code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
EditorUi.prototype.getImageForPage=function(b,e,g){g=null!=g?g:this.editor.graph;var p=g.getGlobalVariable,y=this.createTemporaryGraph(g.getStylesheet());y.defaultPageBackgroundColor=g.defaultPageBackgroundColor;y.shapeBackgroundColor=g.shapeBackgroundColor;y.shapeForegroundColor=g.shapeForegroundColor;var q=this.getPageIndex(null!=e?e:this.currentPage);y.getGlobalVariable=function(L){return"pagenumber"==L?q+1:"page"==L&&null!=e?e.getName():p.apply(this,arguments)};document.body.appendChild(y.container);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
A.split("|").map(function(U){U=U.split("^");return{name:U[0],url:U[1]}}),N=0;N<A.length;N++)this.graph.addExtFont(A[N].name,A[N].url)}catch(U){console.log("ExtFonts format error: "+U.message)}else null!=this.graph.extFonts&&0<this.graph.extFonts.length&&(this.graph.extFonts=[])}b.apply(this,arguments)}else throw{message:mxResources.get("notADiagramFile")||"Invalid data",toString:function(){return this.message}};};var e=Editor.prototype.getGraphXml;Editor.prototype.getGraphXml=function(l,A){l=null!= l?l:!0;var N=e.apply(this,arguments);null!=this.graph.currentStyle&&"default-style2"!=this.graph.currentStyle&&N.setAttribute("style",this.graph.currentStyle);var X=this.graph.getBackgroundImageObject(this.graph.backgroundImage,A);null!=X&&N.setAttribute("backgroundImage",JSON.stringify(X));N.setAttribute("math",this.graph.mathEnabled?"1":"0");N.setAttribute("shadow",this.graph.shadowVisible?"1":"0");null!=this.graph.extFonts&&0<this.graph.extFonts.length&&(X=this.graph.extFonts.map(function(U){return U.name+ "^"+U.url}),N.setAttribute("extFonts",X.join("|")));return N};Editor.prototype.isDataSvg=function(l){try{var A=mxUtils.parseXml(l).documentElement.getAttribute("content");if(null!=A&&(null!=A&&"<"!=A.charAt(0)&&"%"!=A.charAt(0)&&(A=unescape(window.atob?atob(A):Base64.decode(cont,A))),null!=A&&"%"==A.charAt(0)&&(A=decodeURIComponent(A)),null!=A&&0<A.length)){var N=mxUtils.parseXml(A).documentElement;return"mxfile"==N.nodeName||"mxGraphModel"==N.nodeName}}catch(X){}return!1};Editor.prototype.extractGraphModel=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u.onreadystatechange=function(){f(u)};u.send("format=xml&filename="+encodeURIComponent(k)+"&data="+encodeURIComponent(d));try{EditorUi.logEvent({category:"GLIFFY-IMPORT-FILE",action:"size_"+file.size})}catch(z){}};EditorUi.prototype.isResampleImageSize=function(d,f){f=null!=f?f:this.resampleThreshold;return d>f};EditorUi.prototype.resizeImage=function(d,f,k,u,z,C,F){z=null!=z?z:this.maxImageSize;var K=Math.max(1,d.width),O=Math.max(1,d.height);if(u&&this.isResampleImageSize(null!=F?F:f.length,C))try{var H=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.getValue(J,mxConstants.STYLE_ELBOW,mxConstants.ELBOW_HORIZONTAL)==mxConstants.ELBOW_HORIZONTAL?mxConstants.ELBOW_VERTICAL:mxConstants.ELBOW_HORIZONTAL;this.setCellStyles(mxConstants.STYLE_ELBOW,J,[x])}};Graph.prototype.isValidRoot=function(x){for(var J=this.model.getChildCount(x),Q=0,Y=0;Y<J;Y++){var ea=this.model.getChildAt(x,Y);this.model.isVertex(ea)&&(ea=this.getCellGeometry(ea),null==ea||ea.relative||Q++)}return 0<Q||this.isContainer(x)};Graph.prototype.isValidDropTarget=function(x,J,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u.onreadystatechange=function(){f(u)};u.send("format=xml&filename="+encodeURIComponent(k)+"&data="+encodeURIComponent(d));try{EditorUi.logEvent({category:"GLIFFY-IMPORT-FILE",action:"size_"+file.size})}catch(z){}};EditorUi.prototype.isResampleImageSize=function(d,f){f=null!=f?f:this.resampleThreshold;return d>f};EditorUi.prototype.resizeImage=function(d,f,k,u,z,C,F){z=null!=z?z:this.maxImageSize;var K=Math.max(1,d.width),O=Math.max(1,d.height);if(u&&this.isResampleImageSize(null!=F?F:f.length,C))try{var H=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.changeHandler=null)}}();(function(){function b(c,m,v){mxShape.call(this);this.line=c;this.stroke=m;this.strokewidth=null!=v?v:1;this.updateBoundsFromLine()}function e(){mxSwimlane.call(this)}function g(){mxSwimlane.call(this)}function p(){mxCylinder.call(this)}function y(){mxConnector.call(this)}function q(){mxCylinder.call(this)}function E(){mxActor.call(this)}function L(){mxCylinder.call(this)}function T(){mxCylinder.call(this)}function G(){mxCylinder.call(this)}function M(){mxCylinder.call(this)}function R(){mxShape.call(this)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
if(this.graph.isTable(this.state.cell)&&this.graph.isCellMovable(this.state.cell)){var J=function(Za,cb,Sa){for(var db=[],lb=0;lb<Za.length;lb++){var kb=Za[lb];db.push(null==kb?null:new mxPoint((sa+kb.x+cb)*la,(ua+kb.y+Sa)*la))}return db},Q=this,Y=this.graph,ea=Y.model,la=Y.view.scale,oa=this.state,wa=this.selectionBorder,sa=this.state.origin.x+Y.view.translate.x,ua=this.state.origin.y+Y.view.translate.y;null==x&&(x=[]);var Fa=Y.view.getCellStates(ea.getChildCells(this.state.cell,!0));if(0<Fa.length){var Ua=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
shortTime:"h:MM TT",mediumTime:"h:MM:ss TT",longTime:"h:MM:ss TT Z",isoDate:"yyyy-mm-dd",isoTime:"HH:MM:ss",isoDateTime:"yyyy-mm-dd'T'HH:MM:ss",isoUtcDateTime:"UTC:yyyy-mm-dd'T'HH:MM:ss'Z'"}});var p=this.dateFormatCache,y=/\b(?:[PMCEA][SDP]T|(?:Pacific|Mountain|Central|Eastern|Atlantic) (?:Standard|Daylight|Prevailing) Time|(?:GMT|UTC)(?:[-+]\d{4})?)\b/g,q=/[^-+\dA-Z]/g,E=function(z,C){z=String(z);for(C=C||2;z.length<C;)z="0"+z;return z};1!=arguments.length||"[object String]"!=Object.prototype.toString.call(b)||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
la.nextSibling);ea=oa}}function Y(ea){for(var la=ea.firstChild;null!=la;){var oa=la.nextSibling;Y(la);la=oa}1==ea.nodeType&&("BR"===ea.nodeName||null!=ea.firstChild)||3==ea.nodeType&&0!=mxUtils.trim(mxUtils.getTextContent(ea)).length?(3==ea.nodeType&&mxUtils.setTextContent(ea,mxUtils.getTextContent(ea).replace(/\n|\r/g,"")),1==ea.nodeType&&(ea.removeAttribute("style"),ea.removeAttribute("class"),ea.removeAttribute("width"),ea.removeAttribute("cellpadding"),ea.removeAttribute("cellspacing"),ea.removeAttribute("border"))): ea.parentNode.removeChild(ea)}F.apply(this,arguments);7!==document.documentMode&&8!==document.documentMode&&mxEvent.addListener(this.textarea,"paste",mxUtils.bind(this,function(ea){var la=J(this.textarea,this.textarea.cloneNode(!0));window.setTimeout(mxUtils.bind(this,function(){null!=this.textarea&&(0<=this.textarea.innerHTML.indexOf("<o:OfficeDocumentSettings>")||0<=this.textarea.innerHTML.indexOf("\x3c!--[if !mso]>")?Q(this.textarea,la):Graph.removePasteFormatting(this.textarea.firstChild))}),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k)};EditorUi.prototype.getDatabaseItem=function(d,f,k,u){this.openDatabase(mxUtils.bind(this,function(z){try{u=u||"objects";var C=z.transaction([u],"readonly").objectStore(u).get(d);C.onsuccess=function(){f(C.result)};C.onerror=k}catch(F){null!=k&&k(F)}}),k)};EditorUi.prototype.getDatabaseItems=function(d,f,k){this.openDatabase(mxUtils.bind(this,function(u){try{k=k||"objects";var z=u.transaction([k],"readonly").objectStore(k).openCursor(IDBKeyRange.lowerBound(0)),C=[];z.onsuccess=function(F){null== F.target.result?d(C):(C.push(F.target.result.value),F.target.result.continue())};z.onerror=f}catch(F){null!=f&&f(F)}}),f)};EditorUi.prototype.getDatabaseItemKeys=function(d,f,k){this.openDatabase(mxUtils.bind(this,function(u){try{k=k||"objects";var z=u.transaction([k],"readonly").objectStore(k).getAllKeys();z.onsuccess=function(){d(z.result)};z.onerror=f}catch(C){null!=f&&f(C)}}),f)};EditorUi.prototype.commentsSupported=function(){var d=this.getCurrentFile();return null!=d?d.commentsSupported():!1};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxClient.IS_POINTER?"pointerdown":"mousedown",mxUtils.bind(this,function(C){C.preventDefault()})),mxEvent.addListener(z,"click",function(C){"disabled"!=z.getAttribute("disabled")&&k(C);mxEvent.consume(C)}));return z};EditorUi.prototype.createMenuItem=function(d,f,k){var u=this.actions.get(d),z=null!=u?u.funct:null,C=this.createToolbarButton(f,mxResources.get(d)+(null!=u&&null!=u.shortcut?" ("+u.shortcut+")":""),z);null==u||k||(d=function(){u.isEnabled()?(C.removeAttribute("disabled"),C.style.cursor= "pointer"):(C.setAttribute("disabled","disabled"),C.style.cursor="default");C.style.opacity=u.isEnabled()?"":"0.2"},this.editor.graph.addListener("enabledChanged",d),u.addListener("stateChanged",d),d());return C};EditorUi.prototype.createFormatWindow=function(){if(null==this.formatWindow){var d=Math.max(10,this.diagramContainer.parentNode.clientWidth-256),f="1"==urlParams.embedInline?580:"1"==urlParams.sketch?580:Math.min(566,this.editor.graph.container.clientHeight-10);this.formatWindow=new WrapperWindow(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(null!=Z||0<=mxUtils.indexOf(ba,mxUtils.hex2rgb(ia.fill)))?"solid":qa.fillStyle);ia.fillStyle=ba;return ia};l.prototype.begin=function(){this.passThrough?this.originalBegin.apply(this.canvas,arguments):this.path=[]};l.prototype.end=function(){this.passThrough&&this.originalEnd.apply(this.canvas,arguments)};l.prototype.addOp=function(){if(null!=this.path&&(this.path.push(arguments[0]),2<arguments.length))for(var Z=2;Z<arguments.length;Z+=2)this.lastX=arguments[Z-1],this.lastY=arguments[Z],this.path.push(this.canvas.format(this.lastX)),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Ma[Qa]);0<=Oa&&ia.splice(Oa,1)}}}}}var ta=l.isEdge(ba);U=ta?N:A;var Da=l.getStyle(ba);for(pa=0;pa<ia.length;pa++){Aa=ia[pa];var Ba=U[Aa];null!=Ba&&"edgeStyle"!=Aa&&("shape"!=Aa||ta)&&(!ta||X||0>mxUtils.indexOf(T,Aa))&&(Da=mxUtils.setStyle(Da,Aa,Ba))}Editor.simpleLabels&&(Da=mxUtils.setStyle(mxUtils.setStyle(Da,"html",null),"whiteSpace",null));l.setStyle(ba,Da)}}finally{l.endUpdate()}return P};y.addListener("cellsInserted",function(P,V){f(V.getProperty("cells"),null,null,null,null,!0,!0)});y.addListener("textInserted",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
document.body.clientHeight,(1200>(window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth)||708>d)&&this.formatWindow.window.toggleMinimized()):this.formatWindow.window.setVisible(!1)}};var L=EditorUi.prototype.toggleFormatPanel;EditorUi.prototype.toggleFormatPanel=function(d){var f=this.formatWindow;null!=f?f.window.setVisible(null!=d?d:!this.isFormatPanelVisible()):L.apply(this,arguments)};EditorUi.prototype.toggleShapesPanel=function(d){var f=EditorUi.prototype.hsplitPosition;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
R);mxUtils.extend(W,mxShape);W.prototype.size=15;W.prototype.paintVertexShape=function(c,m,v,n,t){var B=Math.max(0,Math.min(.5*t,parseFloat(mxUtils.getValue(this.style,"size",this.size))));c.translate(m,v);0==B?(c.rect(0,0,n,t),c.fillAndStroke()):(c.begin(),c.moveTo(0,B),c.arcTo(.5*n,B,0,0,1,.5*n,0),c.arcTo(.5*n,B,0,0,1,n,B),c.lineTo(n,t-B),c.arcTo(.5*n,B,0,0,1,.5*n,t),c.arcTo(.5*n,B,0,0,1,0,t-B),c.close(),c.fillAndStroke(),c.setShadow(!1),c.begin(),c.moveTo(n,B),c.arcTo(.5*n,B,0,0,1,.5*n,2*B),c.arcTo(.5* n,B,0,0,1,0,B),c.stroke())};mxCellRenderer.registerShape("cylinder2",W);mxUtils.extend(d,mxCylinder);d.prototype.size=15;d.prototype.paintVertexShape=function(c,m,v,n,t){var B=Math.max(0,Math.min(.5*t,parseFloat(mxUtils.getValue(this.style,"size",this.size)))),D=mxUtils.getValue(this.style,"lid",!0);c.translate(m,v);0==B?(c.rect(0,0,n,t),c.fillAndStroke()):(c.begin(),D?(c.moveTo(0,B),c.arcTo(.5*n,B,0,0,1,.5*n,0),c.arcTo(.5*n,B,0,0,1,n,B)):(c.moveTo(0,0),c.arcTo(.5*n,B,0,0,0,.5*n,B),c.arcTo(.5*n,B,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.path.push(this.canvas.format(this.lastY))};l.prototype.lineTo=function(Z,ba){this.passThrough?this.originalLineTo.apply(this.canvas,arguments):(this.addOp(this.lineOp,Z,ba),this.lastX=Z,this.lastY=ba)};l.prototype.moveTo=function(Z,ba){this.passThrough?this.originalMoveTo.apply(this.canvas,arguments):(this.addOp(this.moveOp,Z,ba),this.lastX=Z,this.lastY=ba,this.firstX=Z,this.firstY=ba)};l.prototype.close=function(){this.passThrough?this.originalClose.apply(this.canvas,arguments):this.addOp(this.closeOp)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.updateShapes=function(b,e){this.model.beginUpdate();try{for(var g=0;g<e.length;g++){if(this.model.isVertex(b)&&this.model.isVertex(e[g])||this.model.isEdge(b)&&this.model.isEdge(e[g])){var p=this.copyStyle(e[g]);this.model.setStyle(e[g],this.model.getStyle(b));this.pasteStyle(p,[e[g]])}"1"==mxUtils.getValue(this.getCellStyle(e[g],!1),"composite","0")&&this.removeChildCells(e[g])}}finally{this.model.endUpdate()}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ka.prototype.redrawPath=function(c,m,v,n,t){c.setStrokeWidth(1);c.setFillColor(this.stroke);m=n/5;c.rect(0,0,m,t);c.fillAndStroke();c.rect(2*m,0,m,t);c.fillAndStroke();c.rect(4*m,0,m,t);c.fillAndStroke()};mxCellRenderer.registerShape("parallelMarker",ka);fa.prototype.moveTo=function(c,m){this.originalMoveTo.apply(this.canvas,arguments);this.lastX=c;this.lastY=m;this.firstX=c;this.firstY=m};fa.prototype.close=function(){null!=this.firstX&&null!=this.firstY&&(this.lineTo(this.firstX,this.firstY),this.originalClose.apply(this.canvas,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.saveFile=function(b,e,g,p){};DrawioFile.prototype.getFileUrl=function(){return null};DrawioFile.prototype.getFolderUrl=function(b){return null};DrawioFile.prototype.getPublicUrl=function(b){b(null)};DrawioFile.prototype.isRestricted=function(){return DrawioFile.RESTRICT_EXPORT};DrawioFile.prototype.isModified=function(){return this.modified};DrawioFile.prototype.getShadowModified=function(){return this.shadowModified};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D&&"fold"==B)&&c.lineTo(0,t-ha);else c.lineTo(0,t)};Na.prototype.paintNWInner=function(c,m,v,n,t,B,D,ha,I){if("rounded"==D||"default"==D&&"rounded"==B)c.arcTo(ha-.5*I,ha-.5*I,0,0,0,I,.5*I+ha);else if("invRound"==D||"default"==D&&"invRound"==B)c.arcTo(ha+I,ha+I,0,0,1,I,I+ha);else if("snip"==D||"default"==D&&"snip"==B)c.lineTo(I,.5*I+ha);else if("fold"==D||"default"==D&&"fold"==B)c.lineTo(I+ha,I+ha),c.lineTo(I,I+ha)};Na.prototype.paintTopInner=function(c,m,v,n,t,B,D,ha,I,va,na){va||na?!va&&na?c.lineTo(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k(mxStencilRegistry.getBasenameForStencil(z[mxConstants.STYLE_SHAPE]));u.model.isEdge(d)&&(k(mxMarker.getPackageForType(z[mxConstants.STYLE_STARTARROW])),k(mxMarker.getPackageForType(z[mxConstants.STYLE_ENDARROW])));z=u.model.getChildCount(d);for(var C=0;C<z;C++)this.addBasenamesForCell(u.model.getChildAt(d,C),f)};EditorUi.prototype.setGraphEnabled=function(d){this.diagramContainer.style.visibility=d?"":"hidden";this.formatContainer.style.visibility=d?"":"hidden";this.sidebarContainer.style.display= d?"":"none";this.hsplit.style.display=d&&"sketch"!=Editor.currentTheme&&"min"!=Editor.currentTheme?"":"none";this.editor.graph.setEnabled(d);null!=this.tabContainer&&(this.tabContainer.style.visibility=d?"":"hidden");null!=this.ruler&&(this.ruler.hRuler.container.style.visibility=d?"":"hidden",this.ruler.vRuler.container.style.visibility=d?"":"hidden");d||this.hideWindows()};EditorUi.prototype.initializeEmbedMode=function(){this.setGraphEnabled(!1);if((window.opener||window.parent)!=window&&("1"!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.autosave=function(b,e,g,p){null==this.lastAutosave&&(this.lastAutosave=Date.now());b=Date.now()-this.lastAutosave<e?b:0;this.clearAutosave();var y=window.setTimeout(mxUtils.bind(this,function(){try{if(this.lastAutosave=null,this.autosaveThread==y&&(this.autosaveThread=null),EditorUi.debug("DrawioFile.autosave",[this],"thread",y,"modified",this.isModified(),"now",this.isAutosaveNow(),"saving",this.savingFile),this.isModified()&&this.isAutosaveNow()){var q=this.isAutosaveRevision(); q&&(this.lastAutosaveRevision=(new Date).getTime());this.save(q,mxUtils.bind(this,function(E){this.autosaveCompleted();null!=g&&g(E)}),mxUtils.bind(this,function(E){null!=p&&p(E)}))}else this.isModified()||this.ui.editor.setStatus(""),null!=g&&g(null)}catch(E){null!=p&&p(E)}}),b);EditorUi.debug("DrawioFile.autosave",[this],"thread",y,"delay",b,"saving",this.savingFile);this.autosaveThread=y};DrawioFile.prototype.isAutosaveNow=function(){return!0};DrawioFile.prototype.autosaveCompleted=function(){};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
p,g);this.ui.actions.get("share").funct()}))}))}),null,mxResources.get("saveToGoogleDrive",null,"Save to Google Drive"),mxResources.get("cancel")):this.ui.alert(mxResources.get("sharingAvailable"),null,380)};DrawioFile.prototype.getHash=function(){return""};DrawioFile.prototype.getId=function(){return""};DrawioFile.prototype.isEditable=function(){return!this.ui.editor.isChromelessView()||this.ui.editor.editable};DrawioFile.prototype.getUi=function(){return this.ui};DrawioFile.prototype.getTitle=function(){return""};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ca){},mouseUp:function(fa,ca){mxEvent.isTouchEvent(ca.getEvent())&&Math.abs(this.scrollLeft-E.container.scrollLeft)<L&&Math.abs(this.scrollTop-E.container.scrollTop)<L&&Math.abs(this.startX-ca.getGraphX())<L&&Math.abs(this.startY-ca.getGraphY())<L&&(0<parseFloat(e.style.opacity||0)?y():q(30))}})}for(var T=this.toolbarItems,G=0,M=mxUtils.bind(this,function(fa,ca,ja,ma){fa=this.createToolbarButton(fa,ca,ja,ma);e.appendChild(fa);G++;return fa}),R=null,W=null,d=null,f=null,k=0;k<T.length;k++){var u=T[k];
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function W(){mxShape.call(this)}function d(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1}function f(){mxActor.call(this)}function k(){mxCylinder.call(this)}function u(){mxCylinder.call(this)}function z(){mxActor.call(this)}function C(){mxActor.call(this)}function F(){mxActor.call(this)}function K(){mxActor.call(this)}function O(){mxActor.call(this)}function H(){mxActor.call(this)}function ka(){mxActor.call(this)}function fa(c,m){this.canvas=c;this.canvas.setLineJoin("round");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
document.documentMode||10<=document.documentMode)Editor.prototype.editButtonLink=this.graphConfig.edit,Editor.prototype.editButtonFunc=this.graphConfig.editFunc;EditorUi.prototype.updateActionStates=function(){};EditorUi.prototype.addBeforeUnloadListener=function(){};EditorUi.prototype.addChromelessClickHandler=function(){};p=Graph.prototype.shadowId;Graph.prototype.shadowId="lightboxDropShadow";var y=new EditorUi(new Editor(!0),document.createElement("div"),!0);y.editor.editBlankUrl=this.editBlankUrl;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
GraphViewer.prototype.getObservableParent=function(b){for(b=b.parentNode;b!=document.body&&null!=b.parentNode&&"none"!==mxUtils.getCurrentStyle(b).display;)b=b.parentNode;return b};GraphViewer.prototype.getImageUrl=function(b){null!=b&&"http://"!=b.substring(0,7)&&"https://"!=b.substring(0,8)&&"data:image"!=b.substring(0,10)&&("/"==b.charAt(0)&&(b=b.substring(1,b.length)),b=this.imageBaseUrl+b);return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.showShapePicker=function(b,e,g,p,y,q,E,L,T){L=L||null==g;b=this.createShapePicker(b,e,g,p,y,mxUtils.bind(this,function(){this.hideShapePicker()}),this.getCellsForShapePicker(g,q,L),q,E,L,T);null!=b&&(null==this.hoverIcons||q||this.hoverIcons.reset(),q=this.editor.graph,q.popupMenuHandler.hideMenu(),q.tooltipHandler.hideTooltip(),this.hideCurrentMenu(),this.hideShapePicker(),this.shapePickerCallback=p,this.shapePicker=b);return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.synchronizeFile(g,p)}))};DrawioFile.prototype.getErrorMessage=function(b){var e=null!=b?null!=b.error?b.error.message:b.message:null;null==e&&null!=b&&b.code==App.ERROR_TIMEOUT?e=mxResources.get("timeout"):"0"==e&&(e=mxResources.get("noResponse"));return e};DrawioFile.prototype.isOverdue=function(){return null!=this.ageStart&&Date.now()-this.ageStart.getTime()>=this.ui.warnInterval};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var PageSetupDialog=function(b){function e(){var k=R;null!=k&&null!=k.originalSrc&&(k=b.createImageForPageLink(k.originalSrc,null));null!=k&&null!=k.src?(M.style.backgroundImage="url("+k.src+")",M.style.display="inline-block"):(M.style.backgroundImage="",M.style.display="none");M.style.backgroundColor="";null!=W&&W!=mxConstants.NONE&&(M.style.backgroundColor=W,M.style.display="inline-block")}var g=b.editor.graph,p=document.createElement("table");p.style.width="100%";p.style.height="100%";var y=document.createElement("tbody");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
B))};mxCellRenderer.registerShape("umlLifeline",Z);mxUtils.extend(ba,mxShape);ba.prototype.width=60;ba.prototype.height=30;ba.prototype.corner=10;ba.prototype.configurePointerEvents=function(c){var m=mxUtils.getValue(this.style,mxConstants.STYLE_SWIMLANE_FILLCOLOR,mxConstants.NONE);null==this.style||null!=m&&m!=mxConstants.NONE&&0!=this.opacity&&0!=this.fillOpacity||"0"!=mxUtils.getValue(this.style,mxConstants.STYLE_POINTER_EVENTS,"1")||(c.pointerEvents=!1)};ba.prototype.getLabelMargins=function(c){return new mxRectangle(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
steps:ja.view.gridSteps,color:ja.view.gridColor});Graph.translateDiagram&&(z.diagramLanguage=Graph.diagramLanguage);return{format:f,from:aa,to:S,allPages:da,bg:null!=C?C:mxConstants.NONE,base64:u,embedXml:H,xml:k,filename:null!=d?d:"",extras:JSON.stringify(z),scale:F,border:K,w:fa&&isFinite(fa)?fa:null,h:ca&&isFinite(ca)?ca:null}};EditorUi.prototype.setMode=function(d,f){this.mode=d};EditorUi.prototype.getDiagramId=function(){var d=window.location.hash;null!=d&&0<d.length&&(d=d.substring(1));if(null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D&&"snip"==B||"fold"==D||"default"==D&&"fold"==B)&&c.lineTo(n-ha,t);else c.lineTo(n,t)};Na.prototype.paintBottom=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(0,t):c.lineTo(ha,t)};Na.prototype.paintSW=function(c,m,v,n,t,B,D,ha,I){if(I)if("rounded"==D||"default"==D&&"rounded"==B||"invRound"==D||"default"==D&&"invRound"==B){m=0;if("rounded"==D||"default"==D&&"rounded"==B)m=1;c.arcTo(ha,ha,0,0,m,0,t-ha)}else("snip"==D||"default"==D&&"snip"==B||"fold"==D||"default"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.selectFilename=function(b){var e=b.value.lastIndexOf(".");if(0<e){var g=b.value.substring(e+1);"drawio"!=g&&0<=mxUtils.indexOf(["png","svg","html","xml"],g)&&(g=b.value.lastIndexOf(".drawio.",e),0<g&&(e=g))}e=0<e?e:b.value.length;Editor.selectSubstring(b,0,e)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
v),Math.min(c.height,c.height-m)):new mxRectangle(Math.min(c.width,c.width-v),0,B,Math.min(c.height,c.height-m))}return new mxRectangle(0,Math.min(c.height,m),0,0)}return null};mxUtils.extend(u,mxCylinder);u.prototype.arcSize=.1;u.prototype.paintVertexShape=function(c,m,v,n,t){c.translate(m,v);var B=mxUtils.getValue(this.style,"rounded",!1),D=mxUtils.getValue(this.style,"absoluteArcSize",!1);m=parseFloat(mxUtils.getValue(this.style,"arcSize",this.arcSize));v=mxUtils.getValue(this.style,"umlStateConnection", null);D||(m*=Math.min(n,t));m=Math.min(m,.5*n,.5*t);B||(m=0);B=0;null!=v&&(B=10);c.begin();c.moveTo(B,m);c.arcTo(m,m,0,0,1,B+m,0);c.lineTo(n-m,0);c.arcTo(m,m,0,0,1,n,m);c.lineTo(n,t-m);c.arcTo(m,m,0,0,1,n-m,t);c.lineTo(B+m,t);c.arcTo(m,m,0,0,1,B,t-m);c.close();c.fillAndStroke();c.setShadow(!1);"collapseState"==mxUtils.getValue(this.style,"umlStateSymbol",null)&&(c.roundrect(n-40,t-20,10,10,3,3),c.stroke(),c.roundrect(n-20,t-20,10,10,3,3),c.stroke(),c.begin(),c.moveTo(n-30,t-15),c.lineTo(n-20,t-15), c.stroke());"connPointRefEntry"==v?(c.ellipse(0,.5*t-10,20,20),c.fillAndStroke()):"connPointRefExit"==v&&(c.ellipse(0,.5*t-10,20,20),c.fillAndStroke(),c.begin(),c.moveTo(5,.5*t-5),c.lineTo(15,.5*t+5),c.moveTo(15,.5*t-5),c.lineTo(5,.5*t+5),c.stroke())};u.prototype.getLabelMargins=function(c){return mxUtils.getValue(this.style,"boundedLbl",!1)&&null!=mxUtils.getValue(this.style,"umlStateConnection",null)?new mxRectangle(10*this.scale,0,0,0):null};mxCellRenderer.registerShape("umlState",u);mxUtils.extend(z,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
var z=this.hoverIcons.isResetEvent;this.hoverIcons.isResetEvent=function(P,V){return p.isSpaceDown()||z.apply(this,arguments)};this.keydownHandler=mxUtils.bind(this,function(P){16==P.which?this.shiftDown=!0:32!=P.which||y.isEditing()?mxEvent.isConsumed(P)||27!=P.keyCode||this.hideDialog(null,!0):(this.spaceDown=!0,this.hoverIcons.reset(),y.container.style.cursor="move",y.isEditing()||mxEvent.getSource(P)!=y.container||mxEvent.consume(P))});mxEvent.addListener(document,"keydown",this.keydownHandler);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.createLayersDialog=function(b,e){var g=document.createElement("div");g.style.position="absolute";for(var p=this.getModel(),y=p.getChildCount(p.root),q=0;q<y;q++)mxUtils.bind(this,function(E){function L(){p.isVisible(E)?(M.setAttribute("src",Editor.visibleImage),mxUtils.setOpacity(G,75)):(M.setAttribute("src",Editor.hiddenImage),mxUtils.setOpacity(G,25))}var T=this.convertValueToString(E)||mxResources.get("background")||"Background",G=document.createElement("div");G.style.overflow= "hidden";G.style.textOverflow="ellipsis";G.style.padding="2px";G.style.whiteSpace="nowrap";G.style.cursor="pointer";G.setAttribute("title",mxResources.get(p.isVisible(E)?"hideIt":"show",[T]));var M=document.createElement("img");M.setAttribute("draggable","false");M.setAttribute("align","absmiddle");M.setAttribute("border","0");M.style.position="relative";M.style.width="16px";M.style.padding="0px 6px 0 4px";e&&(M.style.filter="invert(100%)",M.style.top="-2px");G.appendChild(M);mxUtils.write(G,T);g.appendChild(G); mxEvent.addListener(G,"click",function(){p.setVisible(E,!p.isVisible(E));L();null!=b&&b(E)});L()})(p.getChildAt(p.root,q));return g};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.handleError=function(b,e,g,p,y){b=null!=b&&null!=b.error?b.error:b;if(null!=b||null!=e){y=mxUtils.htmlEntities(mxResources.get("unknownError"));var q=mxResources.get("ok");e=null!=e?e:mxResources.get("error");null!=b&&null!=b.message&&(y=mxUtils.htmlEntities(b.message));this.showError(e,y,q,g,null,null,null,null,null,null,null,null,p?g:null)}else null!=g&&g()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function X(){mxShape.call(this)}function U(){mxShape.call(this)}function Z(){mxRectangleShape.call(this)}function ba(){mxShape.call(this)}function ia(){mxShape.call(this)}function qa(){mxShape.call(this)}function ra(){mxShape.call(this)}function pa(){mxShape.call(this)}function xa(){mxCylinder.call(this)}function Ca(){mxCylinder.call(this)}function Aa(){mxRectangleShape.call(this)}function za(){mxDoubleEllipse.call(this)}function Ma(){mxDoubleEllipse.call(this)}function Qa(){mxArrowConnector.call(this);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
c?c=v:c.add(v))}this.bounds=null!=c?c:new mxRectangle};b.prototype.paintVertexShape=function(c,m,v,n,t){this.paintTableLine(c,this.line,0,0)};b.prototype.paintTableLine=function(c,m,v,n){if(null!=m){var t=null;c.begin();for(var B=0;B<m.length;B++){var D=m[B];null!=D&&(null==t?c.moveTo(D.x+v,D.y+n):null!=t&&c.lineTo(D.x+v,D.y+n));t=D}c.end();c.stroke()}};b.prototype.intersectsRectangle=function(c){var m=!1;if(mxShape.prototype.intersectsRectangle.apply(this,arguments)&&null!=this.line)for(var v=null,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(S){try{f(S.target.result)}catch(da){K({message:mxResources.get("errorLoadingFile")})}});aa.readAsText(ma)}else this.doImportVisio(ma,f,K,u)}catch(S){K(S)}else try{""==ja.responseType||"text"==ja.responseType?K({message:ja.responseText}):(aa=new FileReader,aa.onload=function(){try{K({message:JSON.parse(aa.result).Message})}catch(S){K(S)}},aa.readAsText(ja.response))}catch(S){K({})}});ja.send(H)}else if(F.clear())try{this.doImportVisio(d,f,K,u)}catch(ma){K(ma)}}else K({message:mxResources.get("serviceUnavailableOrBlocked")})});
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d,f,k,u,z,C,F,K){EditorUi.logEvent("SHOULD NOT BE CALLED: loadUrl");return this.editor.loadUrl(d,f,k,u,z,C,F,K)};EditorUi.prototype.loadFonts=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: loadFonts");return this.editor.loadFonts(d)};EditorUi.prototype.createSvgDataUri=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: createSvgDataUri");return Editor.createSvgDataUri(d)};EditorUi.prototype.embedCssFonts=function(d,f){EditorUi.logEvent("SHOULD NOT BE CALLED: embedCssFonts");return this.editor.embedCssFonts(d,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function Y(){mxEllipse.call(this)}function ea(){mxEllipse.call(this)}function la(){mxRhombus.call(this)}function oa(){mxEllipse.call(this)}function wa(){mxEllipse.call(this)}function sa(){mxEllipse.call(this)}function ua(){mxEllipse.call(this)}function Fa(){mxActor.call(this)}function Ua(){mxActor.call(this)}function Ra(){mxActor.call(this)}function Na(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1;this.rectStyle="square";this.size=10;this.absoluteCornerSize= !0;this.indent=2;this.rectOutline="single"}function Za(){mxConnector.call(this)}function cb(c,m,v,n,t,B,D,ha,I,va){D+=I;var na=n.clone();n.x-=t*(2*D+I);n.y-=B*(2*D+I);t*=D+I;B*=D+I;return function(){c.ellipse(na.x-t-D,na.y-B-D,2*D,2*D);va?c.fillAndStroke():c.stroke()}}mxUtils.extend(b,mxShape);b.prototype.updateBoundsFromLine=function(){var c=null;if(null!=this.line)for(var m=0;m<this.line.length;m++){var v=this.line[m];null!=v&&(v=new mxRectangle(v.x,v.y,this.strokewidth,this.strokewidth),null==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Y.graphHandler.selectCellForEvent(eb,Pa)}lb=0};Sa.reset=function(){lb=0}}x.push(Sa)})(ea);for(ea=0;ea<Ua.length;ea++)mxUtils.bind(this,function(Za){var cb=Y.view.getState(Ua[Za]),Sa=Y.getCellGeometry(Ua[Za]),db=null!=Sa.alternateBounds?Sa.alternateBounds:Sa;null==cb&&(cb=new mxCellState(Y.view,Ua[Za],Y.getCellStyle(Ua[Za])),cb.x=oa.x+Sa.x*la,cb.y=oa.y+Sa.y*la,cb.width=db.width*la,cb.height=db.height*la,cb.updateCachedBounds());Sa=Za<Ua.length-1?Ua[Za+1]:null;Sa=null!=Sa?Y.getCellGeometry(Sa):null;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k():u(100);mxEvent.consume(A)}));mxEvent.addListener(this.chromelessToolbar,"mouseleave",mxUtils.bind(this,function(A){mxEvent.isTouchEvent(A)||u(30)}));var O=b.getTolerance();b.addMouseListener({startX:0,startY:0,scrollLeft:0,scrollTop:0,mouseDown:function(A,N){this.startX=N.getGraphX();this.startY=N.getGraphY();this.scrollLeft=b.container.scrollLeft;this.scrollTop=b.container.scrollTop},mouseMove:function(A,N){},mouseUp:function(A,N){mxEvent.isTouchEvent(N.getEvent())&&Math.abs(this.scrollLeft-
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.onKeyDown=function(b){var e=this.editor.graph;if(9==b.which&&e.isEnabled()&&!mxEvent.isControlDown(b)){if(e.isEditing())if(mxEvent.isAltDown(b))e.stopEditing(!1);else try{var g=e.cellEditor.isContentEditing()&&e.cellEditor.isTextSelected();if(window.getSelection&&e.cellEditor.isContentEditing()&&!g&&!mxClient.IS_IE&&!mxClient.IS_IE11){var p=window.getSelection(),y=0<p.rangeCount?p.getRangeAt(0).commonAncestorContainer:null;g=null!=y&&("LI"==y.nodeName||null!=y.parentNode&&"LI"== y.parentNode.nodeName)}g?document.execCommand(mxEvent.isShiftDown(b)?"outdent":"indent",!1,null):mxEvent.isShiftDown(b)?e.stopEditing(!1):e.cellEditor.insertTab(e.cellEditor.isContentEditing()?null:4)}catch(q){}else mxEvent.isAltDown(b)?e.selectParentCell():e.selectCell(!mxEvent.isShiftDown(b));mxEvent.consume(b)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
TableLayout.prototype.layoutRow=function(b,e,g,p){var y=this.graph.getModel(),q=y.getChildCells(b,!0);b=this.graph.getActualStartSize(b,!0);var E=b.x,L=0;null!=e&&(e=e.slice(),e.splice(0,0,b.x));for(var T=0;T<q.length;T++){var G=this.graph.getCellGeometry(q[T]);null!=G&&(G=G.clone(),G.y=b.y,G.height=g-b.y-b.height,null!=e?(G.x=e[T],G.width=e[T+1]-G.x,T==q.length-1&&T<e.length-2&&(G.width=p-G.x-b.x-b.width)):(G.x=E,E+=G.width,T==q.length-1?G.width=p-b.x-b.width-L:L+=G.width),G.alternateBounds=new mxRectangle(0, 0,G.width,G.height),y.setGeometry(q[T],G))}return L};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.parsePng=function(b,e,g){function p(L,T){var G=q;q+=T;return L.substring(G,q)}function y(L){L=p(L,4);return L.charCodeAt(3)+(L.charCodeAt(2)<<8)+(L.charCodeAt(1)<<16)+(L.charCodeAt(0)<<24)}var q=0;if(p(b,8)!=String.fromCharCode(137)+"PNG"+String.fromCharCode(13,10,26,10))null!=g&&g();else if(p(b,4),"IHDR"!=p(b,4))null!=g&&g();else{p(b,17);do{g=y(b);var E=p(b,4);if(null!=e&&e(q-8,E,g))break;value=p(b,g);p(b,4);if("IEND"==E)break}while(g)}};mxUtils.extend(EditorUi,mxEventSource);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
{67:d.actions.get("selectChildren"),88:d.actions.get("selectDescendants"),80:d.actions.get("selectParent"),83:d.actions.get("selectSiblings")},H=d.onKeyDown;d.onKeyDown=function(aa){try{var S=f.getSelectionCell();if(f.isEnabled()&&!f.isEditing()&&null!=S){var da=mxEvent.isAltDown(aa)&&mxEvent.isShiftDown(aa)?O[aa.keyCode]:null;null!=da?(da.funct(aa),mxEvent.consume(aa)):p(S)&&(da=null,0<f.getIncomingTreeEdges(S).length&&(9==aa.which?da=mxEvent.isShiftDown(aa)?G(S):M(S):13==aa.which&&(da=T(S,!mxEvent.isShiftDown(aa)))), null!=da&&0<da.length?(1==da.length&&f.model.isEdge(da[0])?f.setSelectionCell(f.model.getTerminal(da[0],!1)):f.setSelectionCell(da[da.length-1]),null!=d.hoverIcons&&d.hoverIcons.update(f.view.getState(S)),f.startEditingAtCell(S),mxEvent.consume(aa)):37==aa.keyCode?(W(S,mxConstants.DIRECTION_WEST),mxEvent.consume(aa)):38==aa.keyCode?(W(S,mxConstants.DIRECTION_NORTH),mxEvent.consume(aa)):39==aa.keyCode?(W(S,mxConstants.DIRECTION_EAST),mxEvent.consume(aa)):40==aa.keyCode&&(W(S,mxConstants.DIRECTION_SOUTH), mxEvent.consume(aa)))}}catch(P){d.handleError(P)}mxEvent.isConsumed(aa)||H.apply(this,arguments)};var ka=f.connectVertex;f.connectVertex=function(aa,S,da,P,V,l,A){var N=f.getIncomingTreeEdges(aa);if(p(aa)){var X=L(aa),U=X==mxConstants.DIRECTION_EAST||X==mxConstants.DIRECTION_WEST,Z=S==mxConstants.DIRECTION_EAST||S==mxConstants.DIRECTION_WEST;return X==S||0==N.length?M(aa,S):U==Z?G(aa):T(aa,S!=mxConstants.DIRECTION_NORTH&&S!=mxConstants.DIRECTION_WEST)}return ka.apply(this,arguments)};f.getSubtree=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k?!0:z.apply(this,arguments)}};EditorUi.prototype.setCurrentTheme=function(d,f){mxSettings.setUi(d);(f=this.doSetCurrentTheme(d)||f)||this.alert(mxResources.get("restartForChangeRequired"))};EditorUi.prototype.isDefaultTheme=function(d){return""==d||"dark"==d||"default"==d||"kennedy"==d||null==d};EditorUi.prototype.doSetCurrentTheme=function(d,f,k){function u(O){return"simple"==O||0==f&&"sketch"==O}f=null!=f?f:150;var z=Editor.currentTheme,C=u(z)&&this.isDefaultTheme(d)||this.isDefaultTheme(z)&&u(d),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.getTooltipForCell=function(b){var e="";if(mxUtils.isNode(b.value)&&(e=this.convertValueToTooltip(b),null==e)){var g=this.builtInProperties;b=b.value.attributes;var p=[];e="";this.isEnabled()&&(g.push("linkTarget"),g.push("link"));for(var y=0;y<b.length;y++)(Graph.translateDiagram&&"label"==b[y].nodeName||0>mxUtils.indexOf(g,b[y].nodeName))&&0<b[y].nodeValue.length&&p.push({name:b[y].nodeName,value:b[y].nodeValue});p.sort(function(q,E){return q.name<E.name?-1:q.name>E.name?1:0});for(y= 0;y<p.length;y++)"link"==p[y].name&&this.isCustomLink(p[y].value)||(e+=("link"!=p[y].name?"<b>"+mxUtils.htmlEntities(p[y].name)+":</b> ":"")+mxUtils.htmlEntities(p[y].value)+"\n");0<e.length&&(e=e.substring(0,e.length-1),mxClient.IS_SVG&&(e='<div style="max-width:360px;text-overflow:ellipsis;overflow:hidden;">'+e+"</div>"))}return e};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
b.view.getState(p[q])&&y.push(p[q]);b.setSelectionCells(y)}};e.addListener(mxEvent.UNDO,g);e.addListener(mxEvent.REDO,g);return e};Editor.prototype.initStencilRegistry=function(){};Editor.prototype.destroy=function(){null!=this.graph&&(this.graph.destroy(),this.graph=null)};OpenFile=function(b){this.consumer=this.producer=null;this.done=b;this.args=null};OpenFile.prototype.setConsumer=function(b){this.consumer=b;this.execute()};OpenFile.prototype.setData=function(){this.args=arguments;this.execute()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.createLayersDialog=function(b,e){var g=document.createElement("div");g.style.position="absolute";for(var p=this.getModel(),y=p.getChildCount(p.root),q=0;q<y;q++)mxUtils.bind(this,function(E){function L(){p.isVisible(E)?(M.setAttribute("src",Editor.visibleImage),mxUtils.setOpacity(G,75)):(M.setAttribute("src",Editor.hiddenImage),mxUtils.setOpacity(G,25))}var T=this.convertValueToString(E)||mxResources.get("background")||"Background",G=document.createElement("div");G.style.overflow=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
W.formatElt.style.width)}function e(W,d){function f(z,C){var F=W.menus.get(z);z=k.addMenu(C,mxUtils.bind(this,function(){F.funct.apply(this,arguments)}));z.style.cssText="position:absolute;border-width:1px;cusor:pointer;border-style:none;height:24px;bottom:0px;text-align:center;padding:8px 6px 0 6px;border-top-style:solid;width:50%;height:32px;box-sizing:border-box;font-size:11px;";z.className="geTitle";d.appendChild(z);return z}var k=new Menubar(W,d);if(Editor.enableCustomLibraries&&("1"!=urlParams.embed||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
f)};EditorUi.prototype.embedExtFonts=function(d){EditorUi.logEvent("SHOULD NOT BE CALLED: embedExtFonts");return this.editor.embedExtFonts(d)};EditorUi.prototype.exportToCanvas=function(d,f,k,u,z,C,F,K,O,H,ka,fa,ca,ja,ma,aa){EditorUi.logEvent("SHOULD NOT BE CALLED: exportToCanvas");return this.editor.exportToCanvas(d,f,k,u,z,C,F,K,O,H,ka,fa,ca,ja,ma,aa)};EditorUi.prototype.createImageUrlConverter=function(){EditorUi.logEvent("SHOULD NOT BE CALLED: createImageUrlConverter");return this.editor.createImageUrlConverter()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.isViewer=function(){return!1};Graph.prototype.labelLinkClicked=function(b,e,g){var p=e.getAttribute("href");p!=Graph.sanitizeLink(p)&&Graph.sanitizeNode(e);if(null!=p&&!this.isCustomLink(p)&&(mxEvent.isLeftMouseButton(g)&&!mxEvent.isPopupTrigger(g)||mxEvent.isTouchEvent(g))){if(!this.isEnabled()||this.isCellLocked(b.cell))b=this.isBlankLink(p)?this.linkTarget:"_top",this.openLink(this.getAbsoluteUrl(p),b);mxEvent.consume(g)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!0;this.indent=2;this.rectOutline="single"}function Za(){mxConnector.call(this)}function cb(c,m,v,n,t,B,D,ha,I,va){D+=I;var na=n.clone();n.x-=t*(2*D+I);n.y-=B*(2*D+I);t*=D+I;B*=D+I;return function(){c.ellipse(na.x-t-D,na.y-B-D,2*D,2*D);va?c.fillAndStroke():c.stroke()}}mxUtils.extend(b,mxShape);b.prototype.updateBoundsFromLine=function(){var c=null;if(null!=this.line)for(var m=0;m<this.line.length;m++){var v=this.line[m];null!=v&&(v=new mxRectangle(v.x,v.y,this.strokewidth,this.strokewidth),null== c?c=v:c.add(v))}this.bounds=null!=c?c:new mxRectangle};b.prototype.paintVertexShape=function(c,m,v,n,t){this.paintTableLine(c,this.line,0,0)};b.prototype.paintTableLine=function(c,m,v,n){if(null!=m){var t=null;c.begin();for(var B=0;B<m.length;B++){var D=m[B];null!=D&&(null==t?c.moveTo(D.x+v,D.y+n):null!=t&&c.lineTo(D.x+v,D.y+n));t=D}c.end();c.stroke()}};b.prototype.intersectsRectangle=function(c){var m=!1;if(mxShape.prototype.intersectsRectangle.apply(this,arguments)&&null!=this.line)for(var v=null,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.editor.fireEvent(new mxEventObject("resetGraphView"))};EditorUi.prototype.showPopupMenu=function(b,e,g,p){this.editor.graph.popupMenuHandler.hideMenu();var y=new mxPopupMenu(b);y.div.className+=" geMenubarMenu";y.smartSeparators=!0;y.showDisabled=!0;y.autoExpand=!0;y.hideMenu=mxUtils.bind(this,function(){mxPopupMenu.prototype.hideMenu.apply(y,arguments);y.destroy()});y.popup(e,g,null,p);this.setCurrentMenu(y)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.commentsRefreshNeeded=function(){return!0};DrawioFile.prototype.commentsSaveNeeded=function(){return!1};DrawioFile.prototype.getComments=function(b,e){b([])};DrawioFile.prototype.addComment=function(b,e,g){e(Date.now())};DrawioFile.prototype.canReplyToReplies=function(){return!0};DrawioFile.prototype.canComment=function(){return!0};DrawioFile.prototype.newComment=function(b,e){return new DrawioComment(this,null,b,Date.now(),Date.now(),!1,e)};LocalFile=function(b,e,g,p,y,q){DrawioFile.call(this,b,e);this.title=g;this.mode=p?null:App.MODE_DEVICE;this.fileHandle=y;this.desc=q};mxUtils.extend(LocalFile,DrawioFile);LocalFile.prototype.isAutosave=function(){return null!=this.fileHandle&&!this.invalidFileHandle&&DrawioFile.prototype.isAutosave.apply(this,arguments)};LocalFile.prototype.isAutosaveOptional=function(){return null!=this.fileHandle};LocalFile.prototype.getMode=function(){return this.mode};LocalFile.prototype.getTitle=function(){return this.title};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
J(Ra[Za],kb,0),this.shape.updateBoundsFromLine();else{var eb=Y.getActualStartSize(oa.cell,!0);this.shape.bounds.width=1;this.shape.bounds.x=this.state.x+(db.width+kb)*la;this.shape.bounds.y=oa.y+(Za==Ua.length-1?0:eb.y*la);this.shape.bounds.height=oa.height-(Za==Ua.length-1?0:(eb.height+eb.y)*la)}this.shape.redraw()}};var Pa=!1;cb.setPosition=function(eb,jb,ib){kb=Math.max(Graph.minTableColumnWidth-db.width,jb.x-eb.x-db.width);Pa=mxEvent.isShiftDown(ib.getEvent());null==lb||Pa||(kb=Math.min(kb,lb.width- Graph.minTableColumnWidth))};cb.execute=function(eb){if(0!=kb)Y.setTableColumnWidth(this.state.cell,kb,Pa);else if(!Q.blockDelayedSelection){var jb=Y.getCellAt(eb.getGraphX(),eb.getGraphY())||oa.cell;Y.graphHandler.selectCellForEvent(jb,eb)}kb=0};cb.positionChanged=function(){};cb.reset=function(){kb=0};x.push(cb)})(ea)}}return null!=x?x.reverse():null};var A=mxVertexHandler.prototype.setHandlesVisible;mxVertexHandler.prototype.setHandlesVisible=function(x){A.apply(this,arguments);if(null!=this.moveHandles)for(var J=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.showBackgroundImageDialog=function(b,e){b=null!=b?b:mxUtils.bind(this,function(p){p=new ChangePageSetup(this,null,p);p.ignoreColor=!0;this.editor.graph.model.execute(p)});var g=mxUtils.prompt(mxResources.get("backgroundImage"),null!=e?e.src:"");null!=g&&0<g.length?(e=new Image,e.onload=function(){b(new mxImage(g,e.width,e.height),!1)},e.onerror=function(){b(null,!0);mxUtils.alert(mxResources.get("fileNotFound"))},e.src=g):b(null)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
P=this.cloneCell(ba[0]);this.addEdge(P,f.getDefaultParent(),U,N[Z])}}finally{this.model.endUpdate()}return N};if(null!=d.sidebar){var K=d.sidebar.dropAndConnect;d.sidebar.dropAndConnect=function(aa,S,da,P){var V=f.model,l=null;V.beginUpdate();try{if(l=K.apply(this,arguments),p(aa))for(var A=0;A<l.length;A++)if(V.isEdge(l[A])&&null==V.getTerminal(l[A],!0)){V.setTerminal(l[A],aa,!0);var N=f.getCellGeometry(l[A]);N.points=null;null!=N.getTerminalPoint(!0)&&N.setTerminalPoint(null,!0)}}finally{V.endUpdate()}return l}}var O=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0);m+=B;v+=B;n-=2*B;t-=2*B;0<n&&0<t&&(c.setShadow(!1),ib.apply(this,[c,m,v,n,t]))}};mxUtils.extend(P,mxRectangleShape);P.prototype.isHtmlAllowed=function(){return!1};P.prototype.getLabelBounds=function(c){if(1==this.style["double"]){var m=(Math.max(2,this.strokewidth+1)+parseFloat(this.style[mxConstants.STYLE_MARGIN]||0))*this.scale;return new mxRectangle(c.x+m,c.y+m,c.width-2*m,c.height-2*m)}return c};P.prototype.paintForeground=function(c,m,v,n,t){if(null!=this.style){if(!this.outline&&1==this.style["double"]){var B=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function R(aa,S,da){aa=f.getOutgoingTreeEdges(aa);da=f.view.getState(da);var P=[];if(null!=da&&null!=aa){for(var V=0;V<aa.length;V++){var l=f.view.getState(f.model.getTerminal(aa[V],!1));null!=l&&(!S&&Math.min(l.x+l.width,da.x+da.width)>=Math.max(l.x,da.x)||S&&Math.min(l.y+l.height,da.y+da.height)>=Math.max(l.y,da.y))&&P.push(l)}P.sort(function(A,N){return S?A.x+A.width-N.x-N.width:A.y+A.height-N.y-N.height})}return P}function W(aa,S){var da=L(aa),P=S==mxConstants.DIRECTION_EAST||S==mxConstants.DIRECTION_WEST;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(EditorUi.prototype.showRemoteCursors=l.showRemoteCursors);null!=l.restrictExport&&(DrawioFile.RESTRICT_EXPORT=l.restrictExport)}};Editor.isSettingsEnabled=function(){return"undefined"!==typeof window.mxSettings&&(isLocalStorage||mxClient.IS_CHROMEAPP)};Editor.configureFontCss=function(l){if(null!=l){Editor.prototype.fontCss=l;var A=document.getElementsByTagName("script")[0];if(null!=A&&null!=A.parentNode){var N=document.createElement("style");N.setAttribute("type","text/css");N.appendChild(document.createTextNode(l)); A.parentNode.insertBefore(N,A);l=l.split("url(");for(N=1;N<l.length;N++){var X=l[N].indexOf(")");X=Editor.trimCssUrl(l[N].substring(0,X));var U=document.createElement("link");U.setAttribute("rel","preload");U.setAttribute("href",X);U.setAttribute("as","font");U.setAttribute("crossorigin","");A.parentNode.insertBefore(U,A)}}}};Editor.trimCssUrl=function(l){return l.replace(RegExp("^[\\s\"']+","g"),"").replace(RegExp("[\\s\"']+$","g"),"")};Editor.GOOGLE_FONTS="https://fonts.googleapis.com/css?family=";
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxEvent.addListener(Y,"click",mxUtils.bind(this,function(ea){this.customLinkClicked(x);mxEvent.consume(ea)}));return Y};Graph.prototype.initTouch=function(){this.connectionHandler.marker.isEnabled=function(){return null!=this.graph.connectionHandler.first};this.addListener(mxEvent.START_EDITING,function(la,oa){this.popupMenuHandler.hideMenu()});var x=this.updateMouseEvent;this.updateMouseEvent=function(la){la=x.apply(this,arguments);if(mxEvent.isTouchEvent(la.getEvent())&&null==la.getState()){var oa=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.showDialog(f.container,340,300+d,!0,!0);null!=ca?(ca.focus(),mxClient.IS_GC||mxClient.IS_FF||5<=document.documentMode?ca.select():document.execCommand("selectAll",!1,null)):ma.focus()};EditorUi.prototype.showRemoteExportDialog=function(d,f,k,u,z){var C=document.createElement("div");C.style.whiteSpace="nowrap";var F=document.createElement("h3");mxUtils.write(F,mxResources.get("image"));F.style.cssText="width:100%;text-align:center;margin-top:0px;margin-bottom:"+(z?"10":"4")+"px";C.appendChild(F); if(z){mxUtils.write(C,mxResources.get("zoom")+":");var K=document.createElement("input");K.setAttribute("type","text");K.style.marginRight="16px";K.style.width="60px";K.style.marginLeft="4px";K.style.marginRight="12px";K.value=this.lastExportZoom||"100%";C.appendChild(K);mxUtils.write(C,mxResources.get("borderWidth")+":");var O=document.createElement("input");O.setAttribute("type","text");O.style.marginRight="16px";O.style.width="60px";O.style.marginLeft="4px";O.value=this.lastExportBorder||"0";C.appendChild(O); mxUtils.br(C)}var H=this.addCheckbox(C,mxResources.get("selectionOnly"),!1,this.editor.graph.isSelectionEmpty()),ka=u?null:this.addCheckbox(C,mxResources.get("includeCopyOfMyDiagram"),Editor.defaultIncludeDiagram);F=this.editor.graph;var fa=u?null:this.addCheckbox(C,mxResources.get("transparentBackground"),F.background==mxConstants.NONE||null==F.background);null!=fa&&(fa.style.marginBottom="16px");d=new CustomDialog(this,C,mxUtils.bind(this,function(){var ca=parseInt(K.value)/100||1,ja=parseInt(O.value)|| 0;k(!H.checked,null!=ka?ka.checked:!1,null!=fa?fa.checked:!1,ca,ja)}),null,d,f);this.showDialog(d.container,300,(z?25:0)+(u?125:210),!0,!0)};EditorUi.prototype.showExportDialog=function(d,f,k,u,z,C,F,K,O){F=null!=F?F:Editor.defaultIncludeDiagram;var H=document.createElement("div");H.style.whiteSpace="nowrap";var ka=this.editor.graph,fa="jpeg"==K?220:300,ca=document.createElement("h3");mxUtils.write(ca,d);ca.style.cssText="width:100%;text-align:center;margin-top:0px;margin-bottom:10px";H.appendChild(ca);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0<N.length?(l=Graph.decompress(N,null,A),null!=l&&0<l.length&&(X=mxUtils.parseXml(l).documentElement)):(l=mxUtils.getChildNodes(l),0<l.length&&(X=mxUtils.createXmlDocument(),X.appendChild(X.importNode(l[0],!0)),X=X.documentElement));return X};Editor.getDiagramNodeXml=function(l){var A=mxUtils.getTextContent(l),N=null;0<A.length?N=Graph.decompress(A):null!=l.firstChild&&(N=mxUtils.getXml(l.firstChild));return N};Editor.extractGraphModelFromPdf=function(l){l=l.substring(l.indexOf(",")+1);l=window.atob&& !mxClient.IS_SF?atob(l):Base64.decode(l,!0);if("%PDF-1.7"==l.substring(0,8)){var A=l.indexOf("EmbeddedFile");if(-1<A){var N=l.indexOf("stream",A)+9;if(0<l.substring(A,N).indexOf("application#2Fvnd.jgraph.mxfile"))return A=l.indexOf("endstream",N-1),pako.inflateRaw(Graph.stringToArrayBuffer(l.substring(N,A)),{to:"string"})}return null}N=null;A="";for(var X=0,U=0,Z=[],ba=null;U<l.length;){var ia=l.charCodeAt(U);U+=1;10!=ia&&(A+=String.fromCharCode(ia));ia=="/Subject (%3Cmxfile".charCodeAt(X)?X++:X= 0;if(19==X){var qa=l.indexOf("%3C%2Fmxfile%3E)",U)+15;U-=9;if(qa>U){N=l.substring(U,qa);break}}10==ia&&("endobj"==A?ba=null:"obj"==A.substring(A.length-3,A.length)||"xref"==A||"trailer"==A?(ba=[],Z[A.split(" ")[0]]=ba):null!=ba&&ba.push(A),A="")}null==N&&(N=Editor.extractGraphModelFromXref(Z));null!=N&&(N=decodeURIComponent(N.replace(/\\\(/g,"(").replace(/\\\)/g,")")));return N};Editor.extractGraphModelFromXref=function(l){var A=l.trailer,N=null;null!=A&&(A=/.* \/Info (\d+) (\d+) R/g.exec(A.join("\n")),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
N&&A(Editor.svgBrokenImage.src)});else{var U=new Image;this.crossOriginImages&&(U.crossOrigin="anonymous");U.onload=function(){window.clearTimeout(X);if(N)try{var Z=document.createElement("canvas"),ba=Z.getContext("2d");Z.height=U.height;Z.width=U.width;ba.drawImage(U,0,0);A(Z.toDataURL())}catch(ia){A(Editor.svgBrokenImage.src)}};U.onerror=function(){window.clearTimeout(X);N&&A(Editor.svgBrokenImage.src)};U.src=l}}catch(Z){A(Editor.svgBrokenImage.src)}};Editor.prototype.convertImages=function(l,A,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(G){return this.isTreeEdge(G)}))};Graph.prototype.getIncomingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function p(aa){return k.isVertex(aa)&&q(aa)}function y(aa){var S=!1;null!=aa&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.formatWindow,this.freehandWindow];null!=this.actions&&(d=d.concat([this.actions.outlineWindow,this.actions.layersWindow]));null!=this.menus&&(d=d.concat([this.menus.tagsWindow,this.menus.findWindow,this.menus.findReplaceWindow,this.menus.commentsWindow]));return d};EditorUi.prototype.fitWindows=function(){for(var d=this.getWindows(),f=0;f<d.length;f++)null!=d[f]&&d[f].window.fit()};EditorUi.prototype.hideWindows=function(){for(var d=this.getWindows(),f=0;f<d.length;f++)null!=d[f]&&d[f].window.setVisible(!1)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.position2)))),ha=Math.max(0,Math.min(n,parseFloat(mxUtils.getValue(this.style,"base",this.base))));this.addPoints(c,[new mxPoint(0,0),new mxPoint(n,0),new mxPoint(n,t-v),new mxPoint(Math.min(n,B+ha),t-v),new mxPoint(D,t),new mxPoint(Math.max(0,B),t-v),new mxPoint(0,t-v)],this.isRounded,m,!0,[4])};mxCellRenderer.registerShape("callout",ma);mxUtils.extend(aa,mxActor);aa.prototype.size=.2;aa.prototype.fixedSize=20;aa.prototype.isRoundable=function(){return!0};aa.prototype.redrawPath=function(c, m,v,n,t){m="0"!=mxUtils.getValue(this.style,"fixedSize","0")?Math.max(0,Math.min(n,parseFloat(mxUtils.getValue(this.style,"size",this.fixedSize)))):n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"size",this.size))));v=mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE)/2;this.addPoints(c,[new mxPoint(0,0),new mxPoint(n-m,0),new mxPoint(n,t/2),new mxPoint(n-m,t),new mxPoint(0,t),new mxPoint(m,t/2)],this.isRounded,v,!0);c.end()};mxCellRenderer.registerShape("step",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
document.documentMode||10<=document.documentMode)Editor.prototype.editButtonLink=this.graphConfig.edit,Editor.prototype.editButtonFunc=this.graphConfig.editFunc;EditorUi.prototype.updateActionStates=function(){};EditorUi.prototype.addBeforeUnloadListener=function(){};EditorUi.prototype.addChromelessClickHandler=function(){};p=Graph.prototype.shadowId;Graph.prototype.shadowId="lightboxDropShadow";var y=new EditorUi(new Editor(!0),document.createElement("div"),!0);y.editor.editBlankUrl=this.editBlankUrl;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.graph.isCellSelected(G);return M};mxPopupMenuHandler.prototype.getCellForPopupEvent=function(E){E=E.getCell();for(var L=this.graph.getModel(),T=L.getParent(E),G=this.graph.view.getState(T),M=this.graph.isCellSelected(E);null!=G&&(L.isVertex(T)||L.isEdge(T));){var R=this.graph.isCellSelected(T);M=M||R;if(R||!M&&(this.graph.isTableCell(E)||this.graph.isTableRow(E)))E=T;T=L.getParent(T)}return E}})();EditorUi=function(b,e,g){mxEventSource.call(this);this.destroyFunctions=[];this.editor=b||new Editor;this.container=e||document.body;var p=this,y=this.editor.graph;y.lightbox=g;var q=y.getGraphBounds;y.getGraphBounds=function(){var P=q.apply(this,arguments),V=this.backgroundImage;if(null!=V&&null!=V.width&&null!=V.height){var l=this.view.translate,A=this.view.scale;P=mxRectangle.fromRectangle(P);P.add(new mxRectangle((l.x+V.x)*A,(l.y+V.y)*A,V.width*A,V.height*A))}return P};y.useCssTransforms&&(this.lazyZoomDelay=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.editor.getEditBlankUrl=function(P){P=null!=P?P:"";"1"==urlParams.dev&&(P+=(0<P.length?"&":"?")+"dev=1");return F.apply(this,arguments)};var K=f.addClickHandler;f.addClickHandler=function(P,V,l){var A=V;V=function(N,X){if(null==X){var U=mxEvent.getSource(N);"a"==U.nodeName.toLowerCase()&&(X=U.getAttribute("href"))}null!=X&&f.isCustomLink(X)&&(mxEvent.isTouchEvent(N)||!mxEvent.isPopupTrigger(N))&&f.customLinkClicked(X)&&mxEvent.consume(N);null!=A&&A(N,X)};K.call(this,P,V,l)};q.apply(this,arguments);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
oa))||(la=!1);la&&x.push(ea.cell)}}mxGraph.prototype.cellsRemoved.apply(this,arguments)};Graph.prototype.removeCellsAfterUngroup=function(x){for(var J=[],Q=0;Q<x.length;Q++)this.isCellDeletable(x[Q])&&this.isTransparentState(this.view.getState(x[Q]))&&J.push(x[Q]);x=J;mxGraph.prototype.removeCellsAfterUngroup.apply(this,arguments)};Graph.prototype.setLinkForCell=function(x,J){this.setAttributeForCell(x,"link",J)};Graph.prototype.setTooltipForCell=function(x,J){var Q="tooltip";Graph.translateDiagram&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"<pre>"+X+"</pre>"),f.updateCellSize(P,!0);else{f.setCellStyles("image",d.convertDataUri(X),[P]);var ba=f.model.getGeometry(P);null!=ba&&(ba=ba.clone(),ba.width=U,ba.height=Z,f.cellsResized([P],[ba],!1))}f.setAttributeForCell(P,"plantUmlData",JSON.stringify({data:N,format:A.format}))}finally{f.getModel().endUpdate()}},function(X){d.handleError(X)})},null,null,400,220);d.showDialog(V.container,420,300,!0,!0);V.init()};f.cellEditor.editMermaidData=function(P,V,l){var A=JSON.parse(l);V=new TextareaDialog(d,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
return(A^-1)>>>0};Editor.writeGraphModelToPng=function(l,A,N,X,U){function Z(pa,xa){var Ca=qa;qa+=xa;return pa.substring(Ca,qa)}function ba(pa){pa=Z(pa,4);return pa.charCodeAt(3)+(pa.charCodeAt(2)<<8)+(pa.charCodeAt(1)<<16)+(pa.charCodeAt(0)<<24)}function ia(pa){return String.fromCharCode(pa>>24&255,pa>>16&255,pa>>8&255,pa&255)}l=l.substring(l.indexOf(",")+1);l=window.atob?atob(l):Base64.decode(l,!0);var qa=0;if(Z(l,8)!=String.fromCharCode(137)+"PNG"+String.fromCharCode(13,10,26,10))null!=U&&U();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.moveTo(n,t):c.moveTo(n,t-ha)};Na.prototype.moveSW=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.moveTo(0,t):c.moveTo(ha,t)};Na.prototype.paintNW=function(c,m,v,n,t,B,D,ha,I){if(I)if("rounded"==D||"default"==D&&"rounded"==B||"invRound"==D||"default"==D&&"invRound"==B){m=0;if("rounded"==D||"default"==D&&"rounded"==B)m=1;c.arcTo(ha,ha,0,0,m,ha,0)}else("snip"==D||"default"==D&&"snip"==B||"fold"==D||"default"==D&& "fold"==B)&&c.lineTo(ha,0);else c.lineTo(0,0)};Na.prototype.paintTop=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(n,0):c.lineTo(n-ha,0)};Na.prototype.paintNE=function(c,m,v,n,t,B,D,ha,I){if(I)if("rounded"==D||"default"==D&&"rounded"==B||"invRound"==D||"default"==D&&"invRound"==B){m=0;if("rounded"==D||"default"==D&&"rounded"==B)m=1;c.arcTo(ha,ha,0,0,m,n,ha)}else("snip"==D||"default"==D&&"snip"==B||"fold"==D||"default"==D&&"fold"==B)&&c.lineTo(n,ha);else c.lineTo(n,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function ChangePageSetup(b,e,g,p,y){this.ui=b;this.previousColor=this.color=e;this.previousImage=this.image=g;this.previousFormat=this.format=p;this.previousPageScale=this.pageScale=y;this.ignoreImage=this.ignoreColor=!1}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.bind(this,function(){this.fireEvent(new mxEventObject("darkModeChanged"))}),mxUtils.bind(this,function(f){null!=window.console&&console.error(f);this.editor.setStatus(f.message)}))};EditorUi.prototype.createDarkStyle=function(){var d=document.createElement("link");d.setAttribute("rel","stylesheet");d.setAttribute("href",STYLE_PATH+"/dark.css");d.setAttribute("charset","UTF-8");d.setAttribute("type","text/css");return d};EditorUi.prototype.doSetDarkMode=function(d,f,k){var u=mxUtils.bind(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k?!0:z.apply(this,arguments)}};EditorUi.prototype.setCurrentTheme=function(d,f){mxSettings.setUi(d);(f=this.doSetCurrentTheme(d)||f)||this.alert(mxResources.get("restartForChangeRequired"))};EditorUi.prototype.isDefaultTheme=function(d){return""==d||"dark"==d||"default"==d||"kennedy"==d||null==d};EditorUi.prototype.doSetCurrentTheme=function(d,f,k){function u(O){return"simple"==O||0==f&&"sketch"==O}f=null!=f?f:150;var z=Editor.currentTheme,C=u(z)&&this.isDefaultTheme(d)||this.isDefaultTheme(z)&&u(d),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.zapGremlins=function(b){for(var e=0,g=[],p=0;p<b.length;p++){var y=b.charCodeAt(p);(32<=y||9==y||10==y||13==y)&&65535!=y&&65534!=y||(g.push(b.substring(e,p)),e=p+1)}0<e&&e<b.length&&g.push(b.substring(e));return 0==g.length?b:g.join("")};Graph.stringToBytes=function(b){for(var e=Array(b.length),g=0;g<b.length;g++)e[g]=b.charCodeAt(g);return e};Graph.bytesToString=function(b){for(var e=Array(b.length),g=0;g<b.length;g++)e[g]=String.fromCharCode(b[g]);return e.join("")};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
oa))||(la=!1);la&&x.push(ea.cell)}}mxGraph.prototype.cellsRemoved.apply(this,arguments)};Graph.prototype.removeCellsAfterUngroup=function(x){for(var J=[],Q=0;Q<x.length;Q++)this.isCellDeletable(x[Q])&&this.isTransparentState(this.view.getState(x[Q]))&&J.push(x[Q]);x=J;mxGraph.prototype.removeCellsAfterUngroup.apply(this,arguments)};Graph.prototype.setLinkForCell=function(x,J){this.setAttributeForCell(x,"link",J)};Graph.prototype.setTooltipForCell=function(x,J){var Q="tooltip";Graph.translateDiagram&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
la||ea))};Graph.prototype.createGroupCell=function(){var x=mxGraph.prototype.createGroupCell.apply(this,arguments);x.setStyle("group");return x};Graph.prototype.isExtendParentsOnAdd=function(x){var J=mxGraph.prototype.isExtendParentsOnAdd.apply(this,arguments);if(J&&null!=x&&null!=this.layoutManager){var Q=this.model.getParent(x);null!=Q&&(Q=this.layoutManager.getLayout(Q),null!=Q&&Q.constructor==mxStackLayout&&(J=!1))}return J};Graph.prototype.getPreferredSizeForCell=function(x){var J=mxGraph.prototype.getPreferredSizeForCell.apply(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Qa);mxUtils.extend(Oa,mxArrowConnector);Oa.prototype.defaultWidth=10;Oa.prototype.defaultArrowWidth=20;Oa.prototype.getStartArrowWidth=function(){return this.getEdgeWidth()+mxUtils.getNumber(this.style,"startWidth",this.defaultArrowWidth)};Oa.prototype.getEndArrowWidth=function(){return this.getEdgeWidth()+mxUtils.getNumber(this.style,"endWidth",this.defaultArrowWidth)};Oa.prototype.getEdgeWidth=function(){return mxUtils.getNumber(this.style,"width",this.defaultWidth)+Math.max(0,this.strokewidth-
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(S="1"==f.getCurrentCellStyle(aa).treeMoving);return S}function q(aa){var S=!1;null!=aa&&(aa=k.getParent(aa),S=f.view.getState(aa),S="tree"==(null!=S?S.style:f.getCellStyle(aa)).containerType);return S}function E(aa){var S=!1;null!=aa&&(aa=k.getParent(aa),S=f.view.getState(aa),f.view.getState(aa),S=null!=(null!=S?S.style:f.getCellStyle(aa)).childLayout);return S}function L(aa){aa=f.view.getState(aa);if(null!=aa){var S=f.getIncomingTreeEdges(aa.cell);if(0<S.length&&(S=f.view.getState(S[0]),null!=S&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.editor.getEditBlankUrl=function(P){P=null!=P?P:"";"1"==urlParams.dev&&(P+=(0<P.length?"&":"?")+"dev=1");return F.apply(this,arguments)};var K=f.addClickHandler;f.addClickHandler=function(P,V,l){var A=V;V=function(N,X){if(null==X){var U=mxEvent.getSource(N);"a"==U.nodeName.toLowerCase()&&(X=U.getAttribute("href"))}null!=X&&f.isCustomLink(X)&&(mxEvent.isTouchEvent(N)||!mxEvent.isPopupTrigger(N))&&f.customLinkClicked(X)&&mxEvent.consume(N);null!=A&&A(N,X)};K.call(this,P,V,l)};q.apply(this,arguments);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(aa=f.model.getChildren(f.model.getParent(S)));f.setSelectionCells(aa)}},null,null,"Alt+Shift+S");var z=f.removeCells;f.removeCells=function(aa,S){S=null!=S?S:!0;null==aa&&(aa=this.getDeletableCells(this.getSelectionCells()));S&&(aa=this.getDeletableCells(this.addAllEdges(aa)));for(var da=[],P=0;P<aa.length;P++){var V=aa[P];k.isEdge(V)&&q(V)&&(da.push(V),V=k.getTerminal(V,!1));if(p(V)){var l=[];f.traverse(V,!0,function(A,N){var X=null!=N&&f.isTreeEdge(N);X&&l.push(N);(null==N||X)&&l.push(A);return null== N||X});0<l.length&&(da=da.concat(l),V=f.getIncomingTreeEdges(aa[P]),aa=aa.concat(V))}else null!=V&&da.push(aa[P])}aa=da;return z.apply(this,arguments)};d.hoverIcons.getStateAt=function(aa,S,da){return p(aa.cell)?null:this.graph.view.getState(this.graph.getCellAt(S,da))};var C=f.duplicateCells;f.duplicateCells=function(aa,S){aa=null!=aa?aa:this.getSelectionCells();for(var da=aa.slice(0),P=0;P<da.length;P++){var V=f.view.getState(da[P]);if(null!=V&&p(V.cell)){var l=f.getIncomingTreeEdges(V.cell);for(V=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(x){null!=x.text&&(x.text.replaceLinefeeds="0"!=mxUtils.getValue(x.style,"nl2Br","1"));u.apply(this,arguments)};var z=mxConstraintHandler.prototype.update;mxConstraintHandler.prototype.update=function(x,J){this.isKeepFocusEvent(x)||!mxEvent.isAltDown(x.getEvent())?z.apply(this,arguments):this.reset()};mxGuide.prototype.createGuideShape=function(x){return new mxPolyline([],mxConstants.GUIDE_COLOR,mxConstants.GUIDE_STROKEWIDTH)};mxCellEditor.prototype.escapeCancelsEditing=!1;var C=mxCellEditor.prototype.startEditing;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
wa),sa,this);this.fireEvent(new mxEventObject(mxEvent.CELLS_ADDED,"cells",sa))}finally{Y.endUpdate()}return la};Graph.prototype.insertImage=function(x,J,Q){if(null!=x&&null!=this.cellEditor.textarea){for(var Y=this.cellEditor.textarea.getElementsByTagName("img"),ea=[],la=0;la<Y.length;la++)ea.push(Y[la]);document.execCommand("insertimage",!1,x);x=this.cellEditor.textarea.getElementsByTagName("img");if(x.length==ea.length+1)for(la=x.length-1;0<=la;la--)if(0==la||x[la]!=ea[la-1]){x[la].setAttribute("width", J);x[la].setAttribute("height",Q);break}}};Graph.prototype.insertLink=function(x){if(null!=this.cellEditor.textarea)if(0==x.length)document.execCommand("unlink",!1);else if(mxClient.IS_FF){for(var J=this.cellEditor.textarea.getElementsByTagName("a"),Q=[],Y=0;Y<J.length;Y++)Q.push(J[Y]);document.execCommand("createlink",!1,mxUtils.trim(x));J=this.cellEditor.textarea.getElementsByTagName("a");if(J.length==Q.length+1)for(Y=J.length-1;0<=Y;Y--)if(J[Y]!=Q[Y-1]){for(J=J[Y].getElementsByTagName("a");0<J.length;){for(Q=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
return J.cells[0]};Graph.prototype.deleteRow=function(x,J){x.tBodies[0].deleteRow(J)};Graph.prototype.insertColumn=function(x,J){var Q=x.tHead;if(null!=Q)for(var Y=0;Y<Q.rows.length;Y++){var ea=document.createElement("th");Q.rows[Y].appendChild(ea);mxUtils.br(ea)}x=x.tBodies[0];for(Q=0;Q<x.rows.length;Q++)Y=x.rows[Q].insertCell(J),mxUtils.br(Y);return x.rows[0].cells[0<=J?J:x.rows[0].cells.length-1]};Graph.prototype.deleteColumn=function(x,J){if(0<=J){x=x.tBodies[0].rows;for(var Q=0;Q<x.length;Q++)x[Q].cells.length>
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
c?c=v:c.add(v))}this.bounds=null!=c?c:new mxRectangle};b.prototype.paintVertexShape=function(c,m,v,n,t){this.paintTableLine(c,this.line,0,0)};b.prototype.paintTableLine=function(c,m,v,n){if(null!=m){var t=null;c.begin();for(var B=0;B<m.length;B++){var D=m[B];null!=D&&(null==t?c.moveTo(D.x+v,D.y+n):null!=t&&c.lineTo(D.x+v,D.y+n));t=D}c.end();c.stroke()}};b.prototype.intersectsRectangle=function(c){var m=!1;if(mxShape.prototype.intersectsRectangle.apply(this,arguments)&&null!=this.line)for(var v=null, n=0;n<this.line.length&&!m;n++){var t=this.line[n];null!=t&&null!=v&&(m=mxUtils.rectangleIntersectsSegment(c,v,t));v=t}return m};mxCellRenderer.registerShape("tableLine",b);mxUtils.extend(e,mxSwimlane);e.prototype.getLabelBounds=function(c){return 0==this.getTitleSize()?mxShape.prototype.getLabelBounds.apply(this,arguments):mxSwimlane.prototype.getLabelBounds.apply(this,arguments)};e.prototype.paintVertexShape=function(c,m,v,n,t){var B=null!=this.state?this.state.view.graph.isCellCollapsed(this.state.cell):
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"javascript:void(0);"))}};Graph.prototype.createSvgCanvas=function(x){x=new mxSvgCanvas2D(x);x.minStrokeWidth=this.cellRenderer.minSvgStrokeWidth;x.pointerEvents=!0;return x};Graph.prototype.getSelectedTextBlocks=function(){function x(oa){if(oa.firstChild)return oa.firstChild;for(;oa;){if(oa.nextSibling)return oa.nextSibling;oa=oa.parentNode}}function J(oa){var wa=oa.startContainer,sa=oa.endContainer;oa=oa.commonAncestorContainer;var ua=[],Fa;for(Fa=wa.parentNode;Fa&&(ua.push(Fa),Fa!=oa);Fa=Fa.parentNode); ua.reverse();for(Fa=wa;Fa&&(ua.push(Fa),Fa!=sa);Fa=x(Fa));return ua}var Q=[this.getSelectedElement()];if(window.getSelection){var Y=window.getSelection();Y.getRangeAt&&Y.rangeCount&&(Q=J(Y.getRangeAt(0)))}Y=[];for(var ea=0;ea<Q.length;ea++)for(var la=Q[ea];null!=this.cellEditor.textarea&&this.cellEditor.textarea.contains(la)&&la!=this.cellEditor.textarea&&null!=la.parentNode;)if(la.nodeType==mxConstants.NODETYPE_ELEMENT&&"block"==mxUtils.getCurrentStyle(la).display){0>mxUtils.indexOf(Y,la)&&Y.push(la); break}else la=la.parentNode;return Y};Graph.prototype.getSelectedElement=function(){var x=null;if(window.getSelection){var J=window.getSelection();J.getRangeAt&&J.rangeCount&&(x=J.getRangeAt(0).commonAncestorContainer)}else document.selection&&(x=document.selection.createRange().parentElement());return x};Graph.prototype.getSelectedEditingElement=function(){for(var x=this.getSelectedElement();null!=x&&x.nodeType!=mxConstants.NODETYPE_ELEMENT;)x=x.parentNode;null!=x&&x==this.cellEditor.textarea&&1==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
T="curved sourcePerimeterSpacing targetPerimeterSpacing startArrow startFill startSize endArrow endFill endSize".split(" "),G=!1,M=!1;this.setDefaultStyle=function(P){try{y.getModel().isEdge(P)?M=!1:G=!1;var V=y.getCellStyle(P,!1),l=[],A=[],N;for(N in V)l.push(V[N]),A.push(N);y.getModel().isEdge(P)?y.currentEdgeStyle={}:y.currentVertexStyle={};this.fireEvent(new mxEventObject("styleChanged","keys",A,"values",l,"cells",[P],"force",!0));y.getModel().isEdge(P)?M=!0:G=!0}catch(X){this.handleError(X)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(c,m,v){c=[];var n=Math.max(0,Math.min(m,Math.min(v,parseFloat(mxUtils.getValue(this.style,"size",this.size)))));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m-n),0));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m-n,0));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m-.5*n,.5*n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,n));c.push(new mxConnectionConstraint(new mxPoint(0, 0),!1,null,m,.5*(v+n)));c.push(new mxConnectionConstraint(new mxPoint(1,1),!1));c.push(new mxConnectionConstraint(new mxPoint(.5,1),!1));c.push(new mxConnectionConstraint(new mxPoint(0,1),!1));c.push(new mxConnectionConstraint(new mxPoint(0,.5),!1));m>=2*n&&c.push(new mxConnectionConstraint(new mxPoint(.5,0),!1));return c};z.prototype.getConstraints=function(c,m,v){c=[];var n=Math.max(0,Math.min(m,Math.min(v,parseFloat(mxUtils.getValue(this.style,"size",this.size)))));c.push(new mxConnectionConstraint(new mxPoint(1,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!0),new mxConnectionConstraint(new mxPoint(1,.5),!0),new mxConnectionConstraint(new mxPoint(1,.75),!0)];mxArrow.prototype.constraints=null;Va.prototype.getConstraints=function(c,m,v){c=[];var n=Math.max(0,Math.min(m,parseFloat(mxUtils.getValue(this.style,"dx",this.dx)))),t=Math.max(0,Math.min(v,parseFloat(mxUtils.getValue(this.style,"dy",this.dy))));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1));c.push(new mxConnectionConstraint(new mxPoint(.5,0),!1));c.push(new mxConnectionConstraint(new mxPoint(1, 0),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,.5*t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.75*m+.25*n,t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m+n),t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m+n),.5*(v+t)));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m+n),v));c.push(new mxConnectionConstraint(new mxPoint(.5,1),!1));c.push(new mxConnectionConstraint(new mxPoint(0, 0),!1,null,.5*(m-n),v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m-n),.5*(v+t)));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m-n),t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.25*m-.25*n,t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,t));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,.5*t));return c};Ba.prototype.getConstraints=function(c,m,v){c=[];var n=Math.max(0,Math.min(m,parseFloat(mxUtils.getValue(this.style,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.saveFile=function(b,e,g,p){};DrawioFile.prototype.getFileUrl=function(){return null};DrawioFile.prototype.getFolderUrl=function(b){return null};DrawioFile.prototype.getPublicUrl=function(b){b(null)};DrawioFile.prototype.isRestricted=function(){return DrawioFile.RESTRICT_EXPORT};DrawioFile.prototype.isModified=function(){return this.modified};DrawioFile.prototype.getShadowModified=function(){return this.shadowModified};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.createSvgImage=function(b,e,g,p,y){g=unescape(encodeURIComponent(Graph.svgDoctype+'<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="'+b+'px" height="'+e+'px" '+(null!=p&&null!=y?'viewBox="0 0 '+p+" "+y+'" ':"")+'version="1.1">'+g+"</svg>"));return new mxImage("data:image/svg+xml;base64,"+(window.btoa?btoa(g):Base64.encode(g,!0)),b,e)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
V=[];null!=P;){var l=P.nextSibling;0>mxUtils.indexOf(this.toolbar.staticElements,P)&&(P.parentNode.removeChild(P),V.push(P));P=l}P=this.toolbar.fontMenu;l=this.toolbar.sizeMenu;if(null==fa)this.toolbar.createTextToolbar();else{for(var A=0;A<fa.length;A++)this.toolbar.container.appendChild(fa[A]);this.toolbar.fontMenu=H;this.toolbar.sizeMenu=ka}O=y.cellEditor.isContentEditing();H=P;ka=l;fa=V}}),ja=y.cellEditor.startEditing;y.cellEditor.startEditing=function(){ja.apply(this,arguments);ca();if(y.cellEditor.isContentEditing()){var P= !1,V=function(){P||(P=!0,window.setTimeout(function(){var l=y.getSelectedEditingElement();null!=l&&(l=mxUtils.getCurrentStyle(l),null!=l&&null!=p.toolbar&&(p.toolbar.setFontName(Graph.stripQuotes(l.fontFamily)),p.toolbar.setFontSize(parseInt(l.fontSize))));P=!1},0))};mxEvent.addListener(y.cellEditor.textarea,"input",V);mxEvent.addListener(y.cellEditor.textarea,"touchend",V);mxEvent.addListener(y.cellEditor.textarea,"mouseup",V);mxEvent.addListener(y.cellEditor.textarea,"keyup",V);V()}};var ma=y.cellEditor.stopEditing;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable