code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
gridSize:parseFloat(b.getAttribute("gridSize"))||mxGraph.prototype.gridSize,guidesEnabled:"0"!=b.getAttribute("guides"),foldingEnabled:"0"!=b.getAttribute("fold"),shadowVisible:"1"==b.getAttribute("shadow"),pageVisible:this.isLightboxView()?!1:null!=e?"0"!=e:this.defaultPageVisible,background:null!=q&&0<q.length?q:null,backgroundImage:E,pageScale:isNaN(g)?mxGraph.prototype.pageScale:g,pageFormat:isNaN(p)||isNaN(y)?"undefined"===typeof mxSettings||null!=this.defaultPageFormat?mxGraph.prototype.pageFormat: mxSettings.getPageFormat():new mxRectangle(0,0,p,y),tooltips:"0"!=b.getAttribute("tooltips"),connect:"0"!=b.getAttribute("connect"),arrows:"0"!=b.getAttribute("arrows"),mathEnabled:"1"==b.getAttribute("math"),selectionCells:null,defaultParent:null,scrollbars:this.defaultScrollbars,scale:1,hiddenTags:[],extFonts:L||[]}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
n,B,0,0,1,0,B),c.stroke())};mxCellRenderer.registerShape("cylinder2",W);mxUtils.extend(d,mxCylinder);d.prototype.size=15;d.prototype.paintVertexShape=function(c,m,v,n,t){var B=Math.max(0,Math.min(.5*t,parseFloat(mxUtils.getValue(this.style,"size",this.size)))),D=mxUtils.getValue(this.style,"lid",!0);c.translate(m,v);0==B?(c.rect(0,0,n,t),c.fillAndStroke()):(c.begin(),D?(c.moveTo(0,B),c.arcTo(.5*n,B,0,0,1,.5*n,0),c.arcTo(.5*n,B,0,0,1,n,B)):(c.moveTo(0,0),c.arcTo(.5*n,B,0,0,0,.5*n,B),c.arcTo(.5*n,B, 0,0,0,n,0)),c.lineTo(n,t-B),c.arcTo(.5*n,B,0,0,1,.5*n,t),c.arcTo(.5*n,B,0,0,1,0,t-B),c.close(),c.fillAndStroke(),c.setShadow(!1),D&&(c.begin(),c.moveTo(n,B),c.arcTo(.5*n,B,0,0,1,.5*n,2*B),c.arcTo(.5*n,B,0,0,1,0,B),c.stroke()))};mxCellRenderer.registerShape("cylinder3",d);mxUtils.extend(f,mxActor);f.prototype.redrawPath=function(c,m,v,n,t){c.moveTo(0,0);c.quadTo(n/2,.5*t,n,0);c.quadTo(.5*n,t/2,n,t);c.quadTo(n/2,.5*t,0,t);c.quadTo(.5*n,t/2,0,0);c.end()};mxCellRenderer.registerShape("switch",f);mxUtils.extend(k,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(G){return this.isTreeEdge(G)}))};Graph.prototype.getIncomingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function p(aa){return k.isVertex(aa)&&q(aa)}function y(aa){var S=!1;null!=aa&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.generateMermaidImage(fa,null,mxUtils.bind(this,function(ca,ja,ma){this.tryAndHandle(mxUtils.bind(this,function(){C.clear()&&(EditorUi.debug("EditorUi.generateOpenAiMermaidDiagram","\nprompt:",d,"\nresponse:",ka,"\nresult:",fa),this.spinner.stop(),f(fa,ca,ja,ma))}),K)}),K,mxUtils.bind(this,function(ca){3>u++?C.clear()&&(this.spinner.stop(),z()):K(ca)}))}),K);else{var H={message:mxResources.get("error")+" "+O.getStatus()};try{H=JSON.parse(O.getText()),H=H.error}catch(ka){}K(H)}}),K)}),k)});z()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(m=-1*(m+1));return new mxPoint(c.getCenterX()+m,Math.min(c.y+c.height,Math.max(c.y+n,v.y)))};mxStyleRegistry.putValue("lifelinePerimeter",mxPerimeter.LifelinePerimeter);mxPerimeter.OrthogonalPerimeter=function(c,m,v,n){n=!0;return mxPerimeter.RectanglePerimeter.apply(this,arguments)};mxStyleRegistry.putValue("orthogonalPerimeter",mxPerimeter.OrthogonalPerimeter);mxPerimeter.BackbonePerimeter=function(c,m,v,n){n=parseFloat(m.style[mxConstants.STYLE_STROKEWIDTH]||1)*m.view.scale/2-1;null!=m.style.backboneSize&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxEvent.consume(H)}));mxEvent.addGestureListeners(document.body,null,mxUtils.bind(this,function(H){var ka=!1;null!=C&&(this.diagramContainer.style.width=Math.max(20,K+mxEvent.getClientX(H)-C)+"px",ka=!0);null!=F&&(this.diagramContainer.style.height=Math.max(20,O+mxEvent.getClientY(H)-F)+"px",ka=!0);ka&&((window.opener||window.parent).postMessage(JSON.stringify({event:"resize",fullscreen:Editor.inlineFullscreen,rect:this.diagramContainer.getBoundingClientRect()}),"*"),this.inlineSizeChanged(),this.refresh())}),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"0");null==x&&(x=this.bounds);this.hint.style.left=x.x+Math.round((x.width-this.hint.clientWidth)/2)+"px";this.hint.style.top=x.y+x.height+Editor.hintOffset+"px";null!=this.linkHint&&(this.linkHint.style.display="none")}};mxVertexHandler.prototype.removeHint=function(){mxGraphHandler.prototype.removeHint.apply(this,arguments);null!=this.linkHint&&(this.linkHint.style.display="")};var U=mxEdgeHandler.prototype.mouseMove;mxEdgeHandler.prototype.mouseMove=function(x,J){U.apply(this,arguments);null!= this.linkHint&&"none"!=this.linkHint.style.display&&null!=this.graph.graphHandler&&null!=this.graph.graphHandler.first&&(this.linkHint.style.display="none")};var Z=mxEdgeHandler.prototype.mouseUp;mxEdgeHandler.prototype.mouseUp=function(x,J){Z.apply(this,arguments);null!=this.linkHint&&"none"==this.linkHint.style.display&&(this.linkHint.style.display="")};mxEdgeHandler.prototype.updateHint=function(x,J){null==this.hint&&(this.hint=b(),this.state.view.graph.container.appendChild(this.hint));var Q=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.model.getChildCount(J),Y=0;Y<Q;Y++)this.updateCustomLinksForCell(x,this.model.getChildAt(J,Y))};Graph.prototype.doUpdateCustomLinksForCell=function(x,J){};Graph.prototype.getAllConnectionConstraints=function(x,J){if(null!=x){J=mxUtils.getValue(x.style,"points",null);if(null!=J){x=[];try{var Q=JSON.parse(J);for(J=0;J<Q.length;J++){var Y=Q[J];x.push(new mxConnectionConstraint(new mxPoint(Y[0],Y[1]),2<Y.length?"0"!=Y[2]:!0,null,3<Y.length?Y[3]:0,4<Y.length?Y[4]:0))}}catch(la){}return x}if(null!= x.shape&&null!=x.shape.bounds){Y=x.shape.direction;J=x.shape.bounds;var ea=x.shape.scale;Q=J.width/ea;J=J.height/ea;if(Y==mxConstants.DIRECTION_NORTH||Y==mxConstants.DIRECTION_SOUTH)Y=Q,Q=J,J=Y;J=x.shape.getConstraints(x.style,Q,J);if(null!=J)return J;if(null!=x.shape.stencil&&null!=x.shape.stencil.constraints)return x.shape.stencil.constraints;if(null!=x.shape.constraints)return x.shape.constraints}}return null};Graph.prototype.flipEdge=function(x){if(null!=x){var J=this.getCurrentCellStyle(x);J=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.addSplitHandler=function(b,e,g,p){function y(R){if(null!=E){var W=new mxPoint(mxEvent.getClientX(R),mxEvent.getClientY(R));p(Math.max(0,L+(e?W.x-E.x:E.y-W.y)-g));mxEvent.consume(R);L!=M()&&(T=!0,G=null)}}function q(R){y(R);E=L=null}var E=null,L=null,T=!0,G=null;mxClient.IS_POINTER&&(b.style.touchAction="none");var M=mxUtils.bind(this,function(){var R=parseInt(e?b.style.left:b.style.bottom);e||(R=R+g-this.footerHeight);return R});mxEvent.addGestureListeners(b,function(R){E=new mxPoint(mxEvent.getClientX(R),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
.5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,v-n));c.push(new mxConnectionConstraint(new mxPoint(.5,1),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,v-n));c.push(new mxConnectionConstraint(new mxPoint(0,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,n));return c};ma.prototype.getConstraints=function(c,m,v){c=[];mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE);var n=Math.max(0,Math.min(v,parseFloat(mxUtils.getValue(this.style, "size",this.size))));parseFloat(mxUtils.getValue(this.style,"position",this.position));var t=m*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"position2",this.position2))));parseFloat(mxUtils.getValue(this.style,"base",this.base));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1));c.push(new mxConnectionConstraint(new mxPoint(.25,0),!1));c.push(new mxConnectionConstraint(new mxPoint(.5,0),!1));c.push(new mxConnectionConstraint(new mxPoint(.75,0),!1));c.push(new mxConnectionConstraint(new mxPoint(1, 0),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,.5*(v-n)));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,v-n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,t,v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,v-n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,.5*(v-n)));m>=2*n&&c.push(new mxConnectionConstraint(new mxPoint(.5,0),!1));return c};mxRectangleShape.prototype.constraints=[new mxConnectionConstraint(new mxPoint(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.prototype.editAsNew=function(b,e){e=null!=e?"?title="+encodeURIComponent(e):"";null!=urlParams.ui&&(e+=(0<e.length?"&":"?")+"ui="+urlParams.ui);if("undefined"!==typeof window.postMessage&&(null==document.documentMode||10<=document.documentMode)){var g=null,p=mxUtils.bind(this,function(y){"ready"==y.data&&y.source==g&&(mxEvent.removeListener(window,"message",p),g.postMessage(b,"*"))});mxEvent.addListener(window,"message",p);g=this.graph.openLink(this.getEditBlankUrl(e+(0<e.length?"&":"?")+"client=1"), null,!0)}else this.graph.openLink(this.getEditBlankUrl(e)+"#R"+encodeURIComponent(b))};Editor.prototype.createGraph=function(b,e){b=new Graph(null,e,null,null,b);b.transparentBackground=!1;var g=b.isCssTransformsSupported,p=this;b.isCssTransformsSupported=function(){return g.apply(this,arguments)&&(!p.chromeless||!mxClient.IS_SF)};this.chromeless||(b.isBlankLink=function(y){return!this.isExternalProtocol(y)});return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxConstants.LINE_ARCSIZE)/2;c.begin();this.addPoints(c,[new mxPoint(m+B,v),new mxPoint(m+n,v+D),new mxPoint(m+B,v+t),new mxPoint(m,v+D)],this.isRounded,ha,!0);c.stroke();mxRectangleShape.prototype.paintForeground.apply(this,arguments)};mxCellRenderer.registerShape("associativeEntity",Aa);mxUtils.extend(za,mxDoubleEllipse);za.prototype.outerStroke=!0;za.prototype.paintVertexShape=function(c,m,v,n,t){var B=Math.min(4,Math.min(n/5,t/5));0<n&&0<t&&(c.ellipse(m+B,v+B,n-2*B,t-2*B),c.fillAndStroke());c.setShadow(!1); this.outerStroke&&(c.ellipse(m,v,n,t),c.stroke())};mxCellRenderer.registerShape("endState",za);mxUtils.extend(Ma,za);Ma.prototype.outerStroke=!1;mxCellRenderer.registerShape("startState",Ma);mxUtils.extend(Qa,mxArrowConnector);Qa.prototype.defaultWidth=4;Qa.prototype.isOpenEnded=function(){return!0};Qa.prototype.getEdgeWidth=function(){return mxUtils.getNumber(this.style,"width",this.defaultWidth)+Math.max(0,this.strokewidth-1)};Qa.prototype.isArrowRounded=function(){return this.isRounded};mxCellRenderer.registerShape("link",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.createMenu=function(d,f,k,u){k=null!=k?k:"geToolbarButton";var z=this.menus.get(d);u=this.menubar.addMenu(mxResources.get(d),z.funct,null,u);u.className=k;u.style.display="inline-block";u.style.cursor="pointer";u.style.height="24px";u.setAttribute("title",mxResources.get(d));this.menus.menuCreated(z,u,k);null!=f&&(u.style.backgroundImage="url("+f+")",u.style.backgroundPosition="center center",u.style.backgroundRepeat="no-repeat",u.style.backgroundSize="100% 100%",u.style.width= "24px",u.innerText="");return u};EditorUi.prototype.createToolbarButton=function(d,f,k,u){u=null!=u?u:24;var z=document.createElement("a");z.className="geToolbarButton geAdaptiveAsset";z.setAttribute("title",f);z.style.backgroundImage="url("+d+")";z.style.backgroundPosition="center center";z.style.backgroundRepeat="no-repeat";z.style.backgroundSize="100% 100%";z.style.display="inline-block";z.style.cursor="pointer";z.style.marginLeft="6px";z.style.width=u+"px";z.style.height=u+"px";null!=k&&(mxEvent.addListener(z,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.changeHandler=null)}}();(function(){function b(c,m,v){mxShape.call(this);this.line=c;this.stroke=m;this.strokewidth=null!=v?v:1;this.updateBoundsFromLine()}function e(){mxSwimlane.call(this)}function g(){mxSwimlane.call(this)}function p(){mxCylinder.call(this)}function y(){mxConnector.call(this)}function q(){mxCylinder.call(this)}function E(){mxActor.call(this)}function L(){mxCylinder.call(this)}function T(){mxCylinder.call(this)}function G(){mxCylinder.call(this)}function M(){mxCylinder.call(this)}function R(){mxShape.call(this)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Math.round(x.y+x.height+Editor.hintOffset)+"px"}};var Ea=mxEdgeHandler.prototype.reset;mxEdgeHandler.prototype.reset=function(){Ea.apply(this,arguments);null!=this.linkHint&&(this.linkHint.style.visibility="")};var Ka=mxEdgeHandler.prototype.destroy;mxEdgeHandler.prototype.destroy=function(){Ka.apply(this,arguments);null!=this.linkHint&&(this.linkHint.parentNode.removeChild(this.linkHint),this.linkHint=null);null!=this.changeHandler&&(this.graph.getModel().removeListener(this.changeHandler),this.graph.getSelectionModel().removeListener(this.changeHandler), this.changeHandler=null)}}();(function(){function b(c,m,v){mxShape.call(this);this.line=c;this.stroke=m;this.strokewidth=null!=v?v:1;this.updateBoundsFromLine()}function e(){mxSwimlane.call(this)}function g(){mxSwimlane.call(this)}function p(){mxCylinder.call(this)}function y(){mxConnector.call(this)}function q(){mxCylinder.call(this)}function E(){mxActor.call(this)}function L(){mxCylinder.call(this)}function T(){mxCylinder.call(this)}function G(){mxCylinder.call(this)}function M(){mxCylinder.call(this)}function R(){mxShape.call(this)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.extend(Ea,mxActor);Ea.prototype.redrawPath=function(c,m,v,n,t){c.moveTo(0,0);c.quadTo(n,0,n,t/2);c.quadTo(n,t,0,t);c.close();c.end()};mxCellRenderer.registerShape("or",Ea);mxUtils.extend(Ka,mxActor);Ka.prototype.redrawPath=function(c,m,v,n,t){c.moveTo(0,0);c.quadTo(n,0,n,t/2);c.quadTo(n,t,0,t);c.quadTo(n/2,t/2,0,0);c.close();c.end()};mxCellRenderer.registerShape("xor",Ka);mxUtils.extend(x,mxActor);x.prototype.size=20;x.prototype.isRoundable=function(){return!0};x.prototype.redrawPath=function(c,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor.createRoughCanvas=function(l){var A=rough.canvas({getContext:function(){return l}});A.draw=function(N){var X=N.sets||[];N=N.options||this.getDefaultOptions();for(var U=0;U<X.length;U++){var Z=X[U];switch(Z.type){case "path":null!=N.stroke&&this._drawToContext(l,Z,N);break;case "fillPath":this._drawToContext(l,Z,N);break;case "fillSketch":this.fillSketch(l,Z,N)}}};A.fillSketch=function(N,X,U){var Z=l.state.strokeColor,ba=l.state.strokeWidth,ia=l.state.strokeAlpha,qa=l.state.dashed,ra=U.fillWeight; 0>ra&&(ra=U.strokeWidth/2);l.setStrokeAlpha(l.state.fillAlpha);l.setStrokeColor(U.fill||"");l.setStrokeWidth(ra);l.setDashed(!1);this._drawToContext(N,X,U);l.setDashed(qa);l.setStrokeWidth(ba);l.setStrokeColor(Z);l.setStrokeAlpha(ia)};A._drawToContext=function(N,X,U){N.begin();for(var Z=0;Z<X.ops.length;Z++){var ba=X.ops[Z],ia=ba.data;switch(ba.op){case "move":N.moveTo(ia[0],ia[1]);break;case "bcurveTo":N.curveTo(ia[0],ia[1],ia[2],ia[3],ia[4],ia[5]);break;case "lineTo":N.lineTo(ia[0],ia[1])}}N.end();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function X(){mxShape.call(this)}function U(){mxShape.call(this)}function Z(){mxRectangleShape.call(this)}function ba(){mxShape.call(this)}function ia(){mxShape.call(this)}function qa(){mxShape.call(this)}function ra(){mxShape.call(this)}function pa(){mxShape.call(this)}function xa(){mxCylinder.call(this)}function Ca(){mxCylinder.call(this)}function Aa(){mxRectangleShape.call(this)}function za(){mxDoubleEllipse.call(this)}function Ma(){mxDoubleEllipse.call(this)}function Qa(){mxArrowConnector.call(this);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
GraphViewer.prototype.crop=function(){var b=this.graph,e=b.getGraphBounds(),g=b.border,p=b.view.scale;b.view.setTranslate(null!=e.x?Math.floor(b.view.translate.x-e.x/p+g):g,null!=e.y?Math.floor(b.view.translate.y-e.y/p+g):g)};GraphViewer.prototype.updateContainerWidth=function(b,e){b.style.width=e+"px"};GraphViewer.prototype.updateContainerHeight=function(b,e){if(this.forceCenter||this.zoomEnabled||!this.autoFit||"BackCompat"==document.compatMode||8==document.documentMode)b.style.height=e+"px"};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxImageShape.prototype.getImageDataUri=function(){var b=this.image;if("data:image/svg+xml;base64,"==b.substring(0,26)&&null!=this.style&&"1"==mxUtils.getValue(this.style,"clipSvg","0")){if(null==this.clippedSvg||this.clippedImage!=b)this.clippedSvg=Graph.clipSvgDataUri(b,!0),this.clippedImage=b;b=this.clippedSvg}return b};(function(){var b=mxResources.get;mxResources.get=function(e,g,p){null==p&&(p=e);return b.apply(this,[e,g,p])}})();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(M){y.apply(this,arguments);this.graph.model.isEdge(M.cell)&&1!=M.style[mxConstants.STYLE_CURVED]&&this.updateLineJumps(M)};mxGraphView.prototype.updateLineJumps=function(M){var R=M.absolutePoints;if(Graph.lineJumpsEnabled){var W=null!=M.routedPoints,d=null;if(null!=R&&null!=this.validEdges&&"none"!==mxUtils.getValue(M.style,"jumpStyle","none")){var f=function(ja,ma,aa){var S=new mxPoint(ma,aa);S.type=ja;d.push(S);S=null!=M.routedPoints?M.routedPoints[d.length-1]:null;return null==S||S.type!= ja||S.x!=ma||S.y!=aa},k=.5*this.scale;W=!1;d=[];for(var u=0;u<R.length-1;u++){for(var z=R[u+1],C=R[u],F=[],K=R[u+2];u<R.length-2&&mxUtils.ptSegDistSq(C.x,C.y,K.x,K.y,z.x,z.y)<1*this.scale*this.scale;)z=K,u++,K=R[u+2];W=f(0,C.x,C.y)||W;for(var O=0;O<this.validEdges.length;O++){var H=this.validEdges[O],ka=H.absolutePoints;if(null!=ka&&mxUtils.intersects(M,H)&&"1"!=H.style.noJump)for(H=0;H<ka.length-1;H++){var fa=ka[H+1],ca=ka[H];for(K=ka[H+2];H<ka.length-2&&mxUtils.ptSegDistSq(ca.x,ca.y,K.x,K.y,fa.x,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
n,v+t/2);c.end();c.stroke()};mxCellRenderer.registerShape("sortShape",la);mxUtils.extend(oa,mxEllipse);oa.prototype.paintVertexShape=function(c,m,v,n,t){c.begin();c.moveTo(m,v);c.lineTo(m+n,v);c.lineTo(m+n/2,v+t/2);c.close();c.fillAndStroke();c.begin();c.moveTo(m,v+t);c.lineTo(m+n,v+t);c.lineTo(m+n/2,v+t/2);c.close();c.fillAndStroke()};mxCellRenderer.registerShape("collate",oa);mxUtils.extend(wa,mxEllipse);wa.prototype.paintVertexShape=function(c,m,v,n,t){var B=c.state.strokeWidth/2,D=10+2*B,ha=v+ t-D/2;c.begin();c.moveTo(m,v);c.lineTo(m,v+t);c.moveTo(m+B,ha);c.lineTo(m+B+D,ha-D/2);c.moveTo(m+B,ha);c.lineTo(m+B+D,ha+D/2);c.moveTo(m+B,ha);c.lineTo(m+n-B,ha);c.moveTo(m+n,v);c.lineTo(m+n,v+t);c.moveTo(m+n-B,ha);c.lineTo(m+n-D-B,ha-D/2);c.moveTo(m+n-B,ha);c.lineTo(m+n-D-B,ha+D/2);c.end();c.stroke()};mxCellRenderer.registerShape("dimension",wa);mxUtils.extend(sa,mxEllipse);sa.prototype.drawHidden=!0;sa.prototype.paintVertexShape=function(c,m,v,n,t){this.outline||c.setStrokeColor(null);if(null!=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(l,A,N){return Editor.extractGraphModel.apply(this,arguments)};var g=Editor.prototype.resetGraph;Editor.prototype.resetGraph=function(){this.graph.mathEnabled="1"==urlParams.math;this.graph.view.x0=null;this.graph.view.y0=null;this.graph.useCssTransforms=!mxClient.NO_FO&&this.isChromelessView()&&this.graph.isCssTransformsSupported();this.graph.updateCssTransform();g.apply(this,arguments)};var p=Editor.prototype.updateGraphComponents;Editor.prototype.updateGraphComponents=function(){p.apply(this,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null==A||P.get(A)||(P.put(A,!0),V.push(A))}return V};var d=this.graphHandler.start;this.graphHandler.start=function(S,da,P,V){var l=!1;this.graph.isTableCell(S)&&(this.graph.isCellSelected(S)?l=!0:S=this.graph.model.getParent(S));l||this.graph.isTableRow(S)&&this.graph.isCellSelected(S)||(S=this.graph.getCompositeParent(S));d.apply(this,arguments)};this.connectionHandler.createTargetVertex=function(S,da){da=this.graph.getCompositeParent(da);return mxConnectionHandler.prototype.createTargetVertex.apply(this, arguments)};this.connectionHandler.insertEdge=function(S,da,P,V,l,A){var N=mxConnectionHandler.prototype.insertEdge.apply(this,arguments);null!=V&&this.graph.applyNewEdgeStyle(V,[N]);return N};var f=new mxRubberband(this);this.getRubberband=function(){return f};var k=(new Date).getTime(),u=0,z=this.connectionHandler.mouseMove;this.connectionHandler.mouseMove=function(){var S=this.currentState;z.apply(this,arguments);S!=this.currentState?(k=(new Date).getTime(),u=0):u=(new Date).getTime()-k};var C=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
ha.positionChanged=function(){I.apply(this,arguments);c.view.invalidate(this.state.cell);c.view.validate()}}return ha},Ab={link:function(c){return[mb(c,!0,10),mb(c,!1,10)]},flexArrow:function(c){var m=c.view.graph.gridSize/c.view.scale,v=[];mxUtils.getValue(c.style,mxConstants.STYLE_STARTARROW,mxConstants.NONE)!=mxConstants.NONE&&(v.push(wb(c,["width",mxConstants.STYLE_STARTSIZE,mxConstants.STYLE_ENDSIZE],!0,function(n,t,B,D,ha){n=(c.shape.getEdgeWidth()-c.shape.strokewidth)*c.view.scale;ha=3*mxUtils.getNumber(c.style,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(d){var f=d.msgMarkers,k=this.remoteInvokeCallbacks[f.callbackId];if(null==k)throw Error("No callback for "+(null!=f?f.callbackId:"null"));d.error?k.error&&k.error(d.error.errResp):k.callback&&k.callback.apply(this,d.resp);this.remoteInvokeCallbacks[f.callbackId]=null};EditorUi.prototype.remoteInvoke=function(d,f,k,u,z){var C=!0,F=window.setTimeout(mxUtils.bind(this,function(){C=!1;z({code:App.ERROR_TIMEOUT,message:mxResources.get("timeout")})}),this.timeout),K=mxUtils.bind(this,function(){window.clearTimeout(F);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function Y(){mxEllipse.call(this)}function ea(){mxEllipse.call(this)}function la(){mxRhombus.call(this)}function oa(){mxEllipse.call(this)}function wa(){mxEllipse.call(this)}function sa(){mxEllipse.call(this)}function ua(){mxEllipse.call(this)}function Fa(){mxActor.call(this)}function Ua(){mxActor.call(this)}function Ra(){mxActor.call(this)}function Na(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1;this.rectStyle="square";this.size=10;this.absoluteCornerSize=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.minTableColumnWidth))};cb.execute=function(eb){if(0!=kb)Y.setTableColumnWidth(this.state.cell,kb,Pa);else if(!Q.blockDelayedSelection){var jb=Y.getCellAt(eb.getGraphX(),eb.getGraphY())||oa.cell;Y.graphHandler.selectCellForEvent(jb,eb)}kb=0};cb.positionChanged=function(){};cb.reset=function(){kb=0};x.push(cb)})(ea)}}return null!=x?x.reverse():null};var A=mxVertexHandler.prototype.setHandlesVisible;mxVertexHandler.prototype.setHandlesVisible=function(x){A.apply(this,arguments);if(null!=this.moveHandles)for(var J= 0;J<this.moveHandles.length;J++)null!=this.moveHandles[J]&&(this.moveHandles[J].node.style.visibility=x?"":"hidden");if(null!=this.cornerHandles)for(J=0;J<this.cornerHandles.length;J++)this.cornerHandles[J].node.style.visibility=x?"":"hidden"};mxVertexHandler.prototype.isMoveHandlesVisible=function(){return this.graph.isTable(this.state.cell)&&this.graph.isCellMovable(this.state.cell)};mxVertexHandler.prototype.refreshMoveHandles=function(){var x=this.isMoveHandlesVisible();x&&null==this.moveHandles?
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
p,g);this.ui.actions.get("share").funct()}))}))}),null,mxResources.get("saveToGoogleDrive",null,"Save to Google Drive"),mxResources.get("cancel")):this.ui.alert(mxResources.get("sharingAvailable"),null,380)};DrawioFile.prototype.getHash=function(){return""};DrawioFile.prototype.getId=function(){return""};DrawioFile.prototype.isEditable=function(){return!this.ui.editor.isChromelessView()||this.ui.editor.editable};DrawioFile.prototype.getUi=function(){return this.ui};DrawioFile.prototype.getTitle=function(){return""};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0),!1,null,0,.5*(v-n)));return c};d.prototype.getConstraints=function(c,m,v){c=[];m=Math.max(0,Math.min(v,parseFloat(mxUtils.getValue(this.style,"size",this.size))));c.push(new mxConnectionConstraint(new mxPoint(.5,0),!1));c.push(new mxConnectionConstraint(new mxPoint(0,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(.5,1),!1));c.push(new mxConnectionConstraint(new mxPoint(1,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,m));c.push(new mxConnectionConstraint(new mxPoint(1, 0),!1,null,0,m));c.push(new mxConnectionConstraint(new mxPoint(1,1),!1,null,0,-m));c.push(new mxConnectionConstraint(new mxPoint(0,1),!1,null,0,-m));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,m+.5*(.5*v-m)));c.push(new mxConnectionConstraint(new mxPoint(1,0),!1,null,0,m+.5*(.5*v-m)));c.push(new mxConnectionConstraint(new mxPoint(1,0),!1,null,0,v-m-.5*(.5*v-m)));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,v-m-.5*(.5*v-m)));c.push(new mxConnectionConstraint(new mxPoint(.145, 0),!1,null,0,.29*m));c.push(new mxConnectionConstraint(new mxPoint(.855,0),!1,null,0,.29*m));c.push(new mxConnectionConstraint(new mxPoint(.855,1),!1,null,0,.29*-m));c.push(new mxConnectionConstraint(new mxPoint(.145,1),!1,null,0,.29*-m));return c};k.prototype.getConstraints=function(c,m,v){c=[];var n=Math.max(0,Math.min(m,parseFloat(mxUtils.getValue(this.style,"tabWidth",this.tabWidth)))),t=Math.max(0,Math.min(v,parseFloat(mxUtils.getValue(this.style,"tabHeight",this.tabHeight))));"left"==mxUtils.getValue(this.style,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null,!0)}else this.graph.openLink(this.getEditBlankUrl(e)+"#R"+encodeURIComponent(b))};Editor.prototype.createGraph=function(b,e){b=new Graph(null,e,null,null,b);b.transparentBackground=!1;var g=b.isCssTransformsSupported,p=this;b.isCssTransformsSupported=function(){return g.apply(this,arguments)&&(!p.chromeless||!mxClient.IS_SF)};this.chromeless||(b.isBlankLink=function(y){return!this.isExternalProtocol(y)});return b};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxEdgeHandler.prototype.snapToTerminals=!0;mxGraphHandler.prototype.guidesEnabled=!0;mxGraphHandler.prototype.removeEmptyParents=!0;mxRubberband.prototype.fadeOut=!0;mxGuide.prototype.isEnabledForEvent=function(x){return!mxEvent.isAltDown(x)};var g=mxGraphLayout.prototype.isVertexIgnored;mxGraphLayout.prototype.isVertexIgnored=function(x){return g.apply(this,arguments)||this.graph.isTableRow(x)||this.graph.isTableCell(x)};var p=mxGraphLayout.prototype.isEdgeIgnored;mxGraphLayout.prototype.isEdgeIgnored=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function W(){mxShape.call(this)}function d(c,m,v,n){mxShape.call(this);this.bounds=c;this.fill=m;this.stroke=v;this.strokewidth=null!=n?n:1}function f(){mxActor.call(this)}function k(){mxCylinder.call(this)}function u(){mxCylinder.call(this)}function z(){mxActor.call(this)}function C(){mxActor.call(this)}function F(){mxActor.call(this)}function K(){mxActor.call(this)}function O(){mxActor.call(this)}function H(){mxActor.call(this)}function ka(){mxActor.call(this)}function fa(c,m){this.canvas=c;this.canvas.setLineJoin("round");
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Editor=function(b,e,g,p,y){mxEventSource.call(this);this.chromeless=null!=b?b:this.chromeless;this.initStencilRegistry();this.graph=p||this.createGraph(e,g);this.editable=null!=y?y:!b;this.undoManager=this.createUndoManager();this.status="";this.getOrCreateFilename=function(){return this.filename||mxResources.get("drawing",[Editor.pageCounter])+".xml"};this.getFilename=function(){return this.filename};this.setStatus=function(q,E){this.status=q;this.statusFunction=E;this.fireEvent(new mxEventObject("statusChanged"))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
m.style.shape&&v.push({title:mxResources.get("laneColor"),key:"swimlaneFillColor",defaultValue:"default"});return v}}();mxMarker.addMarker("dash",function(c,m,v,n,t,B,D,ha,I,va){var na=t*(D+I+1),bb=B*(D+I+1);return function(){c.begin();c.moveTo(n.x-na/2-bb/2,n.y-bb/2+na/2);c.lineTo(n.x+bb/2-3*na/2,n.y-3*bb/2-na/2);c.stroke()}});mxMarker.addMarker("box",function(c,m,v,n,t,B,D,ha,I,va){var na=t*(D+I+1),bb=B*(D+I+1),qb=n.x+na/2,fb=n.y+bb/2;n.x-=na;n.y-=bb;return function(){c.begin();c.moveTo(qb-na/2-
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u))}}finally{p.getModel().endUpdate()}}else{u=p.model.getParent(k);var z=p.getView().scale;d=null;1==p.getSelectionCount()&&p.model.isVertex(k)&&null!=p.layoutManager&&!p.isCellLocked(k)&&(d=p.layoutManager.getLayout(u));if(null!=d&&d.constructor==mxStackLayout)W=u.getIndex(k),37==R||38==R?p.model.add(u,k,Math.max(0,W-1)):(39==R||40==R)&&p.model.add(u,k,Math.min(p.model.getChildCount(u),W+1));else{var C=p.graphHandler;null!=C&&(null==C.first&&C.start(k,0,0,p.getMovableCells(f)),null!=C.first&&(k= f=0,37==R?f=-W:38==R?k=-W:39==R?f=W:40==R&&(k=W),C.currentDx+=f*z,C.currentDy+=k*z,C.checkPreview(),C.updatePreview()),null!=E&&window.clearTimeout(E),E=window.setTimeout(function(){if(null!=C.first){var F=C.roundLength(C.currentDx/z),K=C.roundLength(C.currentDy/z);C.moveCells(C.cells,F,K);C.reset()}},400))}}}}var g=this,p=this.editor.graph,y=new mxKeyHandler(p),q=y.isEventIgnored;y.isEventIgnored=function(R){return!(mxEvent.isShiftDown(R)&&9==R.keyCode)&&(!this.isControlDown(R)||mxEvent.isShiftDown(R)||
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.initPages=function(){if(!this.editor.graph.standalone){this.actions.addAction("previousPage",mxUtils.bind(this,function(){this.selectNextPage(!1)}));this.actions.addAction("nextPage",mxUtils.bind(this,function(){this.selectNextPage(!0)}));this.isPagesEnabled()&&(this.keyHandler.bindAction(33,!0,"previousPage",!0),this.keyHandler.bindAction(34,!0,"nextPage",!0));var b=this.editor.graph,e=b.view.validateBackground;b.view.validateBackground=mxUtils.bind(this,function(){if(null!=this.tabContainer){var E= this.tabContainer.style.height;this.tabContainer.style.height=null==this.fileNode||null==this.pages||1==this.pages.length&&"0"==urlParams.pages?"0px":this.tabContainerHeight+"px";E!=this.tabContainer.style.height&&this.refresh(!1)}e.apply(b.view,arguments)});this.editor.graph.model.addListener(mxEvent.CHANGE,mxUtils.bind(this,function(E,L){E=L.getProperty("edit").changes;for(L=0;L<E.length;L++)if(E[L]instanceof RenamePage||E[L]instanceof MovePage||E[L]instanceof mxRootChange){this.updateTabContainer(); break}}));var g=b.sizeDidChange,p=null,y=this;b.sizeDidChange=function(){var E=g.apply(this,arguments);null!=y.currentPage&&p!=y.currentPage&&(p=y.currentPage,y.pageSelected());return E};var q=mxUtils.bind(this,function(){this.updateDocumentTitle();this.updateTabContainer()});this.addListener("currentThemeChanged",q);this.editor.addListener("pagesPatched",q);this.editor.addListener("pageRenamed",q);this.editor.addListener("pageMoved",q);this.editor.addListener("fileLoaded",q);this.editor.addListener("pageSelected", mxUtils.bind(this,function(E,L){this.scrollToPage();this.updateHashObject();this.updateTabContainer();this.updateDocumentTitle();null!=this.toolbar&&this.toolbar.updateZoom()}));this.editor.addListener("pageMoved",mxUtils.bind(this,function(E,L){this.scrollToPage();this.updateHashObject()}));mxEvent.addListener(window,"resize",mxUtils.bind(this,function(){this.checkTabScrollerOverflow()}))}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
function(){T&&b.hideDialog();null!=y&&y()});d.className="geBtn";g.appendChild(d);null!=E&&(p=mxUtils.button(E,function(){T&&b.hideDialog();null!=L&&L()}),p.className="geBtn gePrimaryBtn",g.appendChild(p));this.init=function(){d.focus()};R.appendChild(g);this.container=R},PrintDialog=function(b,e){this.create(b,e)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u.style.cssText="color:#a3a3a3;text-decoration:none;margin-right:2px;cursor:pointer;",mxUtils.write(u,"?"),mxEvent.addGestureListeners(u,mxUtils.bind(this,function(P){this.openLink(EditorUi.scratchpadHelpLink);mxEvent.consume(P)})),ka.insertBefore(u,ka.firstChild))}H.appendChild(ka);H.style.paddingRight=18*ka.childNodes.length+"px"}};EditorUi.prototype.addLibraryEntries=function(d,f){for(var k=0;k<d.length;k++){var u=d[k],z=u.data;if(null!=z){z=this.convertDataUri(z);var C="shape=image;verticalLabelPosition=bottom;verticalAlign=top;imageAspect=0;"; "fixed"==u.aspect&&(C+="aspect=fixed;");f.appendChild(this.sidebar.createVertexTemplate(C+"image="+z,u.w,u.h,"",u.title||"",!1,null,!0))}else null!=u.xml&&(z=this.stringToCells("<"==u.xml.charAt(0)?u.xml:Graph.decompress(u.xml)),0<z.length&&f.appendChild(this.sidebar.createVertexTemplateFromCells(z,u.w,u.h,u.title||"",!0,null,!0)))}};EditorUi.prototype.getResource=function(d){return null!=d?d[mxLanguage]||d.main:null};EditorUi.prototype.footerHeight=0;"1"==urlParams.savesidebar&&(Sidebar.prototype.thumbWidth=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0),!1,null,m-n,v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(t+m-n),v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,t,v));return c};xa.prototype.getConstraints=function(c,m,v){m=parseFloat(mxUtils.getValue(c,"jettyWidth",xa.prototype.jettyWidth))/2;c=parseFloat(mxUtils.getValue(c,"jettyHeight",xa.prototype.jettyHeight));var n=[new mxConnectionConstraint(new mxPoint(0,0),!1,null,m),new mxConnectionConstraint(new mxPoint(.25,0),!0),new mxConnectionConstraint(new mxPoint(.5, 0),!0),new mxConnectionConstraint(new mxPoint(.75,0),!0),new mxConnectionConstraint(new mxPoint(1,0),!0),new mxConnectionConstraint(new mxPoint(1,.25),!0),new mxConnectionConstraint(new mxPoint(1,.5),!0),new mxConnectionConstraint(new mxPoint(1,.75),!0),new mxConnectionConstraint(new mxPoint(0,1),!1,null,m),new mxConnectionConstraint(new mxPoint(.25,1),!0),new mxConnectionConstraint(new mxPoint(.5,1),!0),new mxConnectionConstraint(new mxPoint(.75,1),!0),new mxConnectionConstraint(new mxPoint(1,1), !0),new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,Math.min(v-.5*c,1.5*c)),new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,Math.min(v-.5*c,3.5*c))];v>5*c&&n.push(new mxConnectionConstraint(new mxPoint(0,.75),!1,null,m));v>8*c&&n.push(new mxConnectionConstraint(new mxPoint(0,.5),!1,null,m));v>15*c&&n.push(new mxConnectionConstraint(new mxPoint(0,.25),!1,null,m));return n};x.prototype.constraints=mxRectangleShape.prototype.constraints;J.prototype.constraints=mxRectangleShape.prototype.constraints;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0),new mxPoint(n-m,0),new mxPoint(n,.5*t),new mxPoint(n-m,t),new mxPoint(m,t),new mxPoint(0,.5*t)],this.isRounded,v,!0)};mxCellRenderer.registerShape("hexagon",S);mxUtils.extend(da,mxRectangleShape);da.prototype.isHtmlAllowed=function(){return!1};da.prototype.paintForeground=function(c,m,v,n,t){var B=Math.min(n/5,t/5)+1;c.begin();c.moveTo(m+n/2,v+B);c.lineTo(m+n/2,v+t-B);c.moveTo(m+B,v+t/2);c.lineTo(m+n-B,v+t/2);c.end();c.stroke();mxRectangleShape.prototype.paintForeground.apply(this,arguments)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0),!1,null,m+n,v+.75*n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m+.5*n,v+(1-t)*n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,v+.75*n));return c};R.prototype.getConstraints=function(c,m,v){c=[];var n=Math.max(.01,Math.min(94,parseFloat(mxUtils.getValue(this.style,"isoAngle",this.isoAngle))))*Math.PI/200;n=Math.min(m*Math.tan(n),.5*v);c.push(new mxConnectionConstraint(new mxPoint(.5,0),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,n));c.push(new mxConnectionConstraint(new mxPoint(1, .5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m,v-n));c.push(new mxConnectionConstraint(new mxPoint(.5,1),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,v-n));c.push(new mxConnectionConstraint(new mxPoint(0,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,n));return c};ma.prototype.getConstraints=function(c,m,v){c=[];mxUtils.getValue(this.style,mxConstants.STYLE_ARCSIZE,mxConstants.LINE_ARCSIZE);var n=Math.max(0,Math.min(v,parseFloat(mxUtils.getValue(this.style,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.openLink=function(b,e,g){var p=window;try{if(b=Graph.sanitizeLink(b),null!=b)if("_self"==e&&window!=window.top)window.location.href=b;else if(b.substring(0,this.baseUrl.length)==this.baseUrl&&"#"==b.charAt(this.baseUrl.length)&&"_top"==e&&window==window.top){var y=b.split("#")[1];window.location.hash=="#"+y&&(window.location.hash="");window.location.hash=y}else p=window.open(b,null!=e?e:"_blank",g?null:"noopener,noreferrer"),null==p||g||(p.opener=null)}catch(q){}return p};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Ta,I,Ia),B.paintLeft(c,m,v,n,t,D,Ta,I,Ga),B.lineNWInner(c,m,v,n,t,D,Ta,I,na,Ga,Ha),B.paintLeftInner(c,m,v,n,t,D,ab,I,na,Ia,Ha),c.close(),c.fillAndStroke());c.begin();B.paintFolds(c,m,v,n,t,D,Ta,Xa,Ya,ab,I,Ga,Ja,Ia,Ha);c.stroke()};Na.prototype.moveNW=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.moveTo(0,0):c.moveTo(0,ha)};Na.prototype.moveNE=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.moveTo(n,0):c.moveTo(n-ha,0)};Na.prototype.moveSE=function(c,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxSelectionCellsHandler.prototype.getHandledSelectionCells=function(){function x(wa){Q.get(wa)||(Q.put(wa,!0),ea.push(wa))}for(var J=fa.apply(this,arguments),Q=new mxDictionary,Y=this.graph.model,ea=[],la=0;la<J.length;la++){var oa=J[la];this.graph.isTableCell(oa)?x(Y.getParent(Y.getParent(oa))):this.graph.isTableRow(oa)&&x(Y.getParent(oa));x(oa)}return ea};var ca=mxVertexHandler.prototype.isGhostPreview;mxVertexHandler.prototype.isGhostPreview=function(){return ca.apply(this,arguments)&&!this.graph.isTable(this.state.cell)&& !this.graph.isTableRow(this.state.cell)&&!this.graph.isTableCell(this.state.cell)&&!this.graph.isSwimlane(this.state.cell)};var ja=mxVertexHandler.prototype.createParentHighlightShape;mxVertexHandler.prototype.createParentHighlightShape=function(x){var J=ja.apply(this,arguments);J.stroke="#C0C0C0";J.strokewidth=1;return J};var ma=mxEdgeHandler.prototype.createParentHighlightShape;mxEdgeHandler.prototype.createParentHighlightShape=function(x){var J=ma.apply(this,arguments);J.stroke="#C0C0C0";J.strokewidth=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.editor.resolvedFontCss&&this.editor.addFontCss(d,this.editor.resolvedFontCss),this.editor.embedExtFonts(mxUtils.bind(this,function(k){try{null!=k&&this.editor.addFontCss(d,k),f(d)}catch(u){f(d)}}))}catch(k){f(d)}}))};EditorUi.prototype.exportImage=function(d,f,k,u,z,C,F,K,O,H,ka,fa,ca){O=null!=O?O:"png";if(this.spinner.spin(document.body,mxResources.get("exporting"))){var ja=this.editor.graph.isSelectionEmpty();k=null!=k?k:ja;null==this.thumbImageCache&&(this.thumbImageCache={});try{this.editor.exportToCanvas(mxUtils.bind(this, function(ma){this.spinner.stop();try{this.saveCanvas(ma,z?this.getFileData(!0,null,null,null,k,K):null,O,null==this.pages||0==this.pages.length,ka)}catch(aa){this.handleError(aa)}}),null,this.thumbImageCache,null,mxUtils.bind(this,function(ma){this.spinner.stop();this.handleError(ma)}),null,k,d||1,f,u,null,null,C,F,H,fa,ca)}catch(ma){this.spinner.stop(),this.handleError(ma)}}};EditorUi.prototype.isCorsEnabledForUrl=function(d){return this.editor.isCorsEnabledForUrl(d)};EditorUi.prototype.importXml=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
u?F:null,z),z.ignoreColor=!u,null!=K&&u&&(z.shadowVisible=K),this.editor.graph.model.execute(z))});d=new BackgroundImageDialog(this,d,f,k,u);this.showDialog(d.container,400,u?240:220,!0,!0);d.init()};EditorUi.prototype.showLibraryDialog=function(d,f,k,u,z){d=new LibraryDialog(this,d,f,k,u,z);this.showDialog(d.container,640,440,!0,!1,mxUtils.bind(this,function(C){C&&null==this.getCurrentFile()&&"1"!=urlParams.embed&&this.showSplash()}));d.init()};var g=EditorUi.prototype.createFormat;EditorUi.prototype.createFormat=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxUtils.bind(this,fa.prototype.curveTo);this.originalArcTo=this.canvas.arcTo;this.canvas.arcTo=mxUtils.bind(this,fa.prototype.arcTo)}function ca(){mxRectangleShape.call(this)}function ja(){mxRectangleShape.call(this)}function ma(){mxActor.call(this)}function aa(){mxActor.call(this)}function S(){mxActor.call(this)}function da(){mxRectangleShape.call(this)}function P(){mxRectangleShape.call(this)}function V(){mxCylinder.call(this)}function l(){mxShape.call(this)}function A(){mxShape.call(this)}function N(){mxEllipse.call(this)}
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
D&&"fold"==B)&&c.lineTo(I,t-ha-I):c.lineTo(0,t-I)};Na.prototype.moveSEInner=function(c,m,v,n,t,B,D,ha,I,va){va?"square"==D||"default"==D&&"square"==B?c.moveTo(n-I,t-I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.moveTo(n-I,t-ha-.5*I):("invRound"==D||"default"==D&&"invRound"==B||"fold"==D||"default"==D&&"fold"==B)&&c.moveTo(n-I,t-ha-I):c.moveTo(n-I,t)};Na.prototype.lineSEInner=function(c,m,v,n,t,B,D,ha,I,va){va?"square"==D||"default"==D&&"square"==B?c.lineTo(n-I, t-I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.lineTo(n-I,t-ha-.5*I):("invRound"==D||"default"==D&&"invRound"==B||"fold"==D||"default"==D&&"fold"==B)&&c.lineTo(n-I,t-ha-I):c.lineTo(n-I,t)};Na.prototype.moveNEInner=function(c,m,v,n,t,B,D,ha,I,va){va?"square"==D||"default"==D&&"square"==B||va?c.moveTo(n-I,I):"rounded"==D||"default"==D&&"rounded"==B||"snip"==D||"default"==D&&"snip"==B?c.moveTo(n-I,ha+.5*I):("invRound"==D||"default"==D&&"invRound"==B||"fold"==D||"default"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0)};Na.prototype.paintRight=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(n,t):c.lineTo(n,t-ha)};Na.prototype.paintLeft=function(c,m,v,n,t,B,D,ha,I){"square"==D||"default"==D&&"square"==B||!I?c.lineTo(0,0):c.lineTo(0,ha)};Na.prototype.paintSE=function(c,m,v,n,t,B,D,ha,I){if(I)if("rounded"==D||"default"==D&&"rounded"==B||"invRound"==D||"default"==D&&"invRound"==B){m=0;if("rounded"==D||"default"==D&&"rounded"==B)m=1;c.arcTo(ha,ha,0,0,m,n-ha,t)}else("snip"==D||"default"==
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.createVertexWipeAnimation=function(b,e){var g=new mxRectangle.fromRectangle(b.shape.bounds);return{execute:mxUtils.bind(this,function(p,y){null!=b.shape&&(y=p/y,e||(y=1-y),b.shape.bounds=new mxRectangle(g.x,g.y,g.width*y,g.height),b.shape.redraw(),0==p&&Graph.setOpacityForNodes(this.getNodesForCells([b.cell]),1),null!=b.text&&null!=b.text.node&&(b.text.node.style.opacity=y))}),stop:mxUtils.bind(this,function(){null!=b.shape&&(b.shape.bounds=g,b.shape.redraw(),null!=b.text&&null!=b.text.node&& (b.text.node.style.opacity=""),Graph.setOpacityForNodes(this.getNodesForCells([b.cell]),e?1:0))})}};Graph.prototype.executeAnimations=function(b,e,g,p){g=null!=g?g:30;p=null!=p?p:30;var y=null,q=0,E=mxUtils.bind(this,function(){if(q==g||this.stoppingCustomActions){window.clearInterval(y);for(var L=0;L<b.length;L++)b[L].stop();null!=e&&e()}else for(L=0;L<b.length;L++)b[L].execute(q,g);q++});y=window.setInterval(E,p);E()};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.getDefaultTranslate=function(b){var e=this.getPagePadding(),g=this.getPageSize();return new mxPoint(e.x-b.x*g.width,e.y-b.y*g.height)};Graph.prototype.updateMinimumSize=function(){var b=this.getPageLayout(),e=this.getPagePadding(),g=this.getPageSize(),p=Math.ceil(2*e.x+b.width*g.width);b=Math.ceil(2*e.y+b.height*g.height);if(null==this.minimumGraphSize||this.minimumGraphSize.width!=p||this.minimumGraphSize.height!=b)this.minimumGraphSize=new mxRectangle(0,0,p,b)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"...");z.value=d;O.updateCellSize(z);if(0<this.maxTextWidth&&z.geometry.width>this.maxTextWidth){var fa=O.getPreferredSizeForCell(z,this.maxTextWidth);z.geometry.width=fa.width;z.geometry.height=fa.height}Graph.isLink(z.value)&&O.setLinkForCell(z,z.value);z.geometry.width+=O.gridSize;z.geometry.height+=O.gridSize}finally{O.getModel().endUpdate()}return[z]}}return[]};EditorUi.prototype.formatFileSize=function(d){var f=-1;do d/=1024,f++;while(1024<d);return Math.max(d,.1).toFixed(1)+" kB; MB; GB; TB;PB;EB;ZB;YB".split(";")[f]};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"0"))return mxCellEditorGetCurrentValue.apply(this,arguments);var J=Graph.sanitizeHtml(this.textarea.innerHTML,!0);return J="1"==mxUtils.getValue(x.style,"nl2Br","1")?J.replace(/\r\n/g,"<br/>").replace(/\n/g,"<br/>"):J.replace(/\r\n/g,"").replace(/\n/g,"")};var O=mxCellEditor.prototype.stopEditing;mxCellEditor.prototype.stopEditing=function(x){this.codeViewMode&&this.toggleViewMode();O.apply(this,arguments);this.focusContainer()};mxCellEditor.prototype.focusContainer=function(){try{this.graph.container.focus()}catch(x){}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
loader:{load:["html"==urlParams["math-output"]?"output/chtml":"output/svg","input/tex","input/asciimath","ui/safe"]},startup:{pageReady:function(){for(var ba=0;ba<Editor.mathJaxQueue.length;ba++)Editor.doMathJaxRender(Editor.mathJaxQueue[ba])}}};Editor.MathJaxRender=function(ba){"undefined"!==typeof MathJax&&"function"===typeof MathJax.typeset?Editor.doMathJaxRender(ba):Editor.mathJaxQueue.push(ba)};Editor.onMathJaxDone=function(){};var U=Editor.prototype.init;Editor.prototype.init=function(){U.apply(this, arguments);var ba=mxUtils.bind(this,function(ia,qa){null!=this.graph.container&&this.graph.mathEnabled&&Editor.MathJaxRender(this.graph.container)});this.graph.model.addListener(mxEvent.CHANGE,ba);this.graph.addListener(mxEvent.REFRESH,ba)};A=document.getElementsByTagName("script");if(null!=A&&0<A.length){var Z=document.createElement("script");Z.setAttribute("type","text/javascript");Z.setAttribute("src",l);A[0].parentNode.appendChild(Z)}}};Editor.prototype.csvToArray=function(l){if(0<l.length){var A=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.readGraphModelFromClipboard=function(b){this.readGraphModelFromClipboardWithType(mxUtils.bind(this,function(e){null!=e?b(e):this.readGraphModelFromClipboardWithType(mxUtils.bind(this,function(g){if(null!=g){var p=decodeURIComponent(g);this.isCompatibleString(p)&&(g=p)}b(g)}),"text")}),"html")};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
F.target.result?d(C):(C.push(F.target.result.value),F.target.result.continue())};z.onerror=f}catch(F){null!=f&&f(F)}}),f)};EditorUi.prototype.getDatabaseItemKeys=function(d,f,k){this.openDatabase(mxUtils.bind(this,function(u){try{k=k||"objects";var z=u.transaction([k],"readonly").objectStore(k).getAllKeys();z.onsuccess=function(){d(z.result)};z.onerror=f}catch(C){null!=f&&f(C)}}),f)};EditorUi.prototype.commentsSupported=function(){var d=this.getCurrentFile();return null!=d?d.commentsSupported():!1};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
K=F.getChildren(F.root);for(z=0;z<K.length;z++){var O=K[z];F.setVisible(O,f[O.id]||!1)}}catch(H){}};EditorUi.prototype.getBaseFilename=function(d){var f=this.getCurrentFile();f=null!=f&&null!=f.getTitle()?f.getTitle():this.defaultFilename;if(/(\.xml)$/i.test(f)||/(\.html)$/i.test(f)||/(\.svg)$/i.test(f)||/(\.png)$/i.test(f))f=f.substring(0,f.lastIndexOf("."));/(\.drawio)$/i.test(f)&&(f=f.substring(0,f.lastIndexOf(".")));!d&&null!=this.pages&&1<this.pages.length&&null!=this.currentPage&&null!=this.currentPage.node.getAttribute("name")&& 0<this.currentPage.getName().length&&(f=f+"-"+this.currentPage.getName());return f};EditorUi.prototype.downloadFile=function(d,f,k,u,z,C,F,K,O,H,ka,fa){try{u=null!=u?u:this.editor.graph.isSelectionEmpty();var ca=this.getBaseFilename("remoteSvg"==d?!1:!z),ja=ca+("xml"==d||"pdf"==d&&ka?".drawio":"")+"."+d;if("xml"==d){var ma=Graph.xmlDeclaration+"\n"+this.getFileData(!0,null,null,null,u,z,null,null,null,f);this.saveData(ja,d,ma,"text/xml")}else if("html"==d)ma=this.getHtml2(this.getFileData(!0),this.editor.graph,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0;G.prototype.paintVertexShape=function(c,m,v,n,t){var B=Math.max(0,Math.min(n,Math.min(t,parseFloat(mxUtils.getValue(this.style,"size",this.size))))),D=Math.max(-1,Math.min(1,parseFloat(mxUtils.getValue(this.style,"darkOpacity",this.darkOpacity))));c.translate(m,v);c.begin();c.moveTo(0,0);c.lineTo(n-B,0);c.lineTo(n,B);c.lineTo(n,t);c.lineTo(0,t);c.lineTo(0,0);c.close();c.end();c.fillAndStroke();this.outline||(c.setShadow(!1),0!=D&&(c.setFillAlpha(Math.abs(D)),c.setFillColor(0>D?"#FFFFFF":"#000000"), c.begin(),c.moveTo(n-B,0),c.lineTo(n-B,B),c.lineTo(n,B),c.close(),c.fill()),c.begin(),c.moveTo(n-B,0),c.lineTo(n-B,B),c.lineTo(n,B),c.end(),c.stroke())};mxCellRenderer.registerShape("note",G);mxUtils.extend(M,G);mxCellRenderer.registerShape("note2",M);M.prototype.getLabelMargins=function(c){if(mxUtils.getValue(this.style,"boundedLbl",!1)){var m=mxUtils.getValue(this.style,"size",15);return new mxRectangle(0,Math.min(c.height*this.scale,m*this.scale),0,0)}return null};mxUtils.extend(R,mxShape);R.prototype.isoAngle=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
DrawioFile.prototype.redirectToNewApp=function(b,e){this.ui.spinner.stop();if(!this.redirectDialogShowing){this.redirectDialogShowing=!0;var g=window.location.protocol+"//"+window.location.host+"/"+this.ui.getSearch("create title mode url drive splash state".split(" "))+"#"+this.getHash(),p=mxResources.get("redirectToNewApp");null!=e&&(p+=" ("+e+")");e=mxUtils.bind(this,function(){var y=mxUtils.bind(this,function(){this.redirectDialogShowing=!1;window.location.href==g?window.location.reload():window.location.href= g});null==b&&this.isModified()?this.ui.confirm(mxResources.get("allChangesLost"),mxUtils.bind(this,function(){this.redirectDialogShowing=!1}),y,mxResources.get("cancel"),mxResources.get("discardChanges")):y()});null!=b?this.isModified()?this.ui.confirm(p,mxUtils.bind(this,function(){this.redirectDialogShowing=!1;b()}),e,mxResources.get("cancel"),mxResources.get("discardChanges")):this.ui.confirm(p,e,mxUtils.bind(this,function(){this.redirectDialogShowing=!1;b()})):this.ui.alert(mxResources.get("redirectToNewApp"), e)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.updateGraphXml(Editor.parseDiagramNode(this.diagrams[this.currentPage])))};this.selectPageById=function(k){k=this.getIndexById(k);var u=0<=k;u&&this.selectPage(k);return u};G=mxUtils.bind(this,function(){if(null==this.xmlNode||"mxfile"!=this.xmlNode.nodeName)this.diagrams=[];this.xmlNode!=R&&(this.diagrams=this.xmlNode.getElementsByTagName("diagram"),R=this.xmlNode)});var W=this.graph.setBackgroundImage;this.graph.setBackgroundImage=function(k){if(null!=k&&Graph.isPageLink(k.src)){var u=k.src, z=u.indexOf(",");0<z&&(z=L.getIndexById(u.substring(z+1)),0<=z&&(k=L.getImageForGraphModel(Editor.parseDiagramNode(L.diagrams[z])),k.originalSrc=u))}W.apply(this,arguments)};var d=this.graph.getGraphBounds;this.graph.getGraphBounds=function(k){var u=d.apply(this,arguments);k=this.backgroundImage;if(null!=k){var z=this.view.translate,C=this.view.scale;u=mxRectangle.fromRectangle(u);u.add(new mxRectangle((z.x+k.x)*C,(z.y+k.y)*C,k.width*C,k.height*C))}return u};this.addListener("xmlNodeChanged",G);G();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.getSwimlaneAt=function(b,e,g){var p=mxGraph.prototype.getSwimlaneAt.apply(this,arguments);this.isCellLocked(p)&&(p=null);return p};Graph.prototype.isCellFoldable=function(b){var e=this.getCurrentCellStyle(b);return this.foldingEnabled&&"0"!=mxUtils.getValue(e,mxConstants.STYLE_RESIZABLE,"1")&&("1"==e.treeFolding||!this.isCellLocked(b)&&(this.isContainer(b)&&"0"!=e.collapsible||!this.isContainer(b)&&"1"==e.collapsible))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.updateCssForMarker=function(b,e,g,p,y){b.style.display="inline-flex";b.style.alignItems="center";b.style.justifyContent="center";b.innerText="";"flexArrow"==g?b.className=null!=p&&p!=mxConstants.NONE?"geSprite geSprite-"+e+"blocktrans":"geSprite geSprite-noarrow":(g=this.getImageForMarker(p,y),null!=g?(p=document.createElement("img"),p.className="geAdaptiveAsset",p.setAttribute("src",g),b.className="","end"==e&&mxUtils.setPrefixedStyle(p.style,"transform","scaleX(-1)"),b.appendChild(p)): (b.className="geSprite geSprite-noarrow",b.innerHTML=mxUtils.htmlEntities(mxResources.get("none")),b.style.backgroundImage="none",b.style.fontSize="11px",b.style.filter="none"))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(n+=parseFloat(m.style.backboneSize)*m.view.scale/2-1);if("south"==m.style[mxConstants.STYLE_DIRECTION]||"north"==m.style[mxConstants.STYLE_DIRECTION])return v.x<c.getCenterX()&&(n=-1*(n+1)),new mxPoint(c.getCenterX()+n,Math.min(c.y+c.height,Math.max(c.y,v.y)));v.y<c.getCenterY()&&(n=-1*(n+1));return new mxPoint(Math.min(c.x+c.width,Math.max(c.x,v.x)),c.getCenterY()+n)};mxStyleRegistry.putValue("backbonePerimeter",mxPerimeter.BackbonePerimeter);mxPerimeter.CalloutPerimeter=function(c,m,v,n){return mxPerimeter.RectanglePerimeter(mxUtils.getDirectedBounds(c, new mxRectangle(0,0,0,Math.max(0,Math.min(c.height,parseFloat(mxUtils.getValue(m.style,"size",ma.prototype.size))*m.view.scale))),m.style),m,v,n)};mxStyleRegistry.putValue("calloutPerimeter",mxPerimeter.CalloutPerimeter);mxPerimeter.ParallelogramPerimeter=function(c,m,v,n){var t="0"!=mxUtils.getValue(m.style,"fixedSize","0"),B=t?K.prototype.fixedSize:K.prototype.size;null!=m&&(B=mxUtils.getValue(m.style,"size",B));t&&(B*=m.view.scale);var D=c.x,ha=c.y,I=c.width,va=c.height;m=null!=m?mxUtils.getValue(m.style,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Math.max(K/z,O/z);if(1<H){var ka=Math.round(K/H),fa=Math.round(O/H),ca=document.createElement("canvas");ca.width=ka;ca.height=fa;ca.getContext("2d").drawImage(d,0,0,ka,fa);var ja=ca.toDataURL();if(ja.length<f.length){var ma=document.createElement("canvas");ma.width=ka;ma.height=fa;var aa=ma.toDataURL();ja!==aa&&(f=ja,K=ka,O=fa)}}}catch(S){}k(f,K,O)};EditorUi.prototype.extractGraphModelFromPng=function(d){return Editor.extractGraphModelFromPng(d)};EditorUi.prototype.loadImage=function(d,f,k){try{var u=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.arrayBufferIndexOfString=function(b,e,g){var p=e.charCodeAt(0),y=1,q=-1;for(g=g||0;g<b.byteLength;g++)if(b[g]==p){q=g;break}for(g=q+1;-1<q&&g<b.byteLength&&g<q+e.length-1;g++){if(b[g]!=e.charCodeAt(y))return Graph.arrayBufferIndexOfString(b,e,q+1);y++}return y==e.length-1?q:-1};Graph.compress=function(b,e){if(null==b||0==b.length||"undefined"===typeof pako)return b;b=e?pako.deflate(encodeURIComponent(b)):pako.deflateRaw(encodeURIComponent(b));return btoa(Graph.arrayBufferToString(new Uint8Array(b)))};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(new mxXmlRequest(SAVE_URL,"format="+R+"&xml="+encodeURIComponent(G)+"&filename="+encodeURIComponent(b)+(q?"&binary=1":""))).simulate(document,"_blank")}else this.ui.handleError({message:mxResources.get("drawingTooLarge")},mxResources.get("error"),mxUtils.bind(this,function(){mxUtils.popup(G)}));L()}});q?(e=this.ui.getPngFileProperties(this.ui.fileNode),this.ui.getEmbeddedPng(mxUtils.bind(this,function(G){T(G)}),p,this.ui.getCurrentFile()!=this?E:null,e.scale,e.border)):T(E)};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.parsePng=function(b,e,g){function p(L,T){var G=q;q+=T;return L.substring(G,q)}function y(L){L=p(L,4);return L.charCodeAt(3)+(L.charCodeAt(2)<<8)+(L.charCodeAt(1)<<16)+(L.charCodeAt(0)<<24)}var q=0;if(p(b,8)!=String.fromCharCode(137)+"PNG"+String.fromCharCode(13,10,26,10))null!=g&&g();else if(p(b,4),"IHDR"!=p(b,4))null!=g&&g();else{p(b,17);do{g=y(b);var E=p(b,4);if(null!=e&&e(q-8,E,g))break;value=p(b,g);p(b,4);if("IEND"==E)break}while(g)}};mxUtils.extend(EditorUi,mxEventSource);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.outerStroke&&(c.ellipse(m,v,n,t),c.stroke())};mxCellRenderer.registerShape("endState",za);mxUtils.extend(Ma,za);Ma.prototype.outerStroke=!1;mxCellRenderer.registerShape("startState",Ma);mxUtils.extend(Qa,mxArrowConnector);Qa.prototype.defaultWidth=4;Qa.prototype.isOpenEnded=function(){return!0};Qa.prototype.getEdgeWidth=function(){return mxUtils.getNumber(this.style,"width",this.defaultWidth)+Math.max(0,this.strokewidth-1)};Qa.prototype.isArrowRounded=function(){return this.isRounded};mxCellRenderer.registerShape("link",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(S="1"==f.getCurrentCellStyle(aa).treeMoving);return S}function q(aa){var S=!1;null!=aa&&(aa=k.getParent(aa),S=f.view.getState(aa),S="tree"==(null!=S?S.style:f.getCellStyle(aa)).containerType);return S}function E(aa){var S=!1;null!=aa&&(aa=k.getParent(aa),S=f.view.getState(aa),f.view.getState(aa),S=null!=(null!=S?S.style:f.getCellStyle(aa)).childLayout);return S}function L(aa){aa=f.view.getState(aa);if(null!=aa){var S=f.getIncomingTreeEdges(aa.cell);if(0<S.length&&(S=f.view.getState(S[0]),null!=S&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
[];this.traverse(y,!0,mxUtils.bind(this,function(L,T){var G=null!=T&&this.isTreeEdge(T);G&&q.push(T);L==y||null!=T&&!G||q.push(L);return(null==T||G)&&(L==y||!this.model.isCollapsed(L))}));this.model.setCollapsed(y,p);for(var E=0;E<q.length;E++)this.model.setVisible(q[E],!p)}finally{this.model.endUpdate()}};Graph.prototype.isTreeEdge=function(p){return!this.isEdgeIgnored(p)};Graph.prototype.getTreeEdges=function(p,y,q,E,L,T){return this.model.filterCells(this.getEdges(p,y,q,E,L,T),mxUtils.bind(this, function(G){return this.isTreeEdge(G)}))};Graph.prototype.getIncomingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!0,!1,!1)};Graph.prototype.getOutgoingTreeEdges=function(p,y){return this.getTreeEdges(p,y,!1,!0,!1)};var e=EditorUi.prototype.init;EditorUi.prototype.init=function(){e.apply(this,arguments);this.editor.isChromelessView()&&!this.editor.editable||this.addTrees()};EditorUi.prototype.addTrees=function(){function p(aa){return k.isVertex(aa)&&q(aa)}function y(aa){var S=!1;null!=aa&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
1),!1),new mxConnectionConstraint(new mxPoint(.25,.5),!1),new mxConnectionConstraint(new mxPoint(.5,.5),!1),new mxConnectionConstraint(new mxPoint(.75,.5),!1),new mxConnectionConstraint(new mxPoint(1,0),!1),new mxConnectionConstraint(new mxPoint(1,.5),!1),new mxConnectionConstraint(new mxPoint(1,1),!1)];Wa.prototype.getConstraints=function(c,m,v){c=[];var n=v*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"arrowWidth",this.arrowWidth)))),t=m*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style, "arrowSize",this.arrowSize))));n=(v-n)/2;c.push(new mxConnectionConstraint(new mxPoint(0,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,0,n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m-t),n));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m-t,0));c.push(new mxConnectionConstraint(new mxPoint(1,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,m-t,v));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*(m-t),v-n));c.push(new mxConnectionConstraint(new mxPoint(0, 0),!1,null,0,v-n));return c};La.prototype.getConstraints=function(c,m,v){c=[];var n=v*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"arrowWidth",Wa.prototype.arrowWidth)))),t=m*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"arrowSize",Wa.prototype.arrowSize))));n=(v-n)/2;c.push(new mxConnectionConstraint(new mxPoint(0,.5),!1));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,t,0));c.push(new mxConnectionConstraint(new mxPoint(0,0),!1,null,.5*m,n));c.push(new mxConnectionConstraint(new mxPoint(0,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
y.cellEditor.stopEditing=function(P,V){try{ma.apply(this,arguments),ca()}catch(l){p.handleError(l)}};y.container.setAttribute("tabindex","0");y.container.style.cursor="default";if(window.self===window.top&&null!=y.container.parentNode)try{y.container.focus()}catch(P){}var aa=y.fireMouseEvent;y.fireMouseEvent=function(P,V,l){try{P==mxEvent.MOUSE_DOWN&&this.container.focus(),aa.apply(this,arguments)}catch(A){p.handleError(A)}};var S=y.foldCells;y.foldCells=function(P,V,l,A,N){try{S.apply(this,arguments)}catch(X){p.handleError(X)}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
la.getChildren(wa[0]);null!=ua&&(x=this.moveCells(ua,J,Q,!1,this.getDefaultParent()),oa[la.getChildAt(la.root,0).getId()]=this.getDefaultParent().getId())}if(null!=x&&(this.createCellMapping(ea,sa,oa),this.updateCustomLinks(oa,x),Y)){this.isGridEnabled()&&(J=this.snap(J),Q=this.snap(Q));var Fa=this.getBoundingBoxFromGeometry(x,!0);null!=Fa&&this.moveCells(x,J-Fa.x,Q-Fa.y)}}finally{this.model.endUpdate()}}return x};Graph.prototype.encodeCells=function(x){for(var J={},Q=this.cloneCells(x,null,J),Y= new mxDictionary,ea=0;ea<x.length;ea++)Y.put(x[ea],!0);var la=new mxCodec,oa=new mxGraphModel,wa=oa.getChildAt(oa.getRoot(),0);for(ea=0;ea<Q.length;ea++){oa.add(wa,Q[ea]);var sa=this.view.getState(x[ea]);if(null!=sa){var ua=this.getCellGeometry(Q[ea]);null!=ua&&ua.relative&&!this.model.isEdge(x[ea])&&null==Y.get(this.model.getParent(x[ea]))&&(ua.offset=null,ua.relative=!1,ua.x=sa.x/sa.view.scale-sa.view.translate.x,ua.y=sa.y/sa.view.scale-sa.view.translate.y)}}this.updateCustomLinks(this.createCellMapping(J, this.createCellLookup(x)),Q);return la.encode(oa)};Graph.prototype.isSwimlane=function(x,J){var Q=null;null==x||this.model.isEdge(x)||this.model.getParent(x)==this.model.getRoot()||(Q=this.getCurrentCellStyle(x,J)[mxConstants.STYLE_SHAPE]);return Q==mxConstants.SHAPE_SWIMLANE||"table"==Q||"tableRow"==Q};var L=Graph.prototype.isCellEditable;Graph.prototype.isCellEditable=function(x){return null!=x&&L.apply(this,arguments)?this.isTableCell(x)||this.isTableRow(x)?this.isCellEditable(this.model.getParent(x)):
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.setTableRowHeight=function(b,e,g){g=null!=g?g:!0;var p=this.getModel();p.beginUpdate();try{var y=this.getCellGeometry(b);if(null!=y){y=y.clone();y.height+=e;p.setGeometry(b,y);var q=p.getParent(b),E=p.getChildCells(q,!0);if(!g){var L=mxUtils.indexOf(E,b);if(L<E.length-1){var T=E[L+1],G=this.getCellGeometry(T);null!=G&&(G=G.clone(),G.y+=e,G.height-=e,p.setGeometry(T,G))}}var M=this.getCellGeometry(q);null!=M&&(g||(g=b==E[E.length-1]),g&&(M=M.clone(),M.height+=e,p.setGeometry(q,M)))}}finally{p.endUpdate()}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
k():u(100);mxEvent.consume(A)}));mxEvent.addListener(this.chromelessToolbar,"mouseleave",mxUtils.bind(this,function(A){mxEvent.isTouchEvent(A)||u(30)}));var O=b.getTolerance();b.addMouseListener({startX:0,startY:0,scrollLeft:0,scrollTop:0,mouseDown:function(A,N){this.startX=N.getGraphX();this.startY=N.getGraphY();this.scrollLeft=b.container.scrollLeft;this.scrollTop=b.container.scrollTop},mouseMove:function(A,N){},mouseUp:function(A,N){mxEvent.isTouchEvent(N.getEvent())&&Math.abs(this.scrollLeft- b.container.scrollLeft)<O&&Math.abs(this.scrollTop-b.container.scrollTop)<O&&Math.abs(this.startX-N.getGraphX())<O&&Math.abs(this.startY-N.getGraphY())<O&&(0<parseFloat(g.chromelessToolbar.style.opacity||0)?k():u(30))}})}this.editor.editable||this.addChromelessClickHandler()}else if(this.editor.extendCanvas){var H=b.view.validate,ka=new mxPoint,fa=null;b.view.validate=function(){if(null!=b.container&&mxUtils.hasScrollbars(b.container)){if(null!=g.currentPage&&fa!=g.currentPage){fa=g.currentPage;var A=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
FilenameDialog.createTypeHint=function(b,e,g){var p=document.createElement("img");p.style.backgroundPosition="center bottom";p.style.backgroundRepeat="no-repeat";p.style.margin="2px 0 0 4px";p.style.verticalAlign="top";p.style.cursor="pointer";p.style.height="16px";p.style.width="16px";mxUtils.setOpacity(p,70);var y=function(){p.setAttribute("src",Editor.helpImage);p.setAttribute("title",mxResources.get("help"));for(var q=0;q<g.length;q++)if(0<g[q].ext.length&&e.value.toLowerCase().substring(e.value.length- g[q].ext.length-1)=="."+g[q].ext){p.setAttribute("title",mxResources.get(g[q].title));break}};mxEvent.addListener(e,"keyup",y);mxEvent.addListener(e,"change",y);mxEvent.addListener(p,"click",function(q){var E=p.getAttribute("title");p.getAttribute("src")==Editor.helpImage?b.editor.graph.openLink(FilenameDialog.filenameHelpLink):""!=E&&b.showError(null,E,mxResources.get("help"),function(){b.editor.graph.openLink(FilenameDialog.filenameHelpLink)},null,mxResources.get("ok"),null,null,null,340,90);mxEvent.consume(q)}); y();return p};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.graph.setTooltips(0!=this.graphConfig.tooltips);this.graph.initialViewState={translate:this.graph.view.translate.clone(),scale:this.graph.view.scale};null!=G&&this.setLayersVisible(G);this.graph.customLinkClicked=function(k){try{if(Graph.isPageLink(k)){var u=k.indexOf(",");L.selectPageById(k.substring(u+1))||alert(mxResources.get("pageNotFound")||"Page not found")}else this.handleCustomLink(k)}catch(z){alert(z.message)}return!0};var f=this.graph.foldTreeCell;this.graph.foldTreeCell=mxUtils.bind(this, function(){this.treeCellFolded=!0;return f.apply(this.graph,arguments)});this.fireEvent(new mxEventObject("render"))});g=window.MutationObserver||window.WebKitMutationObserver||window.MozMutationObserver;if(this.checkVisibleState&&0==b.offsetWidth&&"undefined"!==typeof g){var y=this.getObservableParent(b),q=new g(mxUtils.bind(this,function(E){0<b.offsetWidth&&(q.disconnect(),p())}));q.observe(y,{attributes:!0})}else p()}};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
mxPerimeter.HexagonPerimeter2=function(c,m,v,n){var t="0"!=mxUtils.getValue(m.style,"fixedSize","0"),B=t?S.prototype.fixedSize:S.prototype.size;null!=m&&(B=mxUtils.getValue(m.style,"size",B));t&&(B*=m.view.scale);var D=c.x,ha=c.y,I=c.width,va=c.height,na=c.getCenterX();c=c.getCenterY();m=null!=m?mxUtils.getValue(m.style,mxConstants.STYLE_DIRECTION,mxConstants.DIRECTION_EAST):mxConstants.DIRECTION_EAST;m==mxConstants.DIRECTION_NORTH||m==mxConstants.DIRECTION_SOUTH?(t=t?Math.max(0,Math.min(va,B)):va* Math.max(0,Math.min(1,B)),ha=[new mxPoint(na,ha),new mxPoint(D+I,ha+t),new mxPoint(D+I,ha+va-t),new mxPoint(na,ha+va),new mxPoint(D,ha+va-t),new mxPoint(D,ha+t),new mxPoint(na,ha)]):(t=t?Math.max(0,Math.min(I,B)):I*Math.max(0,Math.min(1,B)),ha=[new mxPoint(D+t,ha),new mxPoint(D+I-t,ha),new mxPoint(D+I,c),new mxPoint(D+I-t,ha+va),new mxPoint(D+t,ha+va),new mxPoint(D,c),new mxPoint(D+t,ha)]);na=new mxPoint(na,c);n&&(v.x<D||v.x>D+I?na.y=v.y:na.x=v.x);return mxUtils.getPerimeterPoint(ha,na,v)};mxStyleRegistry.putValue("hexagonPerimeter2",
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
La);mxUtils.extend($a,mxActor);$a.prototype.size=.1;$a.prototype.fixedSize=20;$a.prototype.redrawPath=function(c,m,v,n,t){m="0"!=mxUtils.getValue(this.style,"fixedSize","0")?Math.max(0,Math.min(n,parseFloat(mxUtils.getValue(this.style,"size",this.fixedSize)))):n*Math.max(0,Math.min(1,parseFloat(mxUtils.getValue(this.style,"size",this.size))));c.moveTo(m,0);c.lineTo(n,0);c.quadTo(n-2*m,t/2,n,t);c.lineTo(m,t);c.quadTo(m-2*m,t/2,m,0);c.close();c.end()};mxCellRenderer.registerShape("dataStorage",$a);
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
null!=A&&0<A.length&&(A=l[A[1]],null!=A&&(A=/.* \/Subject (\d+) (\d+) R/g.exec(A.join("\n")),null!=A&&0<A.length&&(l=l[A[1]],null!=l&&(l=l.join("\n"),N=l.substring(1,l.length-1))))));return N};Editor.extractParserError=function(l,A){var N=null;l=null!=l?l.getElementsByTagName("parsererror"):null;null!=l&&0<l.length&&(N=A||mxResources.get("invalidChars"),A=l[0].getElementsByTagName("div"),0<A.length&&(N=mxUtils.getTextContent(A[0])));return null!=N?mxUtils.trim(N):N};Editor.addRetryToError=function(l,
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
this.scrollHandler=null);if(null!=this.destroyFunctions){for(b=0;b<this.destroyFunctions.length;b++)this.destroyFunctions[b]();this.destroyFunctions=null}var e=[this.menubarContainer,this.toolbarContainer,this.sidebarContainer,this.formatContainer,this.diagramContainer,this.footerContainer,this.chromelessToolbar,this.hsplit,this.layersDialog];for(b=0;b<e.length;b++)null!=e[b]&&null!=e[b].parentNode&&e[b].parentNode.removeChild(e[b])};(function(){var b=[["nbsp","160"],["shy","173"]],e=mxUtils.parseXml;mxUtils.parseXml=function(g){for(var p=0;p<b.length;p++)g=g.replace(new RegExp("&"+b[p][0]+";","g"),"&#"+b[p][1]+";");return e(g)}})();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
0,c.width-parseFloat(mxUtils.getValue(this.style,"width",this.width)*this.scale),c.height-parseFloat(mxUtils.getValue(this.style,"height",this.height)*this.scale))};ba.prototype.paintBackground=function(c,m,v,n,t){var B=this.corner,D=Math.min(n,Math.max(B,parseFloat(mxUtils.getValue(this.style,"width",this.width)))),ha=Math.min(t,Math.max(1.5*B,parseFloat(mxUtils.getValue(this.style,"height",this.height)))),I=mxUtils.getValue(this.style,mxConstants.STYLE_SWIMLANE_FILLCOLOR,mxConstants.NONE);I!=mxConstants.NONE&& (c.setFillColor(I),c.rect(m,v,n,t),c.fill());null!=this.fill&&this.fill!=mxConstants.NONE&&this.gradient&&this.gradient!=mxConstants.NONE?(this.getGradientBounds(c,m,v,n,t),c.setGradient(this.fill,this.gradient,m,v,n,t,this.gradientDirection)):c.setFillColor(this.fill);c.pointerEvents=!0;c.begin();c.moveTo(m,v);c.lineTo(m+D,v);c.lineTo(m+D,v+Math.max(0,ha-1.5*B));c.lineTo(m+Math.max(0,D-B),v+ha);c.lineTo(m,v+ha);c.close();c.fillAndStroke();this.configurePointerEvents(c);c.begin();c.moveTo(m+D,v); c.lineTo(m+n,v);c.lineTo(m+n,v+t);c.lineTo(m,v+t);c.lineTo(m,v+ha);c.stroke()};mxCellRenderer.registerShape("umlFrame",ba);mxPerimeter.CenterPerimeter=function(c,m,v,n){return new mxPoint(c.getCenterX(),c.getCenterY())};mxStyleRegistry.putValue("centerPerimeter",mxPerimeter.CenterPerimeter);mxPerimeter.LifelinePerimeter=function(c,m,v,n){n=Z.prototype.size;null!=m&&(n=mxUtils.getValue(m.style,"size",n)*m.view.scale);m=parseFloat(m.style[mxConstants.STYLE_STROKEWIDTH]||1)*m.view.scale/2-1;v.x<c.getCenterX()&&
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
!0,"1"==urlParams.dev?mxscript("js/orgchart/bridge.min.js",function(){mxscript("js/orgchart/bridge.collections.min.js",function(){mxscript("js/orgchart/OrgChart.Layout.min.js",function(){mxscript("js/orgchart/mxOrgChartLayout.js",k,null,null,null,u)},null,null,null,u)},null,null,null,u)},null,null,null,u):mxscript(DRAWIO_BASE_URL+"/js/orgchart.min.js",k,null,null,null,u))}),onerror)};EditorUi.prototype.importCsv=function(d,f){this.loadOrgChartLayouts(mxUtils.bind(this,function(){this.doImportCsv(d, f)}))};EditorUi.prototype.doImportCsv=function(d,f){try{var k=d.split("\n"),u=[],z=[],C=[],F={};if(0<k.length){var K={},O=this.editor.graph,H=null,ka=null,fa=null,ca=null,ja=null,ma=null,aa=null,S="whiteSpace=wrap;html=1;",da=null,P=null,V="",l="auto",A="auto",N=!1,X=null,U=null,Z=40,ba=40,ia=100,qa=0,ra=mxUtils.bind(this,function(){null!=f?f(sa):(O.setSelectionCells(sa),O.scrollCellToVisible(O.getSelectionCell()));null!=this.chromelessResize&&window.setTimeout(mxUtils.bind(this,function(){this.chromelessResize(!0)}),
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(function(){var b=window.requestAnimationFrame||window.mozRequestAnimationFrame||window.webkitRequestAnimationFrame||function(g){return window.setTimeout(g,20)},e=function(g,p){function y(){this.q=[];this.add=function(k){this.q.push(k)};var d,f;this.call=function(){d=0;for(f=this.q.length;d<f;d++)this.q[d].call()}}function q(d,f){return d.currentStyle?d.currentStyle[f]:window.getComputedStyle?window.getComputedStyle(d,null).getPropertyValue(f):d.style[f]}function E(d,f){if(!d.resizedAttached)d.resizedAttached=
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
EditorUi.prototype.showPageLinkDialog=function(b){var e=this.editor.graph;this.showPublishLinkDialog(mxResources.get("url"),!0,null,null,mxUtils.bind(this,function(g,p,y,q,E,L){g=this.createUrlParameters(g,p,y,q,E,L);y||g.push("hide-pages=1");e.isSelectionEmpty()||(y=e.getBoundingBox(e.getSelectionCells()),p=e.view.translate,E=e.view.scale,y.width/=E,y.height/=E,y.x=y.x/E-p.x,y.y=y.y/E-p.y,g.push("viewbox="+encodeURIComponent(JSON.stringify({x:Math.round(y.x),y:Math.round(y.y),width:Math.round(y.width), height:Math.round(y.height),border:100}))));q=new EmbedDialog(this,this.getLinkForPage(b,g,q));this.showDialog(q.container,450,240,!0,!0);q.init()}))};(function(){mxCodecRegistry.getCodec(ChangePageSetup).exclude.push("page")})();(function(){var b=new mxObjectCodec(new MovePage,["ui"]);b.beforeDecode=function(e,g,p){p.ui=e.ui;return g};b.afterDecode=function(e,g,p){e=p.oldIndex;p.oldIndex=p.newIndex;p.newIndex=e;return p};mxCodecRegistry.register(b)})();
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
Graph.prototype.getNodesForCells=function(b){for(var e=[],g=0;g<b.length;g++){var p=this.view.getState(b[g]);if(null!=p){for(var y=this.cellRenderer.getShapesForState(p),q=0;q<y.length;q++)null!=y[q]&&null!=y[q].node&&e.push(y[q].node);null!=p.control&&null!=p.control.node&&e.push(p.control.node)}}return e};
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(function(){var b=new mxObjectCodec(new ChangeGridColor,["ui"]);b.beforeDecode=function(e,f,c){c.ui=e.ui;return f};mxCodecRegistry.register(b)})();(function(){EditorUi.VERSION="21.4.1";EditorUi.compactUi="atlas"!=Editor.currentTheme;Editor.isDarkMode()&&(mxGraphView.prototype.gridColor=mxGraphView.prototype.defaultDarkGridColor);EditorUi.enableLogging="1"!=urlParams.stealth&&"1"!=urlParams.lockdown&&(/.*\.draw\.io$/.test(window.location.hostname)||/.*\.diagrams\.net$/.test(window.location.hostname))&&"support.draw.io"!=window.location.hostname;EditorUi.drawHost=window.DRAWIO_BASE_URL;EditorUi.lightboxHost=window.DRAWIO_LIGHTBOX_URL;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
(function(){var b=new mxObjectCodec(new ChangeGridColor,["ui"]);b.beforeDecode=function(f,l,d){d.ui=f.ui;return l};mxCodecRegistry.register(b)})();(function(){EditorUi.VERSION="21.4.1";EditorUi.compactUi="atlas"!=Editor.currentTheme;Editor.isDarkMode()&&(mxGraphView.prototype.gridColor=mxGraphView.prototype.defaultDarkGridColor);EditorUi.enableLogging="1"!=urlParams.stealth&&"1"!=urlParams.lockdown&&(/.*\.draw\.io$/.test(window.location.hostname)||/.*\.diagrams\.net$/.test(window.location.hostname))&&"support.draw.io"!=window.location.hostname;EditorUi.drawHost=window.DRAWIO_BASE_URL;EditorUi.lightboxHost=window.DRAWIO_LIGHTBOX_URL;
0
JavaScript
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
https://cwe.mitre.org/data/definitions/78.html
vulnerable
"change",function(){G=O.value});I=document.createElement("div");I.style.marginTop="6px";I.style.display="inline-block";I.style.width="140px";mxUtils.write(I,mxResources.get("siblingSpacing")+": ");z.appendChild(I);var W=document.createElement("input");W.type="number";W.value=P;W.style.width="200px";W.style.boxSizing="border-box";z.appendChild(W);mxEvent.addListener(W,"change",function(){P=W.value});I=mxUtils.button(mxResources.get("custom")+"...",function(){var X=[{layout:"mxOrgChartLayout",config:{branchOptimizer:parseInt(Q.value), parentChildSpacing:parseInt(O.value),siblingSpacing:parseInt(W.value)}}];c.hideDialog();c.showCustomLayoutDialog(JSON.stringify(X,null,2))});I.className="geBtn";z=new CustomDialog(c,z,function(){null==J&&(J=2);c.loadOrgChartLayouts(p)},null,null,null,I);c.showDialog(z.container,355,140,!0,!0)},y,null,m());l.addSeparator(y);l.addItem(mxResources.get("parallels"),null,mxUtils.bind(this,function(){c.tryAndHandle(mxUtils.bind(this,function(){var J=new mxParallelEdgeLayout(k);J.checkOverlap=!0;c.prompt(mxResources.get("spacing"), J.spacing,mxUtils.bind(this,function(G){c.tryAndHandle(mxUtils.bind(this,function(){J.spacing=G;c.executeLayout(function(){J.execute(k.getDefaultParent(),k.isSelectionEmpty()?null:k.getSelectionCells())},!1)}))}))}))}),y);l.addSeparator(y);c.menus.addMenuItem(l,"runLayout",y,null,null,mxResources.get("custom")+"...")};this.put("help",new Menu(mxUtils.bind(this,function(l,y){if(!mxClient.IS_CHROMEAPP&&c.isOffline())this.addMenuItems(l,["about"],y);else{var J=l.addItem("Search:",null,null,y,null,null,
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
function(t){t.appendChild(this.formatContainer)}));this.formatWindow.window.addListener(mxEvent.SHOW,mxUtils.bind(this,function(){this.formatWindow.window.fit()}));var n=this.formatWindow.window.toggleMinimized,q=240;this.formatWindow.window.toggleMinimized=function(){n.apply(this,arguments);this.minimized?(q=parseInt(this.div.style.width),this.div.style.width="140px",this.table.style.width="140px",this.div.style.left=parseInt(this.div.style.left)+q-140+"px"):(this.div.style.width=q+"px",this.table.style.width= this.div.style.width,this.div.style.left=Math.max(0,parseInt(this.div.style.left)-q+140)+"px");this.fit()};mxEvent.addListener(this.formatWindow.window.title,"dblclick",mxUtils.bind(this,function(t){mxEvent.getSource(t)==this.formatWindow.window.title&&this.formatWindow.window.toggleMinimized()}));this.formatWindow.window.minimumSize=new mxRectangle(0,0,240,80);"sketch"==Editor.currentTheme?(d=window.innerHeight||document.documentElement.clientHeight||document.body.clientHeight,(1200>(window.innerWidth||
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
function(y){c.spinner.stop();null!=y?(y=new EmbedDialog(c,'<img src="'+(l.constructor!=DriveFile?y:"https://drive.google.com/uc?id="+l.getId())+'"/>'),c.showDialog(y.container,450,240,!0,!0),y.init()):c.handleError({message:mxResources.get("invalidPublicUrl")})})}));c.actions.put("embedImage",new Action(mxResources.get("image")+"...",function(){c.showEmbedImageDialog(function(l,y,J,G,P,p){c.spinner.spin(document.body,mxResources.get("loading"))&&c.createEmbedImage(l,y,J,G,P,p,function(z){c.spinner.stop();
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
mxClient.IS_CHROMEAPP)&&this.addMenuItems(l,["showStartScreen"],y),this.addMenuItems(l,["configuration"],y),l.addSeparator(y),"1"==urlParams.newTempDlg&&(c.actions.addAction("templates",function(){function G(p){return{id:p.id,isExt:!0,url:p.downloadUrl,title:p.title,imgUrl:p.thumbnailLink,changedBy:p.lastModifyingUserName,lastModifiedOn:p.modifiedDate}}var P=new TemplatesDialog(c,function(p){console.log(arguments)},null,null,null,"user",function(p,z,I){var Q=new Date;Q.setDate(Q.getDate()-7);c.drive.listFiles(null,
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
"'),")}}));c.actions.addAction("showBoundingBox",mxUtils.bind(this,function(){function l(z){return null==z||null==z.boundingBox||!isNaN(z.boundingBox.x)&&!isNaN(z.boundingBox.y)&&!isNaN(z.boundingBox.width)&&!isNaN(z.boundingBox.height)}var y=k.getGraphBounds(),J=k.view.translate,G=k.view.scale;k.insertVertex(k.getDefaultParent(),null,"",y.x/G-J.x,y.y/G-J.y,y.width/G,y.height/G,"fillColor=none;strokeColor=red;");var P=0,p=0;k.view.states.visit(function(z,I){z=!0;l(I.shape)||(console.log("invalid shape",
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
function(d,g){mxSettings.setUi(d);(g=this.doSetCurrentTheme(d)||g)||this.alert(mxResources.get("restartForChangeRequired"))};EditorUi.prototype.isDefaultTheme=function(d){return""==d||"dark"==d||"default"==d||"kennedy"==d||null==d};EditorUi.prototype.doSetCurrentTheme=function(d,g,n){function q(K){return"simple"==K||0==g&&"sketch"==K}g=null!=g?g:150;var t=Editor.currentTheme,x=q(t)&&this.isDefaultTheme(d)||this.isDefaultTheme(t)&&q(d),A=x&&"sketch"!=d&&"sketch"!=t;if(x&&!this.themeSwitching){Editor.currentTheme=
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
c.actions.addAction("support...",function(){EditorUi.isElectronApp?c.openLink("https://github.com/jgraph/drawio-desktop/wiki/Getting-Support"):c.openLink("https://github.com/jgraph/drawio/wiki/Getting-Support")});c.actions.addAction("exportOptionsDisabled...",function(){c.handleError({message:mxResources.get("exportOptionsDisabledDetails")},mxResources.get("exportOptionsDisabled"))});c.actions.addAction("keyboardShortcuts...",function(){!mxClient.IS_SVG||mxClient.IS_CHROMEAPP||EditorUi.isElectronApp?
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
(f.x+=e.offset.x,f.y+=e.offset.y),e=this.getCurrentCellStyle(a[d]),null!=f&&(e=mxUtils.getValue(e,mxConstants.STYLE_ROTATION,0),0!=e&&(f=mxUtils.getBoundingBox(f,e)));null!=f&&(null==c?c=mxRectangle.fromRectangle(f):c.add(f))}}return c};mxGraph.prototype.refresh=function(a){this.view.clear(a,null==a);this.view.validate();this.sizeDidChange();this.fireEvent(new mxEventObject(mxEvent.REFRESH))};mxGraph.prototype.snap=function(a){this.gridEnabled&&(a=Math.round(a/this.gridSize)*this.gridSize);return a};
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
EditorUi.debug("[Performance] EditorUi.clonePages",[this],"time",Date.now()-l+" ms","args",arguments);return y});null!=K?(c.getHashValueForPages=K,K=null):(K=c.getHashValueForPages,c.getHashValueForPages=function(){var l=Date.now(),y=K.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.getHashValueForPages",[this],"time",Date.now()-l+" ms","args",arguments);return y});null!=H?(c.resolveCrossReferences=H,H=null):(H=c.resolveCrossReferences,c.resolveCrossReferences=function(){var l=Date.now(), y=H.apply(this,arguments);EditorUi.debug("[Performance] EditorUi.resolveCrossReferences",[this],"time",Date.now()-l+" ms","args",arguments);return y});EditorUi.debug("[Performance]",null!=q?"Enabled":"Disabled")}));this.put("testDevelop",new Menu(mxUtils.bind(this,function(l,y){this.addMenuItems(l,"createSidebarEntry showBoundingBox - testCheckPages testChecksum testFixPages - testCheckFile testDiff - testInspect testOptimize - testXmlImageExport -".split(" "),y);var J=l.addItem(mxResources.get("testPerformance"),
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
window.setTimeout(function(){var da=document.createElement("script");da.type="text/javascript";da.src=/<script.*?src="(.*?)"/.exec(X)[1];ba.body.appendChild(da);aa.parentNode.removeChild(aa)},20)}}else c.handleError({message:mxResources.get("errorUpdatingPreview")})});c.showDialog(Z.container,450,240,!0,!0);Z.init()}))})})}));c.actions.put("liveImage",new Action("Live image...",function(){var l=c.getCurrentFile();null!=l&&c.spinner.spin(document.body,mxResources.get("loading"))&&c.getPublicUrl(c.getCurrentFile(),
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable
function(x){x.preventDefault()})),mxEvent.addListener(t,"click",function(x){"disabled"!=t.getAttribute("disabled")&&n(x);mxEvent.consume(x)}));return t};EditorUi.prototype.createMenuItem=function(d,g,n){var q=this.actions.get(d),t=null!=q?q.funct:null,x=this.createToolbarButton(g,mxResources.get(d)+(null!=q&&null!=q.shortcut?" ("+q.shortcut+")":""),t);null==q||n||(d=function(){q.isEnabled()?(x.removeAttribute("disabled"),x.style.cursor="pointer"):(x.setAttribute("disabled","disabled"),x.style.cursor= "default");x.style.opacity=q.isEnabled()?"":"0.2"},this.editor.graph.addListener("enabledChanged",d),q.addListener("stateChanged",d),d());return x};EditorUi.prototype.createFormatWindow=function(){if(null==this.formatWindow){var d=Math.max(10,this.diagramContainer.parentNode.clientWidth-256),g="1"==urlParams.embedInline?580:"1"==urlParams.sketch?580:Math.min(566,this.editor.graph.container.clientHeight-10);this.formatWindow=new WrapperWindow(this,mxResources.get("format"),d,60,240,g,mxUtils.bind(this,
0
JavaScript
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
https://cwe.mitre.org/data/definitions/79.html
vulnerable