE&&null!=Z.stroke||delete this.nextShape.options.stroke;Z.filled||delete this.nextShape.options.fill;this.passThrough=!0;this.rc.draw(this.nextShape);this.passThrough=!1}};l.prototype.stroke=function(){this.passThrough?this.originalStroke.apply(this.canvas,arguments):this.drawPath(this.getStyle(!0,!1))};l.prototype.fill=function(){this.passThrough? | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
aa);mxUtils.extend(S,mxHexagon);S.prototype.size=.25;S.prototype.fixedSize=20;S.prototype.isRoundable=function(){return!0};S.prototype.redrawPath=function(c,m,v,n,t){m="0"!=mxUtils.getValue(this.style,"fixedSize","0")?Math.max(0,Math.min(.5*n,parseFloat(mxUtils.getValue(this.style,"size",this.fixedSize)))):n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"size",this.size))));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(m, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.isPageMenuVisible=function(){return null!=this.pages&&("0"!=urlParams.pages||1<this.pages.length||Editor.pagesVisible)};EditorUi.prototype.createFooterMenuForTheme=function(d){if(("simple"==d||"sketch"==d)&&null==this.sketchFooterMenuElt){this.sketchFooterMenuElt=document.createElement("div");this.sketchFooterMenuElt.className="geToolbarContainer";var f=this.sketchFooterMenuElt;if("simple"!=d){var k=this.createPageMenuTab(!1,"simple"!=d);k.className="geToolbarButton geAdaptiveAsset"; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
640,520,!0,!0,null,null,null,null,!0);this.importCsvDialog.init()};EditorUi.prototype.showCustomLayoutDialog=function(d){this.loadOrgChartLayouts(mxUtils.bind(this,function(){var f=new TextareaDialog(this,mxResources.get("layout"),d,mxUtils.bind(this,function(k){if(0<k.length)try{var u=JSON.parse(k);this.executeLayouts(this.editor.graph.createLayouts(u));this.customLayoutConfig=u;this.hideDialog()}catch(z){this.handleError(z)}}),null,null,null,null,mxUtils.bind(this,function(k,u){var z=mxUtils.button(mxResources.get("copy"),
mxUtils.bind(this,function(){try{var C=u.value;u.value=JSON.stringify(JSON.parse(C));u.focus();mxClient.IS_GC||mxClient.IS_FF||5<=document.documentMode?u.select():document.execCommand("selectAll",!1,null);document.execCommand("copy");this.alert(mxResources.get("copiedToClipboard"));u.value=C}catch(F){this.handleError(F)}}));z.setAttribute("title","copy");z.className="geBtn";k.appendChild(z)}),!0,null,null,"https://www.drawio.com/doc/faq/apply-layouts");this.showDialog(f.container,620,460,!0,!0);f.init()}))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.patch=function(b,e,g,p){if(null!=b){var y=this.ui.editor.undoManager,q=y.history.slice(),E=y.indexOfNextAdd,L=this.ui.editor.graph;L.container.style.visibility="hidden";var T=this.changeListenerEnabled;this.changeListenerEnabled=g;var G=L.foldingEnabled,M=L.mathEnabled,R=L.cellRenderer.redraw;L.cellRenderer.redraw=function(z){z.view.graph.isEditing(z.cell)&&(z.view.graph.scrollCellToVisible(z.cell),z.view.graph.cellEditor.resize());R.apply(this,arguments)};L.model.beginUpdate(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,g){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,g,p,y,q){DrawioFile.call(this,b,e);this.title=g;this.mode=p?null:App.MODE_DEVICE;this.fileHandle=y;this.desc=q};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null==b?(G.style.border="1px solid #c0c0c0",G.style.margin="40px",mxEvent.addListener(document.documentElement,"keydown",q)):(e.style.display="none",g.style.display="none");var M=this;T.getImageFromBundles=function(W){return M.getImageUrl(W)};var R=y.createTemporaryGraph;y.createTemporaryGraph=function(){var W=R.apply(this,arguments);W.getImageFromBundles=function(d){return M.getImageUrl(d)};return W};this.graphConfig.move&&(T.isMoveCellsEvent=function(W){return!0});mxUtils.setPrefixedStyle(G.style, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
J&&x[Q].deleteCell(J)}};Graph.prototype.pasteHtmlAtCaret=function(x){if(window.getSelection){var J=window.getSelection();if(J.getRangeAt&&J.rangeCount){J=J.getRangeAt(0);J.deleteContents();var Q=document.createElement("div");Q.innerHTML=x;x=document.createDocumentFragment();for(var Y;Y=Q.firstChild;)lastNode=x.appendChild(Y);J.insertNode(x)}}else(J=document.selection)&&"Control"!=J.type&&J.createRange().pasteHTML(x)};Graph.prototype.createLinkForHint=function(x,J){function Q(ea,la){ea.length>la&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"sketch"==d?null==this.sketchStyleElt&&(this.sketchStyleElt=document.createElement("style"),this.sketchStyleElt.setAttribute("type","text/css"),this.sketchStyleElt.innerHTML=Editor.createMinimalCss(),document.getElementsByTagName("head")[0].appendChild(this.sketchStyleElt)):null!=this.sketchStyleElt&&(this.sketchStyleElt.parentNode.removeChild(this.sketchStyleElt),this.sketchStyleElt=null)};EditorUi.prototype.createWrapperForTheme=function(d){"simple"==d||"sketch"==d?(null==this.sketchWrapperElt&&
(this.sketchWrapperElt=document.createElement("div"),this.sketchWrapperElt.style.cssText="position:absolute;top:0px;left:0px;right:0px;bottom:0px;overflow:hidden;"),"sketch"==d&&(this.sketchWrapperElt.className="geSketch"),this.diagramContainer.parentNode.appendChild(this.sketchWrapperElt),this.sketchWrapperElt.appendChild(this.diagramContainer)):null!=this.sketchWrapperElt&&null!=this.sketchWrapperElt.parentNode&&(this.tabContainer.parentNode.insertBefore(this.diagramContainer,this.tabContainer),
this.sketchWrapperElt.parentNode.removeChild(this.sketchWrapperElt))};EditorUi.prototype.createMainMenuForTheme=function(d){if(("simple"==d||"sketch"==d)&&null==this.sketchMainMenuElt){this.sketchMainMenuElt=document.createElement("div");this.sketchMainMenuElt.style.cssText="position:absolute;padding:9px 12px;overflow:hidden;white-space:nowrap;user-select:none;box-sizing:border-box;";var f=this.createMenu("simple"==d?"view":"diagram","simple"==d?Editor.thinViewImage:Editor.menuImage);this.sketchMainMenuElt.appendChild(f); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.addUndoListener=function(){var b=this.editor.undoManager,e=mxUtils.bind(this,function(){this.updateActionStates()});b.addListener(mxEvent.ADD,e);b.addListener(mxEvent.UNDO,e);b.addListener(mxEvent.REDO,e);b.addListener(mxEvent.CLEAR,e);var g=this.editor.graph.cellEditor.startEditing;this.editor.graph.cellEditor.startEditing=function(){g.apply(this,arguments);e()};var p=this.editor.graph.cellEditor.stopEditing;this.editor.graph.cellEditor.stopEditing=function(y,q){p.apply(this,arguments);
e()};e()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function Y(){mxEllipse.call(this)}function ea(){mxEllipse.call(this)}function la(){mxRhombus.call(this)}function oa(){mxEllipse.call(this)}function wa(){mxEllipse.call(this)}function sa(){mxEllipse.call(this)}function ua(){mxEllipse.call(this)}function Fa(){mxActor.call(this)}function Ua(){mxActor.call(this)}function Ra(){mxActor.call(this)}function Na(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1;this.rectStyle="square";this.size=10;this.absoluteCornerSize= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
g);return p};EditorUi.prototype.createPageInsertTab=function(){return this.createControlTab(mxResources.get("insertPage"),Editor.plusImage,mxUtils.bind(this,function(b){this.insertPage();mxEvent.consume(b)}))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"change",K);mxEvent.addListener(q,"change",K);mxEvent.addListener(L,"change",function(O){C="custom"==L.value;K(O,!0)});K();return{set:function(O){g=O;y(null,null,!0)},get:function(){return F},widthInput:R,heightInput:W}}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.extend(Ea,mxActor);Ea.prototype.redrawPath=function(c,m,v,n,t){c.moveTo(0,0);c.quadTo(n,0,n,t/2);c.quadTo(n,t,0,t);c.close();c.end()};mxCellRenderer.registerShape("or",Ea);mxUtils.extend(Ka,mxActor);Ka.prototype.redrawPath=function(c,m,v,n,t){c.moveTo(0,0);c.quadTo(n,0,n,t/2);c.quadTo(n,t,0,t);c.quadTo(n/2,t/2,0,0);c.close();c.end()};mxCellRenderer.registerShape("xor",Ka);mxUtils.extend(x,mxActor);x.prototype.size=20;x.prototype.isRoundable=function(){return!0};x.prototype.redrawPath=function(c,
m,v,n,t){m=Math.min(n/2,Math.min(t,parseFloat(mxUtils.getValue(this.style,"size",this.size))));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(m,0),new mxPoint(n-m,0),new mxPoint(n,.8*m),new mxPoint(n,t),new mxPoint(0,t),new mxPoint(0,.8*m)],this.isRounded,v,!0);c.end()};mxCellRenderer.registerShape("loopLimit",x);mxUtils.extend(J,mxActor);J.prototype.size=.375;J.prototype.isRoundable=function(){return!0};J.prototype.redrawPath=function(c, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.getCellGeometry(oa[x]);null!=Ua&&(Fa.height=Ua.height)}Q.add(oa[x],ua,ea+(J?0:1))}var Ra=this.getCellGeometry(Y);null!=Ra&&(Ra=Ra.clone(),Ra.width+=wa,Q.setGeometry(Y,Ra))}finally{Q.endUpdate()}};Graph.prototype.deleteLane=function(x){var J=this.getModel();J.beginUpdate();try{var Q=null;Q="stackLayout"==this.getCurrentCellStyle(x).childLayout?x:J.getParent(x);var Y=J.getChildCells(Q,!0);0==Y.length?J.remove(Q):(Q==x&&(x=Y[Y.length-1]),J.remove(x))}finally{J.endUpdate()}};Graph.prototype.insertLane= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
""):qa||(xa.style.backgroundImage="url("+mxWindow.prototype.normalizeImage+")",xa.style.backgroundPosition="right 6px center",xa.style.backgroundRepeat="no-repeat",xa.style.paddingRight="22px");return xa}function d(ia,qa,ra,pa,xa,Ca){var Aa=document.createElement("a");Aa.className="geMenuItem";Aa.style.display="inline-block";Aa.style.boxSizing="border-box";Aa.style.height="30px";Aa.style.padding="6px";Aa.style.position="relative";Aa.style.verticalAlign="top";Aa.style.top="0px";null!=C.statusContainer?
K.insertBefore(Aa,C.statusContainer):K.appendChild(Aa);null!=Ca?(Aa.style.backgroundImage="url("+Ca+")",Aa.style.backgroundPosition="center center",Aa.style.backgroundRepeat="no-repeat",Aa.style.backgroundSize="24px 24px",Aa.style.width="34px"):mxUtils.write(Aa,ia);mxEvent.addListener(Aa,mxClient.IS_POINTER?"pointerdown":"mousedown",mxUtils.bind(this,function(za){za.preventDefault()}));mxEvent.addListener(Aa,"click",function(za){"disabled"!=Aa.getAttribute("disabled")&&qa(za);mxEvent.consume(za)});
null==ra&&(Aa.style.marginRight="4px");null!=pa&&Aa.setAttribute("title",pa);null!=xa&&(ia=function(){xa.isEnabled()?(Aa.removeAttribute("disabled"),Aa.style.cursor="pointer"):(Aa.setAttribute("disabled","disabled"),Aa.style.cursor="default")},xa.addListener("stateChanged",ia),F.addListener("enabledChanged",ia),ia());return Aa}function f(ia,qa,ra){ra=document.createElement("div");ra.className="geMenuItem";ra.style.display="inline-block";ra.style.verticalAlign="top";ra.style.marginRight="6px";ra.style.padding= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.updateSelectionStateForCell=function(b,e,g,p){g=this.editor.graph;b.cells.push(e);if(g.getModel().isVertex(e)){b.connections=0<g.model.getEdgeCount(e);b.unlocked=b.unlocked&&!g.isCellLocked(e);b.resizable=b.resizable&&g.isCellResizable(e);b.rotatable=b.rotatable&&g.isCellRotatable(e);b.movable=b.movable&&g.isCellMovable(e)&&!g.isTableRow(e)&&!g.isTableCell(e);b.swimlane=b.swimlane||g.isSwimlane(e);b.table=b.table||g.isTable(e);b.cell=b.cell||g.isTableCell(e);b.row=b.row||g.isTableRow(e);
b.vertices.push(e);var y=g.getCellGeometry(e);if(null!=y&&(0<y.width?null==b.width?b.width=y.width:b.width!=y.width&&(b.width=""):b.containsLabel=!0,0<y.height?null==b.height?b.height=y.height:b.height!=y.height&&(b.height=""):b.containsLabel=!0,!y.relative||null!=y.offset)){var q=y.relative?y.offset.x:y.x;y=y.relative?y.offset.y:y.y;null==b.x?b.x=q:b.x!=q&&(b.x="");null==b.y?b.y=y:b.y!=y&&(b.y="")}}else g.getModel().isEdge(e)&&(b.edges.push(e),b.connections=!0,b.resizable=!1,b.rotatable=!1,b.movable=
!1);e=g.view.getState(e);null!=e&&(b.autoSize=b.autoSize||g.isAutoSizeState(e),b.glass=b.glass&&g.isGlassState(e),b.rounded=b.rounded&&g.isRoundedState(e),b.lineJumps=b.lineJumps&&g.isLineJumpState(e),b.image=b.image||g.isImageState(e),b.shadow=b.shadow&&g.isShadowState(e),b.fill=b.fill&&g.isFillState(e),b.gradient=b.fill&&g.isGradientState(e),b.stroke=b.stroke&&g.isStrokeState(e),q=mxUtils.getValue(e.style,mxConstants.STYLE_SHAPE,null),b.containsImage=b.containsImage||"image"==q,g.mergeStyle(e.style,
b.style,p))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.createPageMenu=function(b,e){return mxUtils.bind(this,function(g,p){1!=urlParams.embed&&(null!=this.getLinkForPage(b)&&g.addItem(mxResources.get("link")+"...",null,mxUtils.bind(this,function(){this.showPageLinkDialog(b)})),mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||"draw.io"!=this.getServiceName()||g.addItem(mxResources.get("openInNewWindow"),null,mxUtils.bind(this,function(){this.editor.editAsNew(this.getFileData(!0,null,null,null,!0,!0))}),p),g.addSeparator(p));g.addItem(mxResources.get("duplicate"),
null,mxUtils.bind(this,function(){this.duplicatePage(b,mxResources.get("copyOf",[b.getName()]))}),p);g.addSeparator(p);this.currentPage==b&&1<this.pages.length&&this.menus.addSubmenu("movePage",g,p,mxResources.get("move"));g.addItem(mxResources.get("delete"),null,mxUtils.bind(this,function(){this.removePage(b)}),p);g.addItem(mxResources.get("rename")+"...",null,mxUtils.bind(this,function(){this.renamePage(b,e)}),p)})}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
l.substring(0,29)||"https://fonts.gstatic.com/"===l.substring(0,26)};Editor.prototype.createImageUrlConverter=function(){var l=new mxUrlConverter;l.updateBaseUrl();var A=l.convert,N=this;l.convert=function(X){if(null!=X){var U="http://"==X.substring(0,7)||"https://"==X.substring(0,8);U&&!navigator.onLine?X=Editor.svgBrokenImage.src:!U||X.substring(0,l.baseUrl.length)==l.baseUrl||N.crossOriginImages&&N.isCorsEnabledForUrl(X)?"chrome-extension://"==X.substring(0,19)||mxClient.IS_CHROMEAPP||(X=A.apply(this,
arguments)):X=PROXY_URL+"?url="+encodeURIComponent(X)}return X};return l};Editor.createSvgDataUri=function(l){return"data:image/svg+xml;base64,"+btoa(unescape(encodeURIComponent(l)))};Editor.prototype.convertImageToDataUri=function(l,A){try{var N=!0,X=window.setTimeout(mxUtils.bind(this,function(){N=!1;A(Editor.svgBrokenImage.src)}),this.timeout);if(/(\.svg)$/i.test(l))mxUtils.get(l,mxUtils.bind(this,function(Z){window.clearTimeout(X);N&&A(Editor.createSvgDataUri(Z.getText()))}),function(){window.clearTimeout(X); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(G){return this.isTreeEdge(G)}))};Graph.prototype.getIncomingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function p(aa){return k.isVertex(aa)&&q(aa)}function y(aa){var S=!1;null!=aa&&
(S="1"==f.getCurrentCellStyle(aa).treeMoving);return S}function q(aa){var S=!1;null!=aa&&(aa=k.getParent(aa),S=f.view.getState(aa),S="tree"==(null!=S?S.style:f.getCellStyle(aa)).containerType);return S}function E(aa){var S=!1;null!=aa&&(aa=k.getParent(aa),S=f.view.getState(aa),f.view.getState(aa),S=null!=(null!=S?S.style:f.getCellStyle(aa)).childLayout);return S}function L(aa){aa=f.view.getState(aa);if(null!=aa){var S=f.getIncomingTreeEdges(aa.cell);if(0<S.length&&(S=f.view.getState(S[0]),null!=S&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Editor.createRoughCanvas=function(l){var A=rough.canvas({getContext:function(){return l}});A.draw=function(N){var X=N.sets||[];N=N.options||this.getDefaultOptions();for(var U=0;U<X.length;U++){var Z=X[U];switch(Z.type){case "path":null!=N.stroke&&this._drawToContext(l,Z,N);break;case "fillPath":this._drawToContext(l,Z,N);break;case "fillSketch":this.fillSketch(l,Z,N)}}};A.fillSketch=function(N,X,U){var Z=l.state.strokeColor,ba=l.state.strokeWidth,ia=l.state.strokeAlpha,qa=l.state.dashed,ra=U.fillWeight; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.prototype.defaultEdgeLength;f.defaultGridEnabled=Graph.prototype.defaultGridEnabled;f.defaultPageVisible=Graph.prototype.defaultPageVisible;null!=this.menus&&(this.menus.autoPopup="simple"!=d&&"sketch"!=d);"simple"==d||"sketch"==d?(Editor.fitWindowBorders=new mxRectangle(60,30,30,30),f.defaultEdgeLength=120,null==urlParams.grid&&(f.defaultGridEnabled=!1),null==urlParams.pv&&(f.defaultPageVisible=!1)):Editor.fitWindowBorders=null};EditorUi.prototype.switchCssForTheme=function(d){"simple"==d||
"sketch"==d?null==this.sketchStyleElt&&(this.sketchStyleElt=document.createElement("style"),this.sketchStyleElt.setAttribute("type","text/css"),this.sketchStyleElt.innerHTML=Editor.createMinimalCss(),document.getElementsByTagName("head")[0].appendChild(this.sketchStyleElt)):null!=this.sketchStyleElt&&(this.sketchStyleElt.parentNode.removeChild(this.sketchStyleElt),this.sketchStyleElt=null)};EditorUi.prototype.createWrapperForTheme=function(d){"simple"==d||"sketch"==d?(null==this.sketchWrapperElt&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.prototype.updateAlternateBounds=function(b,e,g){if(null!=b&&null!=e&&null!=this.layoutManager&&null!=e.alternateBounds){var p=this.layoutManager.getLayout(this.model.getParent(b));null!=p&&p.constructor==mxStackLayout&&(p.horizontal?e.alternateBounds.height=0:e.alternateBounds.width=0)}mxGraph.prototype.updateAlternateBounds.apply(this,arguments)};Graph.prototype.isMoveCellsEvent=function(b,e){return mxEvent.isShiftDown(b)||"1"==mxUtils.getValue(e.style,"moveCells","0")}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null,[b]),this.setCellStyles(mxConstants.STYLE_FONTSTYLE,null,[b]),this.setCellStyles(mxConstants.STYLE_FONTCOLOR,null,[b]),this.setCellStyles(mxConstants.STYLE_LABEL_BORDERCOLOR,null,[b]),this.setCellStyles(mxConstants.STYLE_LABEL_BACKGROUNDCOLOR,null,[b]))}finally{this.getModel().endUpdate()}return p};Graph.prototype.createParent=function(b,e,g,p,y){b=this.cloneCell(b);for(var q=0;q<g;q++){var E=this.cloneCell(e),L=this.getCellGeometry(E);null!=L&&(L.x+=q*p,L.y+=q*y);b.insert(E)}return b}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
C.getGlobalVariable=function(ka){return"page"==ka?H.getName():"pagenumber"==ka?1:O.apply(this,arguments)};document.body.appendChild(C.container);C.model.setRoot(H.root)}this.editor.exportToCanvas(mxUtils.bind(this,function(ka){try{null==K&&(K=this.getFileData(!0,null,null,null,null,null,null,null,null,!1));var fa=ka.toDataURL("image/png");fa=Editor.writeGraphModelToPng(fa,"tEXt","mxfile",encodeURIComponent(K));d(fa.substring(fa.lastIndexOf(",")+1));C!=this.editor.graph&&C.container.parentNode.removeChild(C.container)}catch(ca){null!= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
z/O.view.scale),ca=Math.floor(ka.height*z/O.view.scale);if(H.length<=MAX_REQUEST_SIZE&&fa*ca<MAX_AREA)if(d.hideDialog(),"png"!=k&&"jpg"!=k&&"jpeg"!=k||!d.isExportToCanvas()){var ja={globalVars:O.getExportVariables()};K&&(ja.grid={size:O.gridSize,steps:O.view.gridSteps,color:O.view.gridColor});d.saveRequest(f,k,function(ma,aa){return new mxXmlRequest(EXPORT_URL,"format="+k+"&base64="+(aa||"0")+(null!=ma?"&filename="+encodeURIComponent(ma):"")+"&extras="+encodeURIComponent(JSON.stringify(ja))+(0<F?
"&dpi="+F:"")+"&bg="+(null!=u?u:"none")+"&w="+fa+"&h="+ca+"&border="+C+"&xml="+encodeURIComponent(H))})}else"png"==k?d.exportImage(z,null==u||"none"==u,!0,!1,!1,C,!0,!1,null,K,F):d.exportImage(z,!1,!0,!1,!1,C,!0,!1,"jpeg",K);else mxUtils.alert(mxResources.get("drawingTooLarge"))}});EditorUi.prototype.getDiagramTextContent=function(){this.editor.graph.setEnabled(!1);var d=this.editor.graph,f="";if(null!=this.pages)for(var k=0;k<this.pages.length;k++){var u=d;this.currentPage!=this.pages[k]&&(u=this.createTemporaryGraph(d.getStylesheet()), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
}catch(F){null!=g&&g(F)}};DrawioFile.prototype.getAnonymizedXmlForPages=function(b){var e=new mxCodec(mxUtils.createXmlDocument()),g=e.document.createElement("mxfile");if(null!=b)for(var p=0;p<b.length;p++){var y=e.encode(new mxGraphModel(b[p].root));"1"!=urlParams.dev&&(y=this.ui.anonymizeNode(y,!0));y.setAttribute("id",b[p].getId());b[p].viewState&&this.ui.editor.graph.saveViewState(b[p].viewState,y,!0);g.appendChild(y)}return mxUtils.getPrettyXml(g)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
f),k.setAttribute("for",F),d.appendChild(k),z||mxUtils.br(d));return O};EditorUi.prototype.addEditButton=function(d,f){var k=this.addCheckbox(d,mxResources.get("edit")+":",!0,null,!0);k.style.marginLeft="24px";var u=this.getCurrentFile(),z="";null!=u&&u.getMode()!=App.MODE_DEVICE&&u.getMode()!=App.MODE_BROWSER&&(z=window.location.href);var C=document.createElement("select");C.style.maxWidth="200px";C.style.width="auto";C.style.marginLeft="8px";C.style.marginRight="10px";C.className="geBtn";u=document.createElement("option");
u.setAttribute("value","blank");mxUtils.write(u,mxResources.get("makeCopy"));C.appendChild(u);u=document.createElement("option");u.setAttribute("value","custom");mxUtils.write(u,mxResources.get("custom")+"...");C.appendChild(u);d.appendChild(C);mxEvent.addListener(C,"change",mxUtils.bind(this,function(){if("custom"==C.value){var F=new FilenameDialog(this,z,mxResources.get("ok"),function(K){null!=K?z=K:C.value="blank"},mxResources.get("url"),null,null,null,null,function(){C.value="blank"});this.showDialog(F.container,
300,80,!0,!1);F.init()}}));mxEvent.addListener(k,"change",mxUtils.bind(this,function(){k.checked&&(null==f||f.checked)?C.removeAttribute("disabled"):C.setAttribute("disabled","disabled")}));mxUtils.br(d);return{getLink:function(){return k.checked?"blank"===C.value?"_blank":z:null},getEditInput:function(){return k},getEditSelect:function(){return C}}};EditorUi.prototype.addLinkSection=function(d,f){function k(){var K=document.createElement("div");K.style.width="100%";K.style.height="100%";K.style.boxSizing= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
U.prototype.getLabelBounds=function(c){return new mxRectangle(c.x,c.y+c.height/8,c.width,7*c.height/8)};U.prototype.paintBackground=function(c,m,v,n,t){c.translate(m,v);c.begin();c.moveTo(3*n/8,t/8*1.1);c.lineTo(5*n/8,0);c.end();c.stroke();c.ellipse(0,t/8,n,7*t/8);c.fillAndStroke()};U.prototype.paintForeground=function(c,m,v,n,t){c.begin();c.moveTo(3*n/8,t/8*1.1);c.lineTo(5*n/8,t/4);c.end();c.stroke()};mxCellRenderer.registerShape("umlControl",U);mxUtils.extend(Z,mxRectangleShape);Z.prototype.size= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.handleError(ja)}))})))}}),mxUtils.bind(this,function(){this.hideDialog()}),mxResources.get("saveAs"),mxResources.get("download"),!1,!1,F,null,1<K,O,u,C,z);K=this.isServices(K)?4<K?390:280:160;this.showDialog(d.container,420,K,!0,!0);d.init()};EditorUi.prototype.isServices=function(d){return 1!=d};EditorUi.prototype.getEditBlankXml=function(){return this.getFileData(!0)};EditorUi.prototype.exportFile=function(d,f,k,u,z,C){};EditorUi.prototype.getServiceForName=function(d){return null};EditorUi.prototype.getTitleForService= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.handleError(ja)}))})))}}),mxUtils.bind(this,function(){this.hideDialog()}),mxResources.get("saveAs"),mxResources.get("download"),!1,!1,F,null,1<K,O,u,C,z);K=this.isServices(K)?4<K?390:280:160;this.showDialog(d.container,420,K,!0,!0);d.init()};EditorUi.prototype.isServices=function(d){return 1!=d};EditorUi.prototype.getEditBlankXml=function(){return this.getFileData(!0)};EditorUi.prototype.exportFile=function(d,f,k,u,z,C){};EditorUi.prototype.getServiceForName=function(d){return null};EditorUi.prototype.getTitleForService= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
O.model.execute(P)}}F&&this.insertHandler(K,null,null,O.defaultVertexStyle,O.defaultEdgeStyle,!1,!0)}finally{O.model.endUpdate()}}}catch(V){if(z)throw V;this.handleError(V)}return K};EditorUi.prototype.updatePageLinks=function(d,f){for(var k=0;k<f.length;k++)this.updatePageLinksForCell(d,f[k].root),null!=f[k].viewState&&this.updateBackgroundPageLink(d,f[k].viewState.backgroundImage)};EditorUi.prototype.updateBackgroundPageLink=function(d,f){try{if(null!=f&&Graph.isPageLink(f.originalSrc)){var k=d[f.originalSrc.substring(f.originalSrc.indexOf(",")+ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxVertexHandler.prototype.setHandlesVisible=function(aa){ja.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.style.display=aa?"":"none")};var ma=mxVertexHandler.prototype.destroy;mxVertexHandler.prototype.destroy=function(aa,S){ma.apply(this,arguments);null!=this.moveHandle&&(this.moveHandle.parentNode.removeChild(this.moveHandle),this.moveHandle=null)}};if("undefined"!==typeof Sidebar){var g=Sidebar.prototype.createAdvancedShapes;Sidebar.prototype.createAdvancedShapes=function(){var p= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c.begin();c.moveTo(m+n/2,v+t);c.lineTo(m+n,v+t);c.end();c.stroke()};mxCellRenderer.registerShape("tapeData",Q);mxUtils.extend(Y,mxEllipse);Y.prototype.paintVertexShape=function(c,m,v,n,t){mxEllipse.prototype.paintVertexShape.apply(this,arguments);c.setShadow(!1);c.begin();c.moveTo(m,v+t/2);c.lineTo(m+n,v+t/2);c.end();c.stroke();c.begin();c.moveTo(m+n/2,v);c.lineTo(m+n/2,v+t);c.end();c.stroke()};mxCellRenderer.registerShape("orEllipse",Y);mxUtils.extend(ea,mxEllipse);ea.prototype.paintVertexShape= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
DrawioFile.prototype.saveFile=function(b,e,g,p){};DrawioFile.prototype.getFileUrl=function(){return null};DrawioFile.prototype.getFolderUrl=function(b){return null};DrawioFile.prototype.getPublicUrl=function(b){b(null)};DrawioFile.prototype.isRestricted=function(){return DrawioFile.RESTRICT_EXPORT};DrawioFile.prototype.isModified=function(){return this.modified};DrawioFile.prototype.getShadowModified=function(){return this.shadowModified}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"defs"):X.createElement("defs"),null!=l.firstChild?l.insertBefore(N,l.firstChild):l.appendChild(N)):N=N[0];l=null!=X.createElementNS?X.createElementNS(mxConstants.NS_SVG,"style"):X.createElement("style");l.setAttribute("type","text/css");mxUtils.setTextContent(l,A);N.appendChild(l)}};Editor.prototype.isExportToCanvas=function(){return mxClient.IS_CHROMEAPP||this.useCanvasForExport};Editor.prototype.getMaxCanvasScale=function(l,A,N){var X=mxClient.IS_FF?8192:16384;return Math.min(N,Math.min(X/l,X/ | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
type:"bool",getDefaultValue:function(l,A){var N=1==l.vertices.length&&0==l.edges.length?l.vertices[0]:null;A=A.editorUi.editor.graph;return null!=N&&(A.isContainer(N)&&"0"!=l.style.collapsible||!A.isContainer(N)&&"1"==l.style.collapsible)},isVisible:function(l,A){return 1==l.vertices.length&&0==l.edges.length}},{name:"recursiveResize",dispName:"Resize Children",type:"bool",defVal:!0,isVisible:function(l,A){return 1==l.vertices.length&&0==l.edges.length&&!A.editorUi.editor.graph.isSwimlane(l.vertices[0])&& | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
"0"!=mxUtils.getValue(this.state.style,"fixedSize","0"),t=parseFloat(mxUtils.getValue(this.state.style,"size",ca.prototype.size));return n?new mxPoint(v.x+t,v.y+v.height/4):new mxPoint(v.x+v.width*t,v.y+v.height/4)},function(v,n){v="0"!=mxUtils.getValue(this.state.style,"fixedSize","0")?Math.max(0,Math.min(.5*v.width,n.x-v.x)):Math.max(0,Math.min(.5,(n.x-v.x)/v.width));this.state.style.size=v},!1)];mxUtils.getValue(c.style,mxConstants.STYLE_ROUNDED,!1)&&m.push(pb(c));return m},cross:function(c){return[hb(c,
["size"],function(m){var v=Math.min(m.width,m.height);v=Math.max(0,Math.min(1,mxUtils.getValue(this.state.style,"size",Ua.prototype.size)))*v/2;return new mxPoint(m.getCenterX()-v,m.getCenterY()-v)},function(m,v){var n=Math.min(m.width,m.height);this.state.style.size=Math.max(0,Math.min(1,Math.min(Math.max(0,m.getCenterY()-v.y)/n*2,Math.max(0,m.getCenterX()-v.x)/n*2)))})]},note:function(c){return[hb(c,["size"],function(m){var v=Math.max(0,Math.min(m.width,Math.min(m.height,parseFloat(mxUtils.getValue(this.state.style, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.bind(this,function(ca){C=null!=C?C:"pdf"==f?"application/pdf":"image/"+f;if(null!=u)try{this.exportFile(u,H,C,!0,ka,ca)}catch(ja){this.handleError(ja)}else this.spinner.spin(document.body,mxResources.get("saving"))&&fa.send(mxUtils.bind(this,function(){this.spinner.stop();if(200<=fa.getStatus()&&299>=fa.getStatus())try{this.exportFile(fa.getText(),H,C,!0,ka,ca)}catch(ja){this.handleError(ja)}else this.handleError({message:mxResources.get("errorSavingFile")})}),mxUtils.bind(this,function(ja){this.spinner.stop(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.addSplitHandler=function(b,e,g,p){function y(R){if(null!=E){var W=new mxPoint(mxEvent.getClientX(R),mxEvent.getClientY(R));p(Math.max(0,L+(e?W.x-E.x:E.y-W.y)-g));mxEvent.consume(R);L!=M()&&(T=!0,G=null)}}function q(R){y(R);E=L=null}var E=null,L=null,T=!0,G=null;mxClient.IS_POINTER&&(b.style.touchAction="none");var M=mxUtils.bind(this,function(){var R=parseInt(e?b.style.left:b.style.bottom);e||(R=R+g-this.footerHeight);return R});mxEvent.addGestureListeners(b,function(R){E=new mxPoint(mxEvent.getClientX(R),
mxEvent.getClientY(R));L=M();T=!1;mxEvent.consume(R)});mxEvent.addListener(b,"click",mxUtils.bind(this,function(R){if(!T&&this.hsplitClickEnabled){var W=null!=G?G-g:0;G=M();p(W);mxEvent.consume(R)}}));mxEvent.addGestureListeners(document,null,y,q);this.destroyFunctions.push(function(){mxEvent.removeGestureListeners(document,null,y,q)})}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.getLinkForPage=function(b,e,g){if(null!=b&&!mxClient.IS_CHROMEAPP&&!EditorUi.isElectronApp){var p=this.getCurrentFile();if(null!=p&&p.constructor!=LocalFile&&"draw.io"==this.getServiceName()){var y=this.getSearch("create title mode url drive splash state clibs ui viewbox hide-pages sketch".split(" "));y+=(0==y.length?"?":"&")+"page-id="+b.getId();null!=e&&(y+="&"+e.join("&"));return(g&&"1"!=urlParams.dev?EditorUi.lightboxHost:mxClient.IS_CHROMEAPP||EditorUi.isElectronApp||!/.*\.draw\.io$/.test(window.location.hostname)?
EditorUi.drawHost:"https://"+window.location.host)+"/"+y+"#"+p.getHash()}}return null}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.prototype.createCrossFunctionalSwimlane=function(b,e,g,p,y,q,E,L,T){g=null!=g?g:120;p=null!=p?p:120;E=null!=E?E:"shape=tableRow;horizontal=0;swimlaneHead=0;swimlaneBody=0;top=0;left=0;strokeColor=inherit;bottom=0;right=0;dropTarget=0;fontStyle=0;fillColor=none;points=[[0,0.5],[1,0.5]];portConstraint=eastwest;startSize=40;collapsible=0;recursiveResize=0;expand=0;";L=null!=L?L:"swimlane;swimlaneHead=0;swimlaneBody=0;fontStyle=0;strokeColor=inherit;connectable=0;fillColor=none;startSize=40;collapsible=0;recursiveResize=0;expand=0;";
T=null!=T?T:"swimlane;swimlaneHead=0;swimlaneBody=0;fontStyle=0;connectable=0;strokeColor=inherit;fillColor=none;startSize=0;collapsible=0;recursiveResize=0;expand=0;";y=this.createVertex(null,null,null!=y?y:"",0,0,e*g,b*p,null!=q?q:"shape=table;childLayout=tableLayout;"+(null==y?"startSize=0;fillColor=none;":"startSize=40;")+"collapsible=0;recursiveResize=0;expand=0;");q=mxUtils.getValue(this.getCellStyle(y),mxConstants.STYLE_STARTSIZE,mxConstants.DEFAULT_STARTSIZE);y.geometry.width+=q;y.geometry.height+=
q;E=this.createVertex(null,null,"",0,q,e*g+q,p,E);y.insert(this.createParent(E,this.createVertex(null,null,"",q,0,g,p,L),e,g,0));return 1<b?(E.geometry.y=p+q,this.createParent(y,this.createParent(E,this.createVertex(null,null,"",q,0,g,p,T),e,g,0),b-1,0,p)):y}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Fa.length-1?0:Pa.x*la);this.shape.bounds.width=oa.width-(Za==Fa.length-1?0:Pa.width+Pa.x+la)}this.shape.redraw()}};var kb=!1;Sa.setPosition=function(Pa,eb,jb){lb=Math.max(Graph.minTableRowHeight-Pa.height,eb.y-Pa.y-Pa.height);kb=mxEvent.isShiftDown(jb.getEvent());null!=db&&kb&&(lb=Math.min(lb,db.height-Graph.minTableRowHeight))};Sa.execute=function(Pa){if(0!=lb)Y.setTableRowHeight(this.state.cell,lb,!kb);else if(!Q.blockDelayedSelection){var eb=Y.getCellAt(Pa.getGraphX(),Pa.getGraphY())||oa.cell;
Y.graphHandler.selectCellForEvent(eb,Pa)}lb=0};Sa.reset=function(){lb=0}}x.push(Sa)})(ea);for(ea=0;ea<Ua.length;ea++)mxUtils.bind(this,function(Za){var cb=Y.view.getState(Ua[Za]),Sa=Y.getCellGeometry(Ua[Za]),db=null!=Sa.alternateBounds?Sa.alternateBounds:Sa;null==cb&&(cb=new mxCellState(Y.view,Ua[Za],Y.getCellStyle(Ua[Za])),cb.x=oa.x+Sa.x*la,cb.y=oa.y+Sa.y*la,cb.width=db.width*la,cb.height=db.height*la,cb.updateCachedBounds());Sa=Za<Ua.length-1?Ua[Za+1]:null;Sa=null!=Sa?Y.getCellGeometry(Sa):null; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
GraphViewer.prototype.showLightbox=function(b,e,g){if("open"==this.graphConfig.lightbox||window.self!==window.top)if(null==this.lightboxWindow||this.lightboxWindow.closed){b=null!=b?b:null!=this.graphConfig.editable?this.graphConfig.editable:!0;g={client:1,target:null!=g?g:"blank"};b&&(g.edit=this.graphConfig.edit||"_blank");if(null!=e?e:1)g.close=1;this.layersEnabled&&(g.layers=1);this.tagsEnabled&&(g.tags={});null!=this.graphConfig&&0!=this.graphConfig.nav&&(g.nav=1);null!=this.graphConfig&&null!=
this.graphConfig.highlight&&(g.highlight=this.graphConfig.highlight.substring(1));null!=this.currentPage&&0<this.currentPage&&(g.page=this.currentPage);"undefined"!==typeof window.postMessage&&(null==document.documentMode||10<=document.documentMode)?null==this.lightboxWindow&&mxEvent.addListener(window,"message",mxUtils.bind(this,function(p){"ready"==p.data&&p.source==this.lightboxWindow&&this.lightboxWindow.postMessage(this.xml,"*")})):g.data=encodeURIComponent(this.xml);"1"==urlParams.dev&&(g.dev=
"1");this.lightboxWindow=window.open(("1"!=urlParams.dev?EditorUi.lightboxHost:"https://test.draw.io")+"/#P"+encodeURIComponent(JSON.stringify(g)))}else this.lightboxWindow.focus();else this.showLocalLightbox()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
null;ja=this.createImageDataUri(ja,ma,"png");O(ja)}),null,null,null,mxUtils.bind(this,function(ja){K({message:mxResources.get("unknownError")})}),null,!0,k?2:1,null,f,null,null,Editor.defaultBorder);else if(f=this.getFileData(!0),H.width*H.height<=MAX_AREA&&f.length<=MAX_REQUEST_SIZE){var fa="";k&&(fa="&w="+Math.round(2*H.width)+"&h="+Math.round(2*H.height));var ca=new mxXmlRequest(EXPORT_URL,"format=png&base64=1&embedXml="+(u?"1":"0")+fa+"&xml="+encodeURIComponent(f));ca.send(mxUtils.bind(this,function(){200<= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(x){null!=x.text&&(x.text.replaceLinefeeds="0"!=mxUtils.getValue(x.style,"nl2Br","1"));u.apply(this,arguments)};var z=mxConstraintHandler.prototype.update;mxConstraintHandler.prototype.update=function(x,J){this.isKeepFocusEvent(x)||!mxEvent.isAltDown(x.getEvent())?z.apply(this,arguments):this.reset()};mxGuide.prototype.createGuideShape=function(x){return new mxPolyline([],mxConstants.GUIDE_COLOR,mxConstants.GUIDE_STROKEWIDTH)};mxCellEditor.prototype.escapeCancelsEditing=!1;var C=mxCellEditor.prototype.startEditing; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
c.begin(),c.moveTo(m,v),this.outline||ha?c.lineTo(m+n,v):c.moveTo(m+n,v),this.outline||va?c.lineTo(m+n,v+t):c.moveTo(m+n,v+t),this.outline||na?c.lineTo(m,v+t):c.moveTo(m,v+t),(this.outline||I)&&c.lineTo(m,v),c.end(),c.stroke(),c.setLineCap("flat")):c.setStrokeColor(this.stroke)}};mxCellRenderer.registerShape("partialRectangle",sa);mxUtils.extend(ua,mxEllipse);ua.prototype.paintVertexShape=function(c,m,v,n,t){mxEllipse.prototype.paintVertexShape.apply(this,arguments);c.setShadow(!1);c.begin();"vertical"==
mxUtils.getValue(this.style,"line")?(c.moveTo(m+n/2,v),c.lineTo(m+n/2,v+t)):(c.moveTo(m,v+t/2),c.lineTo(m+n,v+t/2));c.end();c.stroke()};mxCellRenderer.registerShape("lineEllipse",ua);mxUtils.extend(Fa,mxActor);Fa.prototype.redrawPath=function(c,m,v,n,t){m=Math.min(n,t/2);c.moveTo(0,0);c.lineTo(n-m,0);c.quadTo(n,0,n,t/2);c.quadTo(n,t,n-m,t);c.lineTo(0,t);c.close();c.end()};mxCellRenderer.registerShape("delay",Fa);mxUtils.extend(Ua,mxActor);Ua.prototype.size=.2;Ua.prototype.redrawPath=function(c,m, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
p,g);this.ui.actions.get("share").funct()}))}))}),null,mxResources.get("saveToGoogleDrive",null,"Save to Google Drive"),mxResources.get("cancel")):this.ui.alert(mxResources.get("sharingAvailable"),null,380)};DrawioFile.prototype.getHash=function(){return""};DrawioFile.prototype.getId=function(){return""};DrawioFile.prototype.isEditable=function(){return!this.ui.editor.isChromelessView()||this.ui.editor.editable};DrawioFile.prototype.getUi=function(){return this.ui};DrawioFile.prototype.getTitle=function(){return""}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
L=window.innerHeight||document.body.clientHeight||document.documentElement.clientHeight,T=parseInt(this.div.style.width),G=parseInt(this.div.style.height);y=Math.max(0,Math.min(y,E-T));q=Math.max(0,Math.min(q,L-G));this.getX()==y&&this.getY()==q||mxWindow.prototype.setLocation.apply(this,arguments);e&&!this.minimized&&this.setSize(T,G)};var p=mxUtils.bind(this,function(){var y=b.window.getX(),q=b.window.getY();b.window.setLocation(y,q)});mxEvent.addListener(window,"resize",p);b.destroy=function(){mxEvent.removeListener(window,
"resize",p);b.window.destroy();null!=g&&g()}};function ChangeGridColor(b,e){this.ui=b;this.color=e}ChangeGridColor.prototype.execute=function(){var b=this.ui.editor.graph.view.gridColor;this.ui.setGridColor(this.color);this.color=b};(function(){var b=new mxObjectCodec(new ChangeGridColor,["ui"]);mxCodecRegistry.register(b)})(); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
f.nodeCount+=F.getElementsByTagName("mxCell").length);k=(k<<5)-k+this.hashValue(F,function(O,H,ka,fa){return!fa||"mxGeometry"!=O.nodeName&&"mxPoint"!=O.nodeName||"x"!=H&&"y"!=H&&"width"!=H&&"height"!=H?fa&&"mxCell"==O.nodeName&&"previous"==H?null:ka:Math.round(ka)},f)<<0}return k};EditorUi.prototype.hashValue=function(d,f,k){var u=0;if(null!=d&&"object"===typeof d&&"number"===typeof d.nodeType&&"string"===typeof d.nodeName&&"function"===typeof d.getAttribute){null!=d.nodeName&&(u^=this.hashValue(d.nodeName,
f,k));if(null!=d.attributes){null!=k&&(k.attrCount+=d.attributes.length);for(var z=0;z<d.attributes.length;z++){var C=d.attributes[z].name,F=null!=f?f(d,C,d.attributes[z].value,!0):d.attributes[z].value;null!=F&&(u^=this.hashValue(C,f,k)+this.hashValue(F,f,k))}}if(null!=d.childNodes)for(z=0;z<d.childNodes.length;z++)u=(u<<5)-u+this.hashValue(d.childNodes[z],f,k)<<0}else if(null!=d&&"function"!==typeof d){d=String(d);f=0;null!=k&&(k.byteCount+=d.length);for(z=0;z<d.length;z++)f=(f<<5)-f+d.charCodeAt(z)<<
0;u^=f}return u};EditorUi.prototype.descriptorChanged=function(){};EditorUi.prototype.restoreLibraries=function(){};EditorUi.prototype.saveLibrary=function(d,f,k,u,z,C,F){};EditorUi.prototype.isScratchpadEnabled=function(){return isLocalStorage||mxClient.IS_CHROMEAPP};EditorUi.prototype.toggleScratchpad=function(){this.isScratchpadEnabled()&&(null==this.scratchpad?StorageFile.getFileContent(this,".scratchpad",mxUtils.bind(this,function(d){null==d&&(d=this.emptyLibraryXml);this.loadLibrary(new StorageLibrary(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0),W=0;W<G.length;W++){M.add(R,G[W]);var d=q.view.getState(E[W]);if(null!=d){var f=q.getCellGeometry(G[W]);null!=f&&f.relative&&!M.isEdge(E[W])&&null==T[mxObjectIdentity.get(M.getParent(E[W]))]&&(f.offset=null,f.relative=!1,f.x=d.x/d.view.scale-d.view.translate.x,f.y=d.y/d.view.scale-d.view.translate.y)}}q.updateCustomLinks(q.createCellMapping(L,T),G);mxClipboard.insertCount=1;mxClipboard.setCells(G)}b.updatePasteActionStates();return E};var g=mxClipboard.paste;mxClipboard.paste=function(q){var E=
null;q.cellEditor.isContentEditing()?document.execCommand("paste",!1,null):E=g.apply(this,arguments);b.updatePasteActionStates();return E};var p=this.editor.graph.cellEditor.startEditing;this.editor.graph.cellEditor.startEditing=function(){p.apply(this,arguments);b.updatePasteActionStates()};var y=this.editor.graph.cellEditor.stopEditing;this.editor.graph.cellEditor.stopEditing=function(q,E){y.apply(this,arguments);b.updatePasteActionStates()};this.updatePasteActionStates()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
R&&R!=p.node;){if("a"==R.nodeName.toLowerCase()){g.view.graph.labelLinkClicked(g,R,M);break}R=R.parentNode}});mxEvent.addGestureListeners(p.node,L,T,G);mxEvent.addListener(p.node,"click",function(M){mxEvent.consume(M)})};if(null!=this.tooltipHandler){var e=this.tooltipHandler.init;this.tooltipHandler.init=function(){e.apply(this,arguments);null!=this.div&&mxEvent.addListener(this.div,"click",mxUtils.bind(this,function(g){var p=mxEvent.getSource(g);"A"==p.nodeName&&(p=p.getAttribute("href"),null!=
p&&this.graph.isCustomLink(p)&&(mxEvent.isTouchEvent(g)||!mxEvent.isPopupTrigger(g))&&this.graph.customLinkClicked(p)&&mxEvent.consume(g))}))}}this.addListener(mxEvent.SIZE,mxUtils.bind(this,function(g,p){null!=this.container&&this.flowAnimationStyle&&(g=this.flowAnimationStyle.getAttribute("id"),this.flowAnimationStyle.innerHTML=this.getFlowAnimationStyleCss(g))}));this.initLayoutManager()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function X(){mxShape.call(this)}function U(){mxShape.call(this)}function Z(){mxRectangleShape.call(this)}function ba(){mxShape.call(this)}function ia(){mxShape.call(this)}function qa(){mxShape.call(this)}function ra(){mxShape.call(this)}function pa(){mxShape.call(this)}function xa(){mxCylinder.call(this)}function Ca(){mxCylinder.call(this)}function Aa(){mxRectangleShape.call(this)}function za(){mxDoubleEllipse.call(this)}function Ma(){mxDoubleEllipse.call(this)}function Qa(){mxArrowConnector.call(this); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.createSvgNode=function(b,e,g,p,y){var q=mxUtils.createXmlDocument(),E=null!=q.createElementNS?q.createElementNS(mxConstants.NS_SVG,"svg"):q.createElement("svg");null!=y&&(null!=E.style?E.style.backgroundColor=y:E.setAttribute("style","background-color:"+y));null==q.createElementNS?(E.setAttribute("xmlns",mxConstants.NS_SVG),E.setAttribute("xmlns:xlink",mxConstants.NS_XLINK)):E.setAttributeNS("http://www.w3.org/2000/xmlns/","xmlns:xlink",mxConstants.NS_XLINK);E.setAttribute("version","1.1");
E.setAttribute("width",g+"px");E.setAttribute("height",p+"px");E.setAttribute("viewBox",b+" "+e+" "+g+" "+p);q.appendChild(E);return E};Graph.htmlToPng=function(b,e,g,p){var y=document.createElement("canvas");y.width=e;y.height=g;var q=document.createElement("img");q.onload=mxUtils.bind(this,function(){y.getContext("2d").drawImage(q,0,0);p(y.toDataURL())});q.src="data:image/svg+xml,"+encodeURIComponent('<svg xmlns="http://www.w3.org/2000/svg" width="100" height="100"><foreignObject width="100%" height="100%"><div xmlns="http://www.w3.org/1999/xhtml"><style>em{color:red;}</style><em>I</em> lick <span>cheese</span></div></foreignObject></svg>')}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
t-D/2;c.begin();c.moveTo(m,v);c.lineTo(m,v+t);c.moveTo(m+B,ha);c.lineTo(m+B+D,ha-D/2);c.moveTo(m+B,ha);c.lineTo(m+B+D,ha+D/2);c.moveTo(m+B,ha);c.lineTo(m+n-B,ha);c.moveTo(m+n,v);c.lineTo(m+n,v+t);c.moveTo(m+n-B,ha);c.lineTo(m+n-D-B,ha-D/2);c.moveTo(m+n-B,ha);c.lineTo(m+n-D-B,ha+D/2);c.end();c.stroke()};mxCellRenderer.registerShape("dimension",wa);mxUtils.extend(sa,mxEllipse);sa.prototype.drawHidden=!0;sa.prototype.paintVertexShape=function(c,m,v,n,t){this.outline||c.setStrokeColor(null);if(null!=
this.style){var B=c.pointerEvents,D=null!=this.fill&&this.fill!=mxConstants.NONE;"1"==mxUtils.getValue(this.style,mxConstants.STYLE_POINTER_EVENTS,"1")||D||(c.pointerEvents=!1);var ha="1"==mxUtils.getValue(this.style,"top","1"),I="1"==mxUtils.getValue(this.style,"left","1"),va="1"==mxUtils.getValue(this.style,"right","1"),na="1"==mxUtils.getValue(this.style,"bottom","1");this.drawHidden||D||this.outline||ha||va||na||I?(c.rect(m,v,n,t),c.fill(),c.pointerEvents=B,c.setStrokeColor(this.stroke),c.setLineCap("square"),
c.begin(),c.moveTo(m,v),this.outline||ha?c.lineTo(m+n,v):c.moveTo(m+n,v),this.outline||va?c.lineTo(m+n,v+t):c.moveTo(m+n,v+t),this.outline||na?c.lineTo(m,v+t):c.moveTo(m,v+t),(this.outline||I)&&c.lineTo(m,v),c.end(),c.stroke(),c.setLineCap("flat")):c.setStrokeColor(this.stroke)}};mxCellRenderer.registerShape("partialRectangle",sa);mxUtils.extend(ua,mxEllipse);ua.prototype.paintVertexShape=function(c,m,v,n,t){mxEllipse.prototype.paintVertexShape.apply(this,arguments);c.setShadow(!1);c.begin();"vertical"== | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.getFileData(!0,null,null,null,k,O,null,null,null,!1));ja(Graph.xmlDeclaration+"\n"+(z?Graph.svgFileComment+"\n":"")+Graph.svgDoctype+"\n"+mxUtils.getXml(l))});this.editor.graph.mathEnabled&&this.editor.addMathCss(S);var V=mxUtils.bind(this,function(l){C?(null==this.thumbImageCache&&(this.thumbImageCache={}),this.editor.convertImages(l,P,this.thumbImageCache)):P(l)});ca?this.embedFonts(S,V):(this.editor.addFontCss(S),V(S))}catch(l){this.handleError(l)}};EditorUi.prototype.addRadiobox=function(d,
f,k,u,z,C,F){return this.addCheckbox(d,k,u,z,C,F,!0,f)};EditorUi.prototype.addCheckbox=function(d,f,k,u,z,C,F,K){C=null!=C?C:!0;var O=document.createElement("input");O.style.marginRight="8px";O.style.marginTop="16px";O.setAttribute("type",F?"radio":"checkbox");F="geCheckbox-"+Editor.guid();O.id=F;null!=K&&O.setAttribute("name",K);k&&(O.setAttribute("checked","checked"),O.defaultChecked=!0);u&&O.setAttribute("disabled","disabled");C&&(d.appendChild(O),k=document.createElement("label"),mxUtils.write(k, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.showImageDialog=function(b,e,g,p){p=this.editor.graph.cellEditor;var y=p.saveSelection(),q=mxUtils.prompt(b,e);p.restoreSelection(y);if(null!=q&&0<q.length){var E=new Image;E.onload=function(){g(q,E.width,E.height)};E.onerror=function(){g(null);mxUtils.alert(mxResources.get("fileNotFound"))};E.src=q}else g(null)};EditorUi.prototype.showLinkDialog=function(b,e,g){b=new LinkDialog(this,b,e,g);this.showDialog(b.container,420,90,!0,!0);b.init()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
p,g);this.ui.actions.get("share").funct()}))}))}),null,mxResources.get("saveToGoogleDrive",null,"Save to Google Drive"),mxResources.get("cancel")):this.ui.alert(mxResources.get("sharingAvailable"),null,380)};DrawioFile.prototype.getHash=function(){return""};DrawioFile.prototype.getId=function(){return""};DrawioFile.prototype.isEditable=function(){return!this.ui.editor.isChromelessView()||this.ui.editor.editable};DrawioFile.prototype.getUi=function(){return this.ui};DrawioFile.prototype.getTitle=function(){return""}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
E.setAttribute("width",g+"px");E.setAttribute("height",p+"px");E.setAttribute("viewBox",b+" "+e+" "+g+" "+p);q.appendChild(E);return E};Graph.htmlToPng=function(b,e,g,p){var y=document.createElement("canvas");y.width=e;y.height=g;var q=document.createElement("img");q.onload=mxUtils.bind(this,function(){y.getContext("2d").drawImage(q,0,0);p(y.toDataURL())});q.src="data:image/svg+xml,"+encodeURIComponent('<svg xmlns="http://www.w3.org/2000/svg" width="100" height="100"><foreignObject width="100%" height="100%"><div xmlns="http://www.w3.org/1999/xhtml"><style>em{color:red;}</style><em>I</em> lick <span>cheese</span></div></foreignObject></svg>')}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(d,f,k,u,z,C,F,K){EditorUi.logEvent("SHOULD NOT BE CALLED: loadUrl");return this.editor.loadUrl(d,f,k,u,z,C,F,K)};EditorUi.prototype.loadFonts=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: loadFonts");return this.editor.loadFonts(d)};EditorUi.prototype.createSvgDataUri=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: createSvgDataUri");return Editor.createSvgDataUri(d)};EditorUi.prototype.embedCssFonts=function(d,f){EditorUi.logEvent("SHOULD NOT BE CALLED: embedCssFonts");return this.editor.embedCssFonts(d, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
GraphViewer.prototype.addClickHandler=function(b,e){b.linkPolicy=this.graphConfig.target||b.linkPolicy;b.addClickHandler(this.graphConfig.highlight,mxUtils.bind(this,function(g,p){if(null==p)for(var y=mxEvent.getSource(g);y!=b.container&&null!=y&&null==p;)"a"==y.nodeName.toLowerCase()&&(p=y.getAttribute("href")),y=y.parentNode;null!=e?null==p||b.isCustomLink(p)?mxEvent.consume(g):b.isExternalProtocol(p)||b.isBlankLink(p)||window.setTimeout(function(){e.destroy()},0):null!=p&&null==e&&b.isCustomLink(p)&&
(mxEvent.isTouchEvent(g)||!mxEvent.isPopupTrigger(g))&&b.customLinkClicked(p)&&(mxUtils.clearSelection(),mxEvent.consume(g))}),mxUtils.bind(this,function(g){null!=e||!this.lightboxClickEnabled||mxEvent.isTouchEvent(g)&&0!=this.toolbarItems.length||this.showLightbox()}))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
k.div.cloneNode(!0);var ca=k.div.querySelector(".geCommentEditTxtArea"),ja=k.div.querySelector(".geCommentEditBtns");k.comment.content=ca.value;ca.parentNode.removeChild(ca);ja.parentNode.removeChild(ja)}catch(ma){b.handleError(ma)}C.innerHTML='<div style="padding-top:10px;text-align:center;"><img src="'+IMAGE_PATH+'/spin.gif" valign="middle"> '+mxUtils.htmlEntities(mxResources.get("loading"))+"...</div>";f=b.canReplyToReplies();b.commentsSupported()?b.getComments(function(ma){function aa(S){if(null!=
S){S.sort(function(P,V){return new Date(P.modifiedDate)-new Date(V.modifiedDate)});for(var da=0;da<S.length;da++)aa(S[da].replies)}}ma.sort(function(S,da){return new Date(S.modifiedDate)-new Date(da.modifiedDate)});C.innerText="";C.appendChild(F);F.style.display="block";ka=ma;for(ma=0;ma<ka.length;ma++)aa(ka[ma].replies),W(ka[ma],ka,null,0,H);null!=k&&null==k.comment.id&&null==k.comment.pCommentId&&(C.appendChild(k.div),L(k.comment,k.div,k.saveCallback,k.deleteOnCancel))},mxUtils.bind(this,function(ma){C.innerHTML= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
this.getCursorForMouseEvent=function(S){var da=null==S.state&&null!=S.sourceState&&this.isCellLocked(S.sourceState.cell);return this.getCursorForCell(da?S.sourceState.cell:S.getCell())};var fa=this.getCursorForCell;this.getCursorForCell=function(S){if(!this.isEnabled()||this.isCellLocked(S)){if(null!=this.getClickableLinkForCell(S))return"pointer";if(this.isCellLocked(S))return"default"}return fa.apply(this,arguments)};this.selectRegion=function(S,da){var P=mxEvent.isAltDown(da)?S:null;S=this.getCells(S.x, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(Va){try{null!=Va&&this.addFontCss(Da,Va),this.loadFonts(ya)}catch(Wa){null!=U&&U(Wa)}}))}catch(Va){null!=U&&U(Va)}}),N,pa)}catch(Da){null!=U&&U(Da)}};Editor.crcTable=[];for(var y=0;256>y;y++)for(var q=y,E=0;8>E;E++)q=1==(q&1)?3988292384^q>>>1:q>>>1,Editor.crcTable[y]=q;Editor.updateCRC=function(l,A,N,X){for(var U=0;U<X;U++)l=Editor.crcTable[(l^A.charCodeAt(N+U))&255]^l>>>8;return l};Editor.crc32=function(l){for(var A=-1,N=0;N<l.length;N++)A=A>>>8^Editor.crcTable[(A^l.charCodeAt(N))&255]; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxUtils.bind(this,fa.prototype.curveTo);this.originalArcTo=this.canvas.arcTo;this.canvas.arcTo=mxUtils.bind(this,fa.prototype.arcTo)}function ca(){mxRectangleShape.call(this)}function ja(){mxRectangleShape.call(this)}function ma(){mxActor.call(this)}function aa(){mxActor.call(this)}function S(){mxActor.call(this)}function da(){mxRectangleShape.call(this)}function P(){mxRectangleShape.call(this)}function V(){mxCylinder.call(this)}function l(){mxShape.call(this)}function A(){mxShape.call(this)}function N(){mxEllipse.call(this)} | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
mxCellRenderer.registerShape("plus",da);var ib=mxRhombus.prototype.paintVertexShape;mxRhombus.prototype.getLabelBounds=function(c){if(1==this.style["double"]){var m=(2*Math.max(2,this.strokewidth+1)+parseFloat(this.style[mxConstants.STYLE_MARGIN]||0))*this.scale;return new mxRectangle(c.x+m,c.y+m,c.width-2*m,c.height-2*m)}return c};mxRhombus.prototype.paintVertexShape=function(c,m,v,n,t){ib.apply(this,arguments);if(!this.outline&&1==this.style["double"]){var B=2*Math.max(2,this.strokewidth+1)+parseFloat(this.style[mxConstants.STYLE_MARGIN]|| | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
f,k,u,z,C,F){return this.addCheckbox(d,k,u,z,C,F,!0,f)};EditorUi.prototype.addCheckbox=function(d,f,k,u,z,C,F,K){C=null!=C?C:!0;var O=document.createElement("input");O.style.marginRight="8px";O.style.marginTop="16px";O.setAttribute("type",F?"radio":"checkbox");F="geCheckbox-"+Editor.guid();O.id=F;null!=K&&O.setAttribute("name",K);k&&(O.setAttribute("checked","checked"),O.defaultChecked=!0);u&&O.setAttribute("disabled","disabled");C&&(d.appendChild(O),k=document.createElement("label"),mxUtils.write(k,
f),k.setAttribute("for",F),d.appendChild(k),z||mxUtils.br(d));return O};EditorUi.prototype.addEditButton=function(d,f){var k=this.addCheckbox(d,mxResources.get("edit")+":",!0,null,!0);k.style.marginLeft="24px";var u=this.getCurrentFile(),z="";null!=u&&u.getMode()!=App.MODE_DEVICE&&u.getMode()!=App.MODE_BROWSER&&(z=window.location.href);var C=document.createElement("select");C.style.maxWidth="200px";C.style.width="auto";C.style.marginLeft="8px";C.style.marginRight="10px";C.className="geBtn";u=document.createElement("option"); | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
f));d.setCellStyles(mxConstants.STYLE_CLIP_PATH,M,[G]);d.setCellStyles(mxConstants.STYLE_ASPECT,"fixed",[G])}finally{d.getModel().endUpdate()}}var p=this.editorUi,y=p.editor,q=y.graph,E=function(){return Action.prototype.isEnabled.apply(this,arguments)&&q.isEnabled()};this.addAction("new...",function(){q.openLink(p.getUrl())});this.addAction("open...",function(){window.openNew=!0;window.openKey="open";p.openFile()});this.put("smartFit",new Action(mxResources.get("fitWindow")+" / "+mxResources.get("resetView"), | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.arrayBufferToString=function(b){var e="";b=new Uint8Array(b);for(var g=b.byteLength,p=0;p<g;p++)e+=String.fromCharCode(b[p]);return e};Graph.stringToArrayBuffer=function(b){return Uint8Array.from(b,function(e){return e.charCodeAt(0)})}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.showError=function(b,e,g,p,y,q,E,L,T,G,M,R,W){b=new ErrorDialog(this,b,e,g||mxResources.get("ok"),p,y,q,E,R,L,T);e=Math.ceil(null!=e?e.length/50:1);this.showDialog(b.container,G||340,M||100+20*e,!0,!1,W);b.init()};EditorUi.prototype.showDialog=function(b,e,g,p,y,q,E,L,T,G){this.editor.graph.tooltipHandler.resetTimer();this.editor.graph.tooltipHandler.hideTooltip();null==this.dialogs&&(this.dialogs=[]);this.dialog=new Dialog(this,b,e,g,p,y,q,E,L,T,G);this.dialogs.push(this.dialog)}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Q.push(la)}else Q.push(null)})(this.graph.view.getState(J.getChildAt(this.state.cell,Y)));return Q};mxVertexHandler.prototype.destroyMoveHandles=function(){if(null!=this.moveHandles){for(var x=0;x<this.moveHandles.length;x++)null!=this.moveHandles[x]&&this.moveHandles[x].destroy();this.moveHandles=null}};var N=mxVertexHandler.prototype.refresh;mxVertexHandler.prototype.refresh=function(){N.apply(this,arguments);this.graph.isTable(this.state.cell)&&this.graph.isCellMovable(this.state.cell)&&this.refreshMoveHandles()}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.zapGremlins=function(b){for(var e=0,g=[],p=0;p<b.length;p++){var y=b.charCodeAt(p);(32<=y||9==y||10==y||13==y)&&65535!=y&&65534!=y||(g.push(b.substring(e,p)),e=p+1)}0<e&&e<b.length&&g.push(b.substring(e));return 0==g.length?b:g.join("")};Graph.stringToBytes=function(b){for(var e=Array(b.length),g=0;g<b.length;g++)e[g]=b.charCodeAt(g);return e};Graph.bytesToString=function(b){for(var e=Array(b.length),g=0;g<b.length;g++)e[g]=String.fromCharCode(b[g]);return e.join("")}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Graph.prototype.convertValueToString=function(b){var e=this.model.getValue(b);if(null!=e&&"object"==typeof e){var g=null;if(this.isReplacePlaceholders(b)&&null!=b.getAttribute("placeholder")){e=b.getAttribute("placeholder");for(var p=b;null==g&&null!=p;)null!=p.value&&"object"==typeof p.value&&(g=p.hasAttribute(e)?null!=p.getAttribute(e)?p.getAttribute(e):"":null),p=this.model.getParent(p)}else g=null,Graph.translateDiagram&&null!=Graph.diagramLanguage&&(g=e.getAttribute("label_"+Graph.diagramLanguage)),
null==g&&(g=e.getAttribute("label")||"");return g||""}return mxGraph.prototype.convertValueToString.apply(this,arguments)};Graph.prototype.getLinksForState=function(b){return null!=b&&null!=b.text&&null!=b.text.node?b.text.node.getElementsByTagName("a"):null};Graph.prototype.getLinkForCell=function(b){return null!=b.value&&"object"==typeof b.value?(b=b.value.getAttribute("link"),null!=b&&"javascript:"===b.toLowerCase().substring(0,11)&&(b=b.substring(11)),b):null}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
GraphViewer.prototype.getObservableParent=function(b){for(b=b.parentNode;b!=document.body&&null!=b.parentNode&&"none"!==mxUtils.getCurrentStyle(b).display;)b=b.parentNode;return b};GraphViewer.prototype.getImageUrl=function(b){null!=b&&"http://"!=b.substring(0,7)&&"https://"!=b.substring(0,8)&&"data:image"!=b.substring(0,10)&&("/"==b.charAt(0)&&(b=b.substring(1,b.length)),b=this.imageBaseUrl+b);return b}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
EditorUi.prototype.restoreViewState=function(b,e,g){b=null!=b?this.getPageById(b.getId()):null;var p=this.editor.graph;null!=b&&null!=this.currentPage&&null!=this.pages&&(b!=this.currentPage?this.selectPage(b,!0,e):(p.setViewState(e),this.editor.updateGraphComponents(),p.view.revalidate(),p.sizeDidChange()),p.container.scrollLeft=p.view.translate.x*p.view.scale+e.scrollLeft,p.container.scrollTop=p.view.translate.y*p.view.scale+e.scrollTop,p.restoreSelection(g))}; | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
function(x){return p.apply(this,arguments)||this.graph.isEdgeIgnored(x)};var y=mxConnectionHandler.prototype.isCreateTarget;mxConnectionHandler.prototype.isCreateTarget=function(x){return this.graph.isCloneEvent(x)!=y.apply(this,arguments)};mxConstraintHandler.prototype.createHighlightShape=function(){var x=new mxEllipse(null,this.highlightColor,this.highlightColor,0);x.opacity=mxConstants.HIGHLIGHT_OPACITY;return x};mxConnectionHandler.prototype.livePreview=!0;mxConnectionHandler.prototype.cursor= | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
20;xa.prototype.jettyHeight=10;xa.prototype.redrawPath=function(c,m,v,n,t,B){var D=parseFloat(mxUtils.getValue(this.style,"jettyWidth",this.jettyWidth));m=parseFloat(mxUtils.getValue(this.style,"jettyHeight",this.jettyHeight));v=D/2;D=v+D/2;var ha=Math.min(m,t-m),I=Math.min(ha+2*m,t-m);B?(c.moveTo(v,ha),c.lineTo(D,ha),c.lineTo(D,ha+m),c.lineTo(v,ha+m),c.moveTo(v,I),c.lineTo(D,I),c.lineTo(D,I+m),c.lineTo(v,I+m)):(c.moveTo(v,0),c.lineTo(n,0),c.lineTo(n,t),c.lineTo(v,t),c.lineTo(v,I+m),c.lineTo(0,I+
m),c.lineTo(0,I),c.lineTo(v,I),c.lineTo(v,ha+m),c.lineTo(0,ha+m),c.lineTo(0,ha),c.lineTo(v,ha),c.close());c.end()};mxCellRenderer.registerShape("module",xa);mxUtils.extend(Ca,mxCylinder);Ca.prototype.jettyWidth=32;Ca.prototype.jettyHeight=12;Ca.prototype.redrawPath=function(c,m,v,n,t,B){var D=parseFloat(mxUtils.getValue(this.style,"jettyWidth",this.jettyWidth));m=parseFloat(mxUtils.getValue(this.style,"jettyHeight",this.jettyHeight));v=D/2;D=v+D/2;var ha=.3*t-m/2,I=.7*t-m/2;B?(c.moveTo(v,ha),c.lineTo(D, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
0;u^=f}return u};EditorUi.prototype.descriptorChanged=function(){};EditorUi.prototype.restoreLibraries=function(){};EditorUi.prototype.saveLibrary=function(d,f,k,u,z,C,F){};EditorUi.prototype.isScratchpadEnabled=function(){return isLocalStorage||mxClient.IS_CHROMEAPP};EditorUi.prototype.toggleScratchpad=function(){this.isScratchpadEnabled()&&(null==this.scratchpad?StorageFile.getFileContent(this,".scratchpad",mxUtils.bind(this,function(d){null==d&&(d=this.emptyLibraryXml);this.loadLibrary(new StorageLibrary(this, | 0 | JavaScript | CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. | https://cwe.mitre.org/data/definitions/78.html | vulnerable |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.