Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Base_Optimizer.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler_T.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/TS_Clerk_Handler.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Log_Message_Receiver.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/TS_Server_Handler.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Log_Message_Receiver.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Token_Handler.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Token_Handler.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Time_Request_Reply.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Base_Optimizer.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/TS_Server_Handler.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Time_Request_Reply.h
Examining data/ace-6.5.12+dfsg/netsvcs/lib/TS_Clerk_Handler.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler_T.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/servers/main.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.h
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/createfile.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/main.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.h
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/main.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/deadlock/deadlock_detection_test.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/rw_lock/rw_locks.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/mutex/test_mutex.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/invariant/invariant.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/rw_locks.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/collection.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Logger/direct_logging.cpp
Examining data/ace-6.5.12+dfsg/netsvcs/clients/Logger/indirect_logging.cpp
Examining data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/stdafx.cpp
Examining data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/stdafx.h
Examining data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp
Examining data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/test.cpp
Examining data/ace-6.5.12+dfsg/bin/envinfo.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3673_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/DLL_Test_Impl.cpp
Examining data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/UPIPE_SAP_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Based_Pointer_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_18_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2772_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/High_Res_Timer_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/ACE_Init_Test_Resource.h
Examining data/ace-6.5.12+dfsg/tests/Thread_Manager_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_10_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Config_Test.h
Examining data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.h
Examining data/ace-6.5.12+dfsg/tests/Reactor_Timer_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Log_Thread_Inheritance_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Wild_Match_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_27_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Echo_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2368_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/ACE_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Registration_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Notification_Queue_Unit_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Conn_Test.h
Examining data/ace-6.5.12+dfsg/tests/Bug_3912_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_34_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_20_DLL.cpp
Examining data/ace-6.5.12+dfsg/tests/SString_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Framework_Component_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactors_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_04_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Recursive_Condition_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Process_Env_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/randomize.h
Examining data/ace-6.5.12+dfsg/tests/DLL_Test_Parent.h
Examining data/ace-6.5.12+dfsg/tests/Map_Manager_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.h
Examining data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.h
Examining data/ace-6.5.12+dfsg/tests/Bug_3911_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/TSS_Leak_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/DLL_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Service_Config_Stream_DLL.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Dll.cpp
Examining data/ace-6.5.12+dfsg/tests/Refcounted_Event_Handler_Test_DevPoll.cpp
Examining data/ace-6.5.12+dfsg/tests/Thread_Creation_Threshold_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/ACE_Init_TestDlg.h
Examining data/ace-6.5.12+dfsg/tests/RW_Process_Mutex_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Notify_Performance_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_16_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_20_DLL_Export.h
Examining data/ace-6.5.12+dfsg/tests/Service_Config_Stream_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Sigset_Ops_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test_IPV6.cpp
Examining data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Malloc_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test_Dev_Poll.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_15_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/NonBlocking_Conn_Test.h
Examining data/ace-6.5.12+dfsg/tests/Test_Output_Export.h
Examining data/ace-6.5.12+dfsg/tests/STL_algorithm_Test_T.h
Examining data/ace-6.5.12+dfsg/tests/Time_Service_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2540_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/MT_SOCK_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/ACE_Init_TestDlg.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_12_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2610_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/RB_Tree_Test.h
Examining data/ace-6.5.12+dfsg/tests/Collection_Test.h
Examining data/ace-6.5.12+dfsg/tests/SV_Shared_Memory_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/CDR_Fixed_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Message_Block_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3432_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Timeprobe_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_SEQPACK_SCTP_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Naming_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.h
Examining data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/OS_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Message_Queue_Test_Ex.cpp
Examining data/ace-6.5.12+dfsg/tests/Based_Pointer_Test_Lib.cpp
Examining data/ace-6.5.12+dfsg/tests/SPIPE_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Test_Output.cpp
Examining data/ace-6.5.12+dfsg/tests/Collection_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Pipe_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/DLL_Test_Parent_Export.h
Examining data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/TSS_Static_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.h
Examining data/ace-6.5.12+dfsg/tests/Handle_Set_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Notify_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/NonBlocking_Conn_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Hash_Multi_Map_Manager_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/MT_Reactor_Timer_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Lazy_Map_Manager_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/INET_Addr_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Proactor_Test.h
Examining data/ace-6.5.12+dfsg/tests/Memcpy_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/INET_Addr_Test_IPV6.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2659_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Process_Mutex_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Framework_Component_Test.h
Examining data/ace-6.5.12+dfsg/tests/Conn_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Obstack_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Service_Config_Stream_DLL.h
Examining data/ace-6.5.12+dfsg/tests/ACE_Init_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/TSS_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Stack_Trace_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Upgradable_RW_Test.h
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_23_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2434_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Task_Ex_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_02_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Remove_Resume_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3539_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/DLList_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/WFMO_Reactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3974_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bound_Ptr_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/OrdMultiSet_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/STL_algorithm_Test_T.cpp
Examining data/ace-6.5.12+dfsg/tests/Multihomed_INET_Addr_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Codecs_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_13_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Object_Manager_Flipping_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_Send_Recv_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SSL/Main.cpp
Examining data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.h
Examining data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Future_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Barrier_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/MM_Shared_Memory_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Missing_Svc_Conf_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Service_Config_DLL_Export.h
Examining data/ace-6.5.12+dfsg/tests/Bug_3319_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_37_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Atomic_Op_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Capabilities_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Array_Map_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3500_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Process_Manual_Event_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Framework_Component_DLL.cpp
Examining data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/test_config.h
Examining data/ace-6.5.12+dfsg/tests/UUID_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Log_Msg_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Framework_Component_DLL.h
Examining data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp
Examining data/ace-6.5.12+dfsg/tests/Simple_Message_Block_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Task_Wait_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/QtReactor_Test.h
Examining data/ace-6.5.12+dfsg/tests/Singleton_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Sig_Handlers_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_Acceptor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Singleton_Restart_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Task_Group_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Integer_Truncate_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Future_Set_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3729_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3878_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Cached_Allocator_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/TSS_Test_Errno.h
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_25_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Proactor_Timer_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Buffer_Stream_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Task_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_Connector_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_33_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Message_Block_Large_Copy_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3505_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Thread_Timer_Queue_Adapter_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_07_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Chrono_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Service_Config_Stream_DLL_Export.h
Examining data/ace-6.5.12+dfsg/tests/Malloc_Test.h
Examining data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.h
Examining data/ace-6.5.12+dfsg/tests/Auto_Event_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Time_Value_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Semaphore_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3334_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Env_Value_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Timer_Queue_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/MT_Reactor_Upcall_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Arg_Shifter_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_1576_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Dynamic_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/UNIX_Addr_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test.h
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_24_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Message_Queue_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Main.cpp
Examining data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_22_DLL.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_Send_Recv_Test_IPV6.cpp
Examining data/ace-6.5.12+dfsg/tests/Auto_IncDec_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/FlReactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/DLL_Test_Parent.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_35_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/ARGV_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_4055_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Svc_Handler_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_06_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_05_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Dynamic_Priority_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Unbounded_Set_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Priority_Buffer_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bound_Ptr_Test.h
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_19_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/CDR_Array_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Timer_Cancellation_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Date_Time_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_14_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2815_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_1890_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Vector_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3532_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_17_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.h
Examining data/ace-6.5.12+dfsg/tests/Bug_2609_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Message_Queue_Notifications_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Process_Semaphore_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2820_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.h
Examining data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_38_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reader_Writer_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Task_Ex_Test.h
Examining data/ace-6.5.12+dfsg/tests/Reactor_Exceptions_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Multicast_Interfaces_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/CDR_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_03_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Signal_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3744_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3332_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Token_Strategy_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Hash_Map_Manager_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Service_Config_DLL.h
Examining data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Framework_Component_DLL_Export.h
Examining data/ace-6.5.12+dfsg/tests/Manual_Event_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Intrusive_Auto_Ptr_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3709_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/RB_Tree_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_32_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Enum_Interfaces_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Cache_Map_Manager_Test.h
Examining data/ace-6.5.12+dfsg/tests/Service_Config_DLL.cpp
Examining data/ace-6.5.12+dfsg/tests/Recursive_Mutex_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Tokens_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_29_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3102_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_11_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Notify_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/ACE_Init_Test_StdAfx.h
Examining data/ace-6.5.12+dfsg/tests/Bug_4189_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2975_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Refcounted_Auto_Ptr_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Log_Msg_Backend_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Config_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Object_Manager_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3943_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Monotonic_Task_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Aio_Platform_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Monotonic_Manual_Event_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Basic_Types_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Notification_Queue_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_01_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Remove_Resume_Test_Dev_Poll.cpp
Examining data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Map_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/DLL_Test.h
Examining data/ace-6.5.12+dfsg/tests/Bug_3710_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.h
Examining data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Monotonic_Message_Queue_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Map_Test.h
Examining data/ace-6.5.12+dfsg/tests/Sendfile_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_22_DLL.h
Examining data/ace-6.5.12+dfsg/tests/Proactor_File_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Thread_Mutex_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_09_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Cache_Map_Manager_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/SOCK_Test_IPv6.cpp
Examining data/ace-6.5.12+dfsg/tests/Get_Opt_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_3541_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/New_Fail_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/DLL_Test_Impl.h
Examining data/ace-6.5.12+dfsg/tests/IOStream_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.h
Examining data/ace-6.5.12+dfsg/tests/CDR_File_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_20_DLL.h
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_21_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_36_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.h
Examining data/ace-6.5.12+dfsg/tests/Bug_3758_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_22_DLL_Export.h
Examining data/ace-6.5.12+dfsg/tests/MT_Reactor_Timer_Test.h
Examining data/ace-6.5.12+dfsg/tests/Recursive_Condition_Bug_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Bug_2497_Regression_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Message_Queue_Test_Ex.h
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_26_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_31_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Refcounted_Auto_Ptr_Test.h
Examining data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Upgradable_RW_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Process_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Priority_Task_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Reverse_Lock_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/ACE_Init_Test.h
Examining data/ace-6.5.12+dfsg/tests/NDDS_Timer_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/Compiler_Features_28_Test.cpp
Examining data/ace-6.5.12+dfsg/tests/non_mpc_makefile/foo.cpp
Examining data/ace-6.5.12+dfsg/tests/Multihomed_INET_Addr_Test_IPV6.cpp
Examining data/ace-6.5.12+dfsg/tests/Hash_Map_Bucket_Iterator_Test.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/parser/parser/Entity_Manager.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/parser/parser/ParserContext.h
Examining data/ace-6.5.12+dfsg/ACEXML/parser/parser/Parser_export.h
Examining data/ace-6.5.12+dfsg/ACEXML/parser/parser/Parser.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/parser/parser/Parser.h
Examining data/ace-6.5.12+dfsg/ACEXML/parser/parser/ParserContext.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/parser/parser/Entity_Manager.h
Examining data/ace-6.5.12+dfsg/ACEXML/parser/parser/ParserInternals.h
Examining data/ace-6.5.12+dfsg/ACEXML/parser/parser/ParserInternals.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/parser/debug_validator/Debug_Attributes_Builder.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/parser/debug_validator/Debug_DTD_Manager_Export.h
Examining data/ace-6.5.12+dfsg/ACEXML/parser/debug_validator/Element_Tree.h
Examining data/ace-6.5.12+dfsg/ACEXML/parser/debug_validator/Debug_DTD_Manager.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/parser/debug_validator/Debug_Element_Builder.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/parser/debug_validator/Debug_Element_Builder.h
Examining data/ace-6.5.12+dfsg/ACEXML/parser/debug_validator/Element_Tree.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/parser/debug_validator/Debug_Attributes_Builder.h
Examining data/ace-6.5.12+dfsg/ACEXML/parser/debug_validator/Debug_DTD_Manager.h
Examining data/ace-6.5.12+dfsg/ACEXML/tests/ContentHandler_Test.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/tests/util/test.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/tests/HttpCharStream_Test.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/tests/NamespaceSupport_Test.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/tests/Transcoder_Test.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/apps/svcconf/Svcconf.h
Examining data/ace-6.5.12+dfsg/ACEXML/apps/svcconf/Svcconf.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/apps/svcconf/Svcconf_Handler.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/apps/svcconf/Svcconf_Handler.h
Examining data/ace-6.5.12+dfsg/ACEXML/examples/SAXPrint/SAXPrint_Handler.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/examples/SAXPrint/SAXPrint_Handler.h
Examining data/ace-6.5.12+dfsg/ACEXML/examples/SAXPrint/Print_Handler.h
Examining data/ace-6.5.12+dfsg/ACEXML/examples/SAXPrint/main.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/examples/SAXPrint/Print_Handler.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/XML_Codecs.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/NamespaceSupport.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/AttributesImpl.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/URL_Addr.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/Attributes.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/Attributes_Def_Builder.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/StrCharStream.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/InputSource.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/Element_Def_Builder.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/XMLReader.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/EntityResolver.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/DTDHandler.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/XMLFilterImpl.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/DefaultHandler.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/LocatorImpl.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/EntityResolver.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/Attributes_Def_Builder.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/NamespaceSupport.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/CharStream.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/XMLFilterImpl.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/XMLReader.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/DefaultHandler.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/AttributesImpl.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/ErrorHandler.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/StreamFactory.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/ACEXML_Export.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/DTDHandler.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/Exception.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/XML_Codecs.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/ContentHandler.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/Encoding.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/ErrorHandler.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/ContentHandler.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/Transcode.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/Locator.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/Locator.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/XML_Util.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/CharStream.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/LocatorImpl.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/Mem_Map_Stream.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/SAXExceptions.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/DTD_Manager.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/XMLFilter.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/XML_Util.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/DTD_Manager.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/XML_Types.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/SAXExceptions.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/URL_Addr.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/Attributes.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/Transcode.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/StreamFactory.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/Validator.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/InputSource.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/Exception.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/Mem_Map_Stream.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/StrCharStream.h
Examining data/ace-6.5.12+dfsg/ACEXML/common/Encoding.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/Validator.cpp
Examining data/ace-6.5.12+dfsg/ACEXML/common/Element_Def_Builder.cpp
Examining data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp
Examining data/ace-6.5.12+dfsg/apps/soreduce/Signature.cpp
Examining data/ace-6.5.12+dfsg/apps/soreduce/soreduce.cpp
Examining data/ace-6.5.12+dfsg/apps/soreduce/Library.cpp
Examining data/ace-6.5.12+dfsg/apps/soreduce/SO_Group.cpp
Examining data/ace-6.5.12+dfsg/apps/soreduce/Library.h
Examining data/ace-6.5.12+dfsg/apps/soreduce/Sig_List.cpp
Examining data/ace-6.5.12+dfsg/apps/soreduce/SO_Group.h
Examining data/ace-6.5.12+dfsg/apps/soreduce/Obj_Module.h
Examining data/ace-6.5.12+dfsg/apps/soreduce/Sig_List.h
Examining data/ace-6.5.12+dfsg/apps/soreduce/Obj_Module.cpp
Examining data/ace-6.5.12+dfsg/apps/soreduce/Signature.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_Concurrency.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Config.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_Concurrency.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Config.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_Pipeline_Handler.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/Parse_Headers.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/Parse_Headers.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_Pipeline.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_Pipeline.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/main.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_Pipeline_Handler.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/cp.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/client.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/cp.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/connection.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/stats.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/connection.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/stats.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/benchd.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/global.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/URL_Locator.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/URL_Properties.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/test_URL.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/Local_Locator.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/URL_Properties.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/ID_Generator.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/URL_Array_Helper.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/ID_Generator.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/Locator_Request_Reply.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/Locator_Request_Reply.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/URL_Array_Helper.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_client.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/URL_Locator.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/Local_Locator.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.h
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/blobby.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Options.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Options.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/bench/average.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/bench/mkfiles.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_Service_Handler.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_PARSE.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_Templates.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_ERROR.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_WRITE.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_Data.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_Data.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_READ.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_DONE.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_DONE.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_ERROR.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_READ.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_WRITE.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_Service_Handler.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_State_PARSE.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/http/HTTP_States.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/http/HTTP_Data.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/http/HTTP_Service_Handler.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/http/HTTP_Service_Handler.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Asynch_IO.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Cached_Allocator_T.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/TPOOL_Concurrency.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Task_Timer.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Event_Completer.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Cached_Allocator_T.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Task_Timer.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Reactive_IO.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/TPOOL_Concurrency.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Signal_Task.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Synch_IO.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Timer_Helpers.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/FILE.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Event_Dispatcher.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Config_File.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Templates.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Timer_Helpers.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Symbol_Table.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/THYBRID_Concurrency.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Export.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Event_Result.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Event_Dispatcher.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Jaws_IO.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Protocol_Handler.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Signal_Task.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Jaws_IO.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Options.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/TPR_Concurrency.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Options.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Concurrency.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Asynch_IO_Helpers.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/THYBRID_Concurrency.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Timer.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Concurrency.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Reactive_IO.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Config_File.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Event_Completer.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Synch_IO.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/main.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Concurrency_T.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Concurrency_T.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/FILE.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Datagram.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Protocol_Handler.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Datagram.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Timer.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Asynch_IO.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Reactive_IO_Helpers.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Symbol_Table.h
Examining data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/TPR_Concurrency.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event_Channel.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/File_Parser.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Config_Files.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Connection_Handler_Acceptor.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Config_Files.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Concrete_Connection_Handlers.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/gatewayd.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Consumer_Dispatch_Set.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Connection_Handler_Connector.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Connection_Handler_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event_Channel.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event_Forwarding_Discriminator.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Concrete_Connection_Handlers.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/File_Parser.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Connection_Handler.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Connection_Handler.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Connection_Handler_Connector.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event_Forwarding_Discriminator.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.h
Examining data/ace-6.5.12+dfsg/apps/Gateway/Peer/peerd.cpp
Examining data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/PM_Client.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/PM_Server.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/HT_Server.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/CM_Client.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMS_Flo.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/HT_Client.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Comm_Manager.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMC_Ruser.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Comm_Manager.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/BS_Server.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/SM_Client.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Select_Manager.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMS_Ruser.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Search_Struct.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/PM_Server.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Drwho_Node.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMC_All.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/HT_Server.h
Examining data/ace-6.5.12+dfsg/apps/drwho/BS_Server.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Protocol_Manager.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/SM_Client.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/PMS_All.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/File_Manager.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/HT_Client.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Single_Lookup.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Single_Lookup.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Multicast_Manager.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMS_Ruser.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/PMS_Flo.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMC_Usr.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMS_Usr.h
Examining data/ace-6.5.12+dfsg/apps/drwho/SM_Server.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Binary_Search.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Search_Struct.h
Examining data/ace-6.5.12+dfsg/apps/drwho/SML_Server.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMS_Usr.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/PMC_Flo.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Options.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Options.h
Examining data/ace-6.5.12+dfsg/apps/drwho/SMR_Server.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Hash_Table.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Binary_Search.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/client.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/CM_Client.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/SL_Server.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Drwho_Node.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/PMC_All.h
Examining data/ace-6.5.12+dfsg/apps/drwho/SML_Client.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Hash_Table.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/SL_Client.h
Examining data/ace-6.5.12+dfsg/apps/drwho/BS_Client.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/SMR_Client.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/SL_Server.h
Examining data/ace-6.5.12+dfsg/apps/drwho/CM_Server.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Protocol_Record.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/server.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Protocol_Manager.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMC_Usr.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/PMS_All.h
Examining data/ace-6.5.12+dfsg/apps/drwho/SML_Client.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Select_Manager.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/SMR_Client.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PMC_Ruser.h
Examining data/ace-6.5.12+dfsg/apps/drwho/SMR_Server.h
Examining data/ace-6.5.12+dfsg/apps/drwho/CM_Server.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/File_Manager.h
Examining data/ace-6.5.12+dfsg/apps/drwho/SM_Server.h
Examining data/ace-6.5.12+dfsg/apps/drwho/SL_Client.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/PMC_Flo.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Protocol_Record.h
Examining data/ace-6.5.12+dfsg/apps/drwho/BS_Client.h
Examining data/ace-6.5.12+dfsg/apps/drwho/Multicast_Manager.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/SML_Server.cpp
Examining data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.h
Examining data/ace-6.5.12+dfsg/apps/drwho/PM_Client.h
Examining data/ace-6.5.12+dfsg/apps/drwho/global.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Parse.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_Policy.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Write.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Pipeline_Tasks.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Assoc_Array.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Reaper.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Manager.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Assoc_Array.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Reaper.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Heap_T.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Waiter.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Pipeline.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Pipeline_Tasks.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/FILE.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Pipeline.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Headers.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Hash_Bucket_T.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Filecache.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Object.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Export.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Handler.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Waiter.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Data_Block.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Parse_Headers.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Concurrency.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Manager_T.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_List_T.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Parse_Headers.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Manager_T.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Heap_T.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Object.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Handler.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Pipeline_Handler_T.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Concurrency.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Policy.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Headers.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Filecache.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Policy.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Hash_Bucket_T.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Manager.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Hash_T.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/FILE.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Pipeline_Handler_T.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_List_T.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Data_Block.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Hash_T.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Read.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_headers.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_url.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_response.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_response.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_request.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_http_response.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_request.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_base.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_http_request.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_headers.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_status.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_http_request.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_export.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_base.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_url.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_status.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_http_response.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/main.cpp
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10.h
Examining data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_Policy.h
Examining data/ace-6.5.12+dfsg/apps/gperf/tests/test.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Version.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Vectors.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Gen_Perf.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/List_Node.h
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.h
Examining data/ace-6.5.12+dfsg/apps/gperf/src/List_Node.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/gperf.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Iterator.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Bool_Array.h
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Options.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Iterator.h
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Options.h
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Hash_Table.h
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Gen_Perf.h
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Vectors.h
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Hash_Table.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp
Examining data/ace-6.5.12+dfsg/apps/gperf/src/Bool_Array.cpp
Examining data/ace-6.5.12+dfsg/etc/xlc_dummy.cpp
Examining data/ace-6.5.12+dfsg/examples/Export/test_export.h
Examining data/ace-6.5.12+dfsg/examples/Export/dll.h
Examining data/ace-6.5.12+dfsg/examples/Export/dll.cpp
Examining data/ace-6.5.12+dfsg/examples/Export/test.cpp
Examining data/ace-6.5.12+dfsg/examples/Synch/proc_sema.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Event_Analyzer.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.h
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Peer_Router.h
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/event_server.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Consumer_Router.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Supplier_Router.h
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Event_Analyzer.h
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Peer_Router.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Consumer_Router.h
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Supplier_Router.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Transceiver/transceiver.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Transceiver/transceiver.h
Examining data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/priority_buffer.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/bounded_buffer.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/buffer_stream.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Event_Analyzer.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.h
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Peer_Router.h
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/event_server.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.h
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Event_Analyzer.h
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Peer_Router.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.h
Examining data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/CCM_App/SC_Server.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/CCM_App/SC_Client.cpp
Examining data/ace-6.5.12+dfsg/examples/ASX/CCM_App/CCM_App.cpp
Examining data/ace-6.5.12+dfsg/examples/OS/Process/imore.cpp
Examining data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp
Examining data/ace-6.5.12+dfsg/examples/NT_Service/ntsvc.h
Examining data/ace-6.5.12+dfsg/examples/NT_Service/ntsvc.cpp
Examining data/ace-6.5.12+dfsg/examples/NT_Service/main.cpp
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/MainFrame.cpp
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/stdafx.cpp
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/ConfigurationViewer.cpp
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/MainFrame.h
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/ValueDlg.cpp
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/stdafx.h
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/ValueListCtrl.h
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/ConfigTreeCtrl.h
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/ConfigTreeCtrl.cpp
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/ValueDlg.h
Examining data/ace-6.5.12+dfsg/examples/ConfigViewer/ValueListCtrl.cpp
Examining data/ace-6.5.12+dfsg/examples/Monitor/Bytes_Sent/bytes_sent.cpp
Examining data/ace-6.5.12+dfsg/examples/Monitor/MC_Test_Utilities_export.h
Examining data/ace-6.5.12+dfsg/examples/Monitor/Constraint/constraint.cpp
Examining data/ace-6.5.12+dfsg/examples/Monitor/Message_Queue_Size/message_queue_size.cpp
Examining data/ace-6.5.12+dfsg/examples/Monitor/Group/group.cpp
Examining data/ace-6.5.12+dfsg/examples/Monitor/Num_Threads/num_threads.cpp
Examining data/ace-6.5.12+dfsg/examples/Monitor/MC_Test_Utilities.h
Examining data/ace-6.5.12+dfsg/examples/Monitor/CPU_Load/cpu_load.cpp
Examining data/ace-6.5.12+dfsg/examples/Monitor/MC_Test_Utilities.cpp
Examining data/ace-6.5.12+dfsg/examples/Monitor/Memory_Usage/memory_usage.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Part.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Impl.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Factory.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Part_Impl.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Factory.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Impl.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Part_Impl.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Factory.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/widget_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Part_Impl.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Impl.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Part.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Part_Factory.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Part_Impl.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Factory.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Part.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Impl.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Part_Factory.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Part_Factory.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Gadget_Part_Factory.h
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/gadget_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget_Part.cpp
Examining data/ace-6.5.12+dfsg/examples/Smart_Pointers/Widget.h
Examining data/ace-6.5.12+dfsg/examples/Registry/test_registry_iterator.cpp
Examining data/ace-6.5.12+dfsg/examples/Registry/test_registry_update.cpp
Examining data/ace-6.5.12+dfsg/examples/Semaphores/starter.cpp
Examining data/ace-6.5.12+dfsg/examples/Semaphores/worker.cpp
Examining data/ace-6.5.12+dfsg/examples/Naming/test_multiple_contexts.cpp
Examining data/ace-6.5.12+dfsg/examples/Naming/test_open.cpp
Examining data/ace-6.5.12+dfsg/examples/Naming/test_writers.cpp
Examining data/ace-6.5.12+dfsg/examples/Naming/test_non_existent.cpp
Examining data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_position_independent_malloc.h
Examining data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_malloc.cpp
Examining data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_multiple_mallocs.cpp
Examining data/ace-6.5.12+dfsg/examples/Shared_Malloc/Malloc.cpp
Examining data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.cpp
Examining data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp
Examining data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.h
Examining data/ace-6.5.12+dfsg/examples/Shared_Malloc/Malloc.h
Examining data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_position_independent_malloc.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/misc/test_upipe.h
Examining data/ace-6.5.12+dfsg/examples/Connection/misc/Connection_Handler.h
Examining data/ace-6.5.12+dfsg/examples/Connection/misc/Connection_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/misc/test_upipe.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/blocking/test_spipe_connector.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/blocking/test_spipe_acceptor.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.h
Examining data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.h
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/test_lsock_connector.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/test_sock_acceptor.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.h
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/test_tli_acceptor.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-acceptor.h
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/test_tli_connector.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/test_lsock_acceptor.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/test_spipe_connector.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/test_spipe_acceptor.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/test_sock_connector.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-acceptor.cpp
Examining data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.cpp
Examining data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Semaphores/Semaphores_1.cpp
Examining data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Semaphores/Semaphores_2.cpp
Examining data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/TMQ_Client.cpp
Examining data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/test.h
Examining data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/TMQ_Server.cpp
Examining data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/MQ_Server.cpp
Examining data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/MQ_Client.cpp
Examining data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Shared_Memory/SV_Shared_Memory_Test.cpp
Examining data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Shared_Memory/SV_Shared_Memory_Test.h
Examining data/ace-6.5.12+dfsg/examples/Mem_Map/file-reverse/file-reverse.cpp
Examining data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/IO_Test.h
Examining data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/test_io.cpp
Examining data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/IO_Test.cpp
Examining data/ace-6.5.12+dfsg/examples/IOStream/server/iostream_server.cpp
Examining data/ace-6.5.12+dfsg/examples/IOStream/server/iostream_server.h
Examining data/ace-6.5.12+dfsg/examples/IOStream/client/iostream_client.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Stream.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_SPIPE.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_CODgram.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/server_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Timeout.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Broadcast.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_R_Stream.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_FIFO.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_R_Dgram.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Pipe.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Dgram.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_R_Dgram.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_R_Stream.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_CODgram.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_FIFO.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Broadcast.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Dgram.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Pipe.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_SPIPE.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Stream.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Timeout.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_thr_stream_client_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_spipe_client_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_fifo_client_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_stream_client_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_dgram_client_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_pipe_client_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_stream_client_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/broadcast_client_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_service_directory_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_dgram_client_test.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/Misc/Timer_Service.h
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/Misc/Timer_Service.cpp
Examining data/ace-6.5.12+dfsg/examples/Service_Configurator/Misc/main.cpp
Examining data/ace-6.5.12+dfsg/examples/Shared_Memory/test_MM.cpp
Examining data/ace-6.5.12+dfsg/examples/Shared_Memory/test_SV.cpp
Examining data/ace-6.5.12+dfsg/examples/Map_Manager/test_hash_map_manager.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_read_buffer.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_set.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_dump.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_dump.h
Examining data/ace-6.5.12+dfsg/examples/Misc/test_get_opt.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_trace.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_profile_timer.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_timestamp.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_XtReactor2.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_XtReactor1.cpp
Examining data/ace-6.5.12+dfsg/examples/Misc/test_sstring.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-simple.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.h
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.h
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-poll.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.h
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/FILE_SAP/client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/consumer_read.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/NPClient.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/shared.h
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/producer_read.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/producer_msg.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/server.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/NPServer.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/consumer_msg.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/ftp-client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-server.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-server.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/ftp-server.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-server.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-Msg-client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-test.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-Msg-server.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-server.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex3.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex2.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex1.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/FD-unserver.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.h
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-poll.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-memserver.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inserver.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-unserver.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-memclient.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/FD-unclient.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-unclient.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inclient.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.h
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-client.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-server.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/DEV_SAP/reader/reader.cpp
Examining data/ace-6.5.12+dfsg/examples/IPC_SAP/DEV_SAP/writer/writer.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Driver.h
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Async_Timer_Queue_Test.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Custom_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Thread_Timer_Queue_Custom_Handler_Test.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Reactor_Timer_Queue_Test.h
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Reactor_Timer_Queue_Test.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Driver.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Thread_Timer_Queue_Test.h
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/main_reactor.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Thread_Timer_Queue_Test.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Async_Timer_Queue_Test.h
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Thread_Timer_Queue_Custom_Handler_Test.h
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/main_thread_custom_handler.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/Custom_Handler.h
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/main_async.cpp
Examining data/ace-6.5.12+dfsg/examples/Timer_Queue/main_thread.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Web_Crawler.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Web_Crawler.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Iterators.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/HTTP_URL.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Iterators.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Command_Processor.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/HTTP_URL.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Mem_Map_Stream.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor_Factory.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Command_Processor.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor_Factory.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Status.h
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/main.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Status.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/URL.cpp
Examining data/ace-6.5.12+dfsg/examples/Web_Crawler/Mem_Map_Stream.h
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/test_log_msg.cpp
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/test_ostream.cpp
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/MFC_Log.cpp
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/Log_Msg_MFC.h
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/Log_Msg_MFC.cpp
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/MFC_Log.h
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/Resource.h
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/StdAfx.cpp
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/Log_Msg_MFCDlg.h
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/StdAfx.h
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/Log_Msg_MFCDlg.cpp
Examining data/ace-6.5.12+dfsg/examples/Log_Msg/test_callback.cpp
Examining data/ace-6.5.12+dfsg/examples/Logger/simple-server/Reactor_Singleton.h
Examining data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Handler.h
Examining data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/Logger/simple-server/server_loggerd.cpp
Examining data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Acceptor.h
Examining data/ace-6.5.12+dfsg/examples/Logger/Acceptor-server/server_loggerd.h
Examining data/ace-6.5.12+dfsg/examples/Logger/Acceptor-server/server_loggerd.cpp
Examining data/ace-6.5.12+dfsg/examples/Logger/client/logging_app.cpp
Examining data/ace-6.5.12+dfsg/examples/DLL/Newsweek.cpp
Examining data/ace-6.5.12+dfsg/examples/DLL/Newsweek.h
Examining data/ace-6.5.12+dfsg/examples/DLL/Today.h
Examining data/ace-6.5.12+dfsg/examples/DLL/test_dll.cpp
Examining data/ace-6.5.12+dfsg/examples/DLL/Magazine.h
Examining data/ace-6.5.12+dfsg/examples/DLL/Today.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/barrier1.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/auto_event.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/barrier2.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/TSS_Task.h
Examining data/ace-6.5.12+dfsg/examples/Threads/TSS_Obj.h
Examining data/ace-6.5.12+dfsg/examples/Threads/wfmo.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/tss2.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/task_five.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/task_three.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/task_two.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/tss1.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/TSS_Data.h
Examining data/ace-6.5.12+dfsg/examples/Threads/process_semaphore.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/recursive_mutex.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/thread_specific.h
Examining data/ace-6.5.12+dfsg/examples/Threads/future2.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/thread_manager.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/process_manager.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/reader_writer.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/token.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/cancel.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/thread_pool.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/task_one.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/task_four.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/thread_specific.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/manual_event.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/process_mutex.cpp
Examining data/ace-6.5.12+dfsg/examples/Threads/future1.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/Receiver_QoS_Event_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/Fill_ACE_QoS.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/QoS_Signal_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/QoS_Signal_Handler.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/Sender_QoS_Event_Handler.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/Receiver_QoS_Event_Handler.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/receiver.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/FlowSpec_Dbase.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/QoS_Util.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/Fill_ACE_QoS.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/Sender_QoS_Event_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/QoS_Util.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/sender.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Diffserv/diffserv_test.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Diffserv/server.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/Receiver_QoS_Event_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/Fill_ACE_QoS.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/QoS_Signal_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/QoS_Signal_Handler.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/Sender_QoS_Event_Handler.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/Receiver_QoS_Event_Handler.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/receiver.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/FlowSpec_Dbase.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/QoS_Util.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/Fill_ACE_QoS.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/Sender_QoS_Event_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/QoS_Util.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/sender.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/Receiver_QoS_Event_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/Fill_ACE_QoS.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/QoS_Signal_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/QoS_Signal_Handler.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/Sender_QoS_Event_Handler.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/Receiver_QoS_Event_Handler.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/receiver.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/FlowSpec_Dbase.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/QoS_Util.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/Fill_ACE_QoS.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/Sender_QoS_Event_Handler.cpp
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/QoS_Util.h
Examining data/ace-6.5.12+dfsg/examples/QOS/Simple/sender.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Multicast/Log_Wrapper.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Multicast/Log_Wrapper.h
Examining data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Multicast/server.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Ntalker/ntalker.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Dgram/CODgram.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Dgram/Dgram.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_event_handler_t.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_reactors.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_signals_1.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_signals_2.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_demuxing.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_time_value.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_early_timeouts.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_timer_queue.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/pingpong.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Misc/notification.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Timeouts.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Window_Messages.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Registry_Changes.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Removals.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Handle_Close.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Multithreading.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Abandoned.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Network_Events.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Registration.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Console_Input.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/APC.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Exceptions.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Directory_Changes.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Suspended_Removals.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Prerun_State_Changes.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/client.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/ReadHandler.h
Examining data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/AcceptHandler.h
Examining data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/server.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/ReadHandler.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/common.h
Examining data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/AcceptHandler.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/FIFO/client.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/FIFO/server.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.h
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/Aio_Platform_Test_C.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiosig_ace.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiosig.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/post_completions.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_multiple_loops.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_end_event_loop.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_timeout_st.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/simple_test_proactor.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.h
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_timeout.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp
Examining data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb_ace.cpp
Examining data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/BPR_Drivers.h
Examining data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/BPR_Drivers_T.h
Examining data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/BPR_Drivers.cpp
Examining data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/BPR_Drivers_T.cpp
Examining data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/Thread_Bounded_Packet_Relay.h
Examining data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/Thread_Bounded_Packet_Relay.cpp
Examining data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/bpr_thread.cpp
Examining data/ace-6.5.12+dfsg/ace/Timer_List.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-leopard.h
Examining data/ace-6.5.12+dfsg/ace/SOCK.cpp
Examining data/ace-6.5.12+dfsg/ace/Malloc_Allocator.h
Examining data/ace-6.5.12+dfsg/ace/WFMO_Reactor.h
Examining data/ace-6.5.12+dfsg/ace/Token.h
Examining data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp
Examining data/ace-6.5.12+dfsg/ace/Intrusive_List_Node.cpp
Examining data/ace-6.5.12+dfsg/ace/Recursive_Thread_Mutex.h
Examining data/ace-6.5.12+dfsg/ace/Functor.h
Examining data/ace-6.5.12+dfsg/ace/Task_Ex_T.cpp
Examining data/ace-6.5.12+dfsg/ace/UPIPE_Stream.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_IO.h
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_IPC.h
Examining data/ace-6.5.12+dfsg/ace/Event_Handler_Handle_Timeout_Upcall.h
Examining data/ace-6.5.12+dfsg/ace/Monotonic_Time_Policy.h
Examining data/ace-6.5.12+dfsg/ace/Time_Policy_T.h
Examining data/ace-6.5.12+dfsg/ace/MEM_IO.h
Examining data/ace-6.5.12+dfsg/ace/FIFO_Recv_Msg.cpp
Examining data/ace-6.5.12+dfsg/ace/Dump.cpp
Examining data/ace-6.5.12+dfsg/ace/Remote_Tokens.h
Examining data/ace-6.5.12+dfsg/ace/Dynamic.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp
Parsing failed to find end of parameter list; semicolon terminated it in  (thr_string, thr_string_len, "%lu",
#    ifdef ACE_THREAD_T_IS_A_STRUCT
                    *reinterpret_cast<const unsigned long *> (&
#    else
                    (unsigned long) (
#    endif // A
Examining data/ace-6.5.12+dfsg/ace/String_Base_Const.cpp
Examining data/ace-6.5.12+dfsg/ace/Base_Thread_Adapter.h
Examining data/ace-6.5.12+dfsg/ace/post.h
Examining data/ace-6.5.12+dfsg/ace/MEM_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc-12.h
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc-141.h
Examining data/ace-6.5.12+dfsg/ace/Codeset_Symbols.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_time.cpp
Examining data/ace-6.5.12+dfsg/ace/INET_Addr.h
Examining data/ace-6.5.12+dfsg/ace/Timer_List_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_Callback.h
Examining data/ace-6.5.12+dfsg/ace/FIFO_Recv.cpp
Examining data/ace-6.5.12+dfsg/ace/Arg_Shifter.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-borland.h
Examining data/ace-6.5.12+dfsg/ace/POSIX_CB_Proactor.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp
Examining data/ace-6.5.12+dfsg/ace/Map_T.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_uio.cpp
Examining data/ace-6.5.12+dfsg/ace/Null_Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-dmc.h
Examining data/ace-6.5.12+dfsg/ace/OS_main.h
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_Backend.cpp
Examining data/ace-6.5.12+dfsg/ace/Typed_SV_Message_Queue.h
Examining data/ace-6.5.12+dfsg/ace/Barrier.cpp
Examining data/ace-6.5.12+dfsg/ace/config-vxworks.h
Examining data/ace-6.5.12+dfsg/ace/Cached_Connect_Strategy_T.cpp
Examining data/ace-6.5.12+dfsg/ace/config-macosx.h
Examining data/ace-6.5.12+dfsg/ace/Dynamic_Service_Dependency.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_socket.cpp
Examining data/ace-6.5.12+dfsg/ace/Asynch_IO_Impl.h
Examining data/ace-6.5.12+dfsg/ace/Cached_Connect_Strategy_T.h
Examining data/ace-6.5.12+dfsg/ace/Test_and_Set.h
Examining data/ace-6.5.12+dfsg/ace/config-integritySCA.h
Examining data/ace-6.5.12+dfsg/ace/CE_Screen_Output.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_poll.h
Examining data/ace-6.5.12+dfsg/ace/OS_Thread_Adapter.cpp
Examining data/ace-6.5.12+dfsg/ace/LSOCK_CODgram.h
Examining data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.h
Examining data/ace-6.5.12+dfsg/ace/Token_Request_Reply.cpp
Examining data/ace-6.5.12+dfsg/ace/Token_Collection.h
Examining data/ace-6.5.12+dfsg/ace/Process_Semaphore.cpp
Examining data/ace-6.5.12+dfsg/ace/LSOCK_Dgram.cpp
Examining data/ace-6.5.12+dfsg/ace/Get_Opt.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_regex.h
Examining data/ace-6.5.12+dfsg/ace/Mutex.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_shm.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_dlfcn.cpp
Examining data/ace-6.5.12+dfsg/ace/config-macosx-lion.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_wctype.cpp
Examining data/ace-6.5.12+dfsg/ace/Timer_Queue_Iterator.h
Examining data/ace-6.5.12+dfsg/ace/Vector_T.h
Examining data/ace-6.5.12+dfsg/ace/Hash_Map_With_Allocator_T.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_CODgram.h
Examining data/ace-6.5.12+dfsg/ace/POSIX_CB_Proactor.h
Examining data/ace-6.5.12+dfsg/ace/Shared_Object.cpp
Examining data/ace-6.5.12+dfsg/ace/Msg_WFMO_Reactor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Size.cpp
Examining data/ace-6.5.12+dfsg/ace/config-netbsd.h
Examining data/ace-6.5.12+dfsg/ace/Proactor.h
Examining data/ace-6.5.12+dfsg/ace/Asynch_Pseudo_Task.h
Examining data/ace-6.5.12+dfsg/ace/Refcountable_T.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.h
Examining data/ace-6.5.12+dfsg/ace/Message_Block_T.h
Examining data/ace-6.5.12+dfsg/ace/XTI_ATM_Mcast.h
Examining data/ace-6.5.12+dfsg/ace/Multihomed_INET_Addr.h
Examining data/ace-6.5.12+dfsg/ace/MMAP_Memory_Pool.h
Examining data/ace-6.5.12+dfsg/ace/Naming_Context.h
Examining data/ace-6.5.12+dfsg/ace/Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/Flag_Manip.cpp
Examining data/ace-6.5.12+dfsg/ace/Basic_Types.cpp
Examining data/ace-6.5.12+dfsg/ace/Refcounted_Auto_Ptr.cpp
Examining data/ace-6.5.12+dfsg/ace/Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/Reactor_Impl.h
Examining data/ace-6.5.12+dfsg/ace/Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/SString.cpp
Examining data/ace-6.5.12+dfsg/ace/DLL.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-tiger.h
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc-8.h
Examining data/ace-6.5.12+dfsg/ace/ATM_QoS.h
Examining data/ace-6.5.12+dfsg/ace/Synch_Traits.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-iOS.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_pwd.h
Examining data/ace-6.5.12+dfsg/ace/Shared_Memory_SV.cpp
Examining data/ace-6.5.12+dfsg/ace/System_Time.cpp
Examining data/ace-6.5.12+dfsg/ace/Assert.cpp
Examining data/ace-6.5.12+dfsg/ace/Singleton.cpp
Examining data/ace-6.5.12+dfsg/ace/Service_Repository.cpp
Examining data/ace-6.5.12+dfsg/ace/TTY_IO.cpp
Examining data/ace-6.5.12+dfsg/ace/Atomic_Op.h
Examining data/ace-6.5.12+dfsg/ace/config-vxworks6.4.h
Examining data/ace-6.5.12+dfsg/ace/SPIPE_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/XML_Svc_Conf.cpp
Examining data/ace-6.5.12+dfsg/ace/ACE_export.h
Examining data/ace-6.5.12+dfsg/ace/config-lynxos.h
Examining data/ace-6.5.12+dfsg/ace/Message_Queue.cpp
Examining data/ace-6.5.12+dfsg/ace/config-aix-5.x.h
Examining data/ace-6.5.12+dfsg/ace/Service_Types.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Semaphore.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Adapter.cpp
Examining data/ace-6.5.12+dfsg/ace/Reactor_Token_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Timer_Hash_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Countdown_Time.h
Examining data/ace-6.5.12+dfsg/ace/Thread_Mutex.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_ctype.h
Examining data/ace-6.5.12+dfsg/ace/Basic_Stats.h
Examining data/ace-6.5.12+dfsg/ace/Null_Barrier.h
Examining data/ace-6.5.12+dfsg/ace/OS_Thread_Adapter.h
Examining data/ace-6.5.12+dfsg/ace/Msg_WFMO_Reactor.cpp
Examining data/ace-6.5.12+dfsg/ace/config-linux.h
Examining data/ace-6.5.12+dfsg/ace/RW_Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/LSOCK_CODgram.cpp
Examining data/ace-6.5.12+dfsg/ace/Profile_Timer.h
Examining data/ace-6.5.12+dfsg/ace/Atomic_Op_T.h
Examining data/ace-6.5.12+dfsg/ace/Activation_Queue.cpp
Examining data/ace-6.5.12+dfsg/ace/Managed_Object.cpp
Examining data/ace-6.5.12+dfsg/ace/Svc_Conf_Param.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-mojave.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_socket.h
Examining data/ace-6.5.12+dfsg/ace/MEM_Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/os_include/os_aio.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_intrin.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_float.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_dlfcn.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_regex.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_nl_types.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_ndbm.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_mman.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_sysctl.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_socket.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_times.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_wait.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_resource.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_shm.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_types.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_sysinfo.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_sem.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_select.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_uio.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_timeb.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_utsname.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_loadavg.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_stat.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_ipc.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_msg.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_statvfs.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_time.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_un.h
Examining data/ace-6.5.12+dfsg/ace/os_include/sys/os_pstat.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_search.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_fenv.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_typeinfo.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_stdlib.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_complex.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_utime.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_ftw.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_ifaddrs.h
Examining data/ace-6.5.12+dfsg/ace/os_include/arpa/os_inet.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_strings.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_grp.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_syslog.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_libgen.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_pdhmsg.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_stropts.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_ucontext.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_byteswap.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_netdb.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_signal.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_fmtmsg.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_sched.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_kstat.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_stdint.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_glob.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_setjmp.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_trace.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_wordexp.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_ulimit.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_monetary.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_poll.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_pdh.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_limits.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_stddef.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_spawn.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_tgmath.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_dirent.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_tar.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_wctype.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_iconv.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_pwd.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_fnmatch.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_stdio.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_utmpx.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_fcntl.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_time.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_semaphore.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_wchar.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_string.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_termios.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_pthread.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_local.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_stdbool.h
Examining data/ace-6.5.12+dfsg/ace/os_include/net/os_if.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_mqueue.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_ctype.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_inttypes.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_cpio.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_iso646.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_unistd.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_math.h
Examining data/ace-6.5.12+dfsg/ace/os_include/netinet/os_in.h
Examining data/ace-6.5.12+dfsg/ace/os_include/netinet/os_tcp.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_assert.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_errno.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_stdarg.h
Examining data/ace-6.5.12+dfsg/ace/os_include/os_langinfo.h
Examining data/ace-6.5.12+dfsg/ace/Unbounded_Queue.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_shm.cpp
Examining data/ace-6.5.12+dfsg/ace/Time_Policy.h
Examining data/ace-6.5.12+dfsg/ace/config-windows.h
Examining data/ace-6.5.12+dfsg/ace/TLI_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Heap.h
Examining data/ace-6.5.12+dfsg/ace/Parse_Node.h
Examining data/ace-6.5.12+dfsg/ace/TLI.h
Examining data/ace-6.5.12+dfsg/ace/ATM_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/UPIPE_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/CDR_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/Active_Map_Manager_T.cpp
Examining data/ace-6.5.12+dfsg/ace/RW_Mutex.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_dirent.h
Examining data/ace-6.5.12+dfsg/ace/Cache_Map_Manager_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Signal.cpp
Examining data/ace-6.5.12+dfsg/ace/FlReactor/FlReactor.cpp
Examining data/ace-6.5.12+dfsg/ace/FlReactor/FlReactor.h
Examining data/ace-6.5.12+dfsg/ace/FlReactor/ACE_FlReactor_export.h
Examining data/ace-6.5.12+dfsg/ace/Argv_Type_Converter.cpp
Examining data/ace-6.5.12+dfsg/ace/Handle_Set.cpp
Examining data/ace-6.5.12+dfsg/ace/Active_Map_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/Cleanup_Strategies_T.cpp
Examining data/ace-6.5.12+dfsg/ace/UNIX_Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/ATM_Params.h
Examining data/ace-6.5.12+dfsg/ace/Shared_Object.h
Examining data/ace-6.5.12+dfsg/ace/OS_TLI.h
Examining data/ace-6.5.12+dfsg/ace/Countdown_Time_T.cpp
Examining data/ace-6.5.12+dfsg/ace/ATM_Params.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_signal.h
Examining data/ace-6.5.12+dfsg/ace/Malloc_T.h
Examining data/ace-6.5.12+dfsg/ace/Name_Proxy.h
Examining data/ace-6.5.12+dfsg/ace/config-hurd.h
Examining data/ace-6.5.12+dfsg/ace/Sbrk_Memory_Pool.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Adapter.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_Netlink.h
Examining data/ace-6.5.12+dfsg/ace/IO_SAP.h
Examining data/ace-6.5.12+dfsg/ace/Unbounded_Set_Ex.cpp
Examining data/ace-6.5.12+dfsg/ace/Array_Map.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_math.h
Examining data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.h
Examining data/ace-6.5.12+dfsg/ace/IO_SAP.cpp
Examining data/ace-6.5.12+dfsg/ace/IOStream.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/Recursive_Thread_Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/Message_Queue_NT.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_select.h
Examining data/ace-6.5.12+dfsg/ace/Unbounded_Set.h
Examining data/ace-6.5.12+dfsg/ace/Dump_T.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_netdb.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-sierra.h
Examining data/ace-6.5.12+dfsg/ace/Message_Queue_Vx.cpp
Examining data/ace-6.5.12+dfsg/ace/Module.cpp
Examining data/ace-6.5.12+dfsg/ace/Node.cpp
Examining data/ace-6.5.12+dfsg/ace/Stack_Trace.h
Examining data/ace-6.5.12+dfsg/ace/Token_Collection.cpp
Examining data/ace-6.5.12+dfsg/ace/Object_Manager_Base.h
Examining data/ace-6.5.12+dfsg/ace/Process_Manager.h
Examining data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.h
Examining data/ace-6.5.12+dfsg/ace/Condition_Recursive_Thread_Mutex.h
Examining data/ace-6.5.12+dfsg/ace/TSS_T.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc-9.h
Examining data/ace-6.5.12+dfsg/ace/Time_Value_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Synch_Options.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_poll.cpp
Examining data/ace-6.5.12+dfsg/ace/Base_Thread_Adapter.cpp
Examining data/ace-6.5.12+dfsg/ace/DEV_IO.h
Examining data/ace-6.5.12+dfsg/ace/Node.h
Examining data/ace-6.5.12+dfsg/ace/Containers_T.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_regex.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Linux_Network_Interface_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Solaris_Network_Interface_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Monitor_Query.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Monitor_Control_export.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Windows_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Constraint_Visitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Packets_Received_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Constraint_Interpreter.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Null_Network_Interface_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Monitor_Group.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Memory_Usage_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Solaris_Network_Interface_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Null_Network_Interface_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Num_Threads_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Bytes_Received_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Constraint_Interpreter.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Packets_Sent_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/BSD_Network_Interface_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Windows_Multi_Instance_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/FreeBSD_Network_Interface_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Auto_Update_Starter.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Monitor_Control_utils.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/CPU_Load_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Num_Threads_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Constraint_Visitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Auto_Update_Starter.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Monitor_Group.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Memory_Usage_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Bytes_Sent_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/CPU_Load_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Packets_Received_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Linux_Network_Interface_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Bytes_Received_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Bytes_Sent_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/BSD_Network_Interface_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Windows_Multi_Instance_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Windows_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/FreeBSD_Network_Interface_Monitor.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Packets_Sent_Monitor.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Monitor_Query.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control/Monitor_Control.h
Examining data/ace-6.5.12+dfsg/ace/Hashable.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_stat.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h
Examining data/ace-6.5.12+dfsg/ace/Refcountable_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Message_Queue_NT.h
Examining data/ace-6.5.12+dfsg/ace/RB_Tree.cpp
Examining data/ace-6.5.12+dfsg/ace/Task_Ex_T.h
Examining data/ace-6.5.12+dfsg/ace/Codeset_Registry_db.cpp
Examining data/ace-6.5.12+dfsg/ace/Registry.h
Examining data/ace-6.5.12+dfsg/ace/FILE_Addr.h
Examining data/ace-6.5.12+dfsg/ace/FILE_IO.h
Examining data/ace-6.5.12+dfsg/ace/NT_Service.cpp
Examining data/ace-6.5.12+dfsg/ace/Cleanup.cpp
Examining data/ace-6.5.12+dfsg/ace/Token_Request_Reply.h
Examining data/ace-6.5.12+dfsg/ace/Dynamic_Service_Dependency.h
Examining data/ace-6.5.12+dfsg/ace/DEV.h
Examining data/ace-6.5.12+dfsg/ace/Log_Record.cpp
Examining data/ace-6.5.12+dfsg/ace/DEV_Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/Codeset_IBM1047.h
Examining data/ace-6.5.12+dfsg/ace/SV_Message.h
Examining data/ace-6.5.12+dfsg/ace/LSOCK.h
Examining data/ace-6.5.12+dfsg/ace/config-vxworks6.8.h
Examining data/ace-6.5.12+dfsg/ace/Strategies_T.h
Examining data/ace-6.5.12+dfsg/ace/XTI_ATM_Mcast.cpp
Examining data/ace-6.5.12+dfsg/ace/Env_Value_T.h
Examining data/ace-6.5.12+dfsg/ace/Semaphore.h
Examining data/ace-6.5.12+dfsg/ace/Bound_Ptr.h
Examining data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp
Examining data/ace-6.5.12+dfsg/ace/String_Base_Const.h
Examining data/ace-6.5.12+dfsg/ace/Based_Pointer_Repository.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_errno.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control_Action.h
Examining data/ace-6.5.12+dfsg/ace/config-win32-interix.h
Examining data/ace-6.5.12+dfsg/ace/Condition_Thread_Mutex.h
Examining data/ace-6.5.12+dfsg/ace/Dynamic_Service_Base.h
Examining data/ace-6.5.12+dfsg/ace/SPIPE_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Future_Set.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_msg.cpp
Examining data/ace-6.5.12+dfsg/ace/Encoding_Converter_Factory.h
Examining data/ace-6.5.12+dfsg/ace/OS_TLI.cpp
Examining data/ace-6.5.12+dfsg/ace/Asynch_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Condition_T.cpp
Examining data/ace-6.5.12+dfsg/ace/DEV_Addr.h
Examining data/ace-6.5.12+dfsg/ace/Timeprobe_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Dirent.cpp
Examining data/ace-6.5.12+dfsg/ace/Future.cpp
Examining data/ace-6.5.12+dfsg/ace/Sock_Connect.h
Examining data/ace-6.5.12+dfsg/ace/Cleanup_Strategies_T.h
Examining data/ace-6.5.12+dfsg/ace/Codecs.cpp
Examining data/ace-6.5.12+dfsg/ace/LSOCK_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/config-g++-common.h
Examining data/ace-6.5.12+dfsg/ace/LOCK_SOCK_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/Semaphore.cpp
Examining data/ace-6.5.12+dfsg/ace/Barrier.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_resource.cpp
Examining data/ace-6.5.12+dfsg/ace/Dynamic_Message_Strategy.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp
Examining data/ace-6.5.12+dfsg/ace/SPIPE.h
Examining data/ace-6.5.12+dfsg/ace/Local_Name_Space.cpp
Examining data/ace-6.5.12+dfsg/ace/SPIPE_Addr.h
Examining data/ace-6.5.12+dfsg/ace/Local_Memory_Pool.h
Examining data/ace-6.5.12+dfsg/ace/LOCK_SOCK_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Queue_T.cpp
Examining data/ace-6.5.12+dfsg/ace/TkReactor/TkReactor.h
Examining data/ace-6.5.12+dfsg/ace/TkReactor/TkReactor.cpp
Examining data/ace-6.5.12+dfsg/ace/TkReactor/ACE_TkReactor_export.h
Examining data/ace-6.5.12+dfsg/ace/Atomic_Op_Sparc.c
Examining data/ace-6.5.12+dfsg/ace/config-mqx.h
Examining data/ace-6.5.12+dfsg/ace/FILE.h
Examining data/ace-6.5.12+dfsg/ace/Token_Invariants.h
Examining data/ace-6.5.12+dfsg/ace/Process.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_stropts.h
Examining data/ace-6.5.12+dfsg/ace/PI_Malloc.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_ctype.cpp
Examining data/ace-6.5.12+dfsg/ace/CDR_Stream.h
Examining data/ace-6.5.12+dfsg/ace/UPIPE_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_Thread.h
Examining data/ace-6.5.12+dfsg/ace/SV_Semaphore_Complex.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Queuefwd.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Base.cpp
Examining data/ace-6.5.12+dfsg/ace/Rtems_init.c
Examining data/ace-6.5.12+dfsg/ace/Pipe.cpp
Examining data/ace-6.5.12+dfsg/ace/File_Lock.h
Examining data/ace-6.5.12+dfsg/ace/Configuration.cpp
Examining data/ace-6.5.12+dfsg/ace/Tokenizer_T.h
Examining data/ace-6.5.12+dfsg/ace/UPIPE_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Auto_Functor.h
Examining data/ace-6.5.12+dfsg/ace/MEM_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Message_Block.cpp
Examining data/ace-6.5.12+dfsg/ace/Svc_Conf.h
Examining data/ace-6.5.12+dfsg/ace/Auto_Ptr.h
Examining data/ace-6.5.12+dfsg/ace/Connection_Recycling_Strategy.h
Examining data/ace-6.5.12+dfsg/ace/ATM_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/Sbrk_Memory_Pool.h
Examining data/ace-6.5.12+dfsg/ace/Based_Pointer_Repository.cpp
Examining data/ace-6.5.12+dfsg/ace/Future.h
Examining data/ace-6.5.12+dfsg/ace/TLI_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp
Examining data/ace-6.5.12+dfsg/ace/Map_Manager.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_arpa_inet.cpp
Examining data/ace-6.5.12+dfsg/ace/config-openvms.h
Examining data/ace-6.5.12+dfsg/ace/Remote_Name_Space.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_Callback.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Hook.h
Examining data/ace-6.5.12+dfsg/ace/Tokenizer_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Size.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Heap_T.cpp
Examining data/ace-6.5.12+dfsg/ace/UTF32_Encoding_Converter.cpp
Examining data/ace-6.5.12+dfsg/ace/Array_Map.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_time.cpp
Examining data/ace-6.5.12+dfsg/ace/Netlink_Addr.h
Examining data/ace-6.5.12+dfsg/ace/Asynch_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/config-posix-nonetworking.h
Examining data/ace-6.5.12+dfsg/ace/Condition_Thread_Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_string.h
Examining data/ace-6.5.12+dfsg/ace/config-posix.h
Examining data/ace-6.5.12+dfsg/ace/SStringfwd.h
Examining data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp
Examining data/ace-6.5.12+dfsg/ace/SUN_Proactor.cpp
Examining data/ace-6.5.12+dfsg/ace/Notification_Strategy.h
Examining data/ace-6.5.12+dfsg/ace/Default_Constants.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_SOCK.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_SOCK_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_SOCK_Connector.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_Initializer.cpp
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_SOCK.cpp
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_BIO.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_SOCK_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_Initializer.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.cpp
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_BIO.cpp
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_SOCK_Stream.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_SOCK_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/SSL/sslconf.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_SOCK_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_Export.h
Examining data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.h
Examining data/ace-6.5.12+dfsg/ace/UTF16_Encoding_Converter.h
Examining data/ace-6.5.12+dfsg/ace/Module.h
Examining data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp
Examining data/ace-6.5.12+dfsg/ace/Unbounded_Queue.cpp
Examining data/ace-6.5.12+dfsg/ace/Functor_T.cpp
Examining data/ace-6.5.12+dfsg/ace/CDR_Base.h
Examining data/ace-6.5.12+dfsg/ace/Env_Value_T.cpp
Examining data/ace-6.5.12+dfsg/ace/RW_Process_Mutex.h
Examining data/ace-6.5.12+dfsg/ace/FIFO_Recv.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_dlfcn.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Admin_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_time.h
Examining data/ace-6.5.12+dfsg/ace/Registry_Name_Space.cpp
Examining data/ace-6.5.12+dfsg/ace/SPIPE_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/Throughput_Stats.h
Examining data/ace-6.5.12+dfsg/ace/Shared_Memory.cpp
Examining data/ace-6.5.12+dfsg/ace/Process_Semaphore.h
Examining data/ace-6.5.12+dfsg/ace/Date_Time.h
Examining data/ace-6.5.12+dfsg/ace/Filecache.cpp
Examining data/ace-6.5.12+dfsg/ace/Time_Value.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_Stream.h
Examining data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.h
Examining data/ace-6.5.12+dfsg/ace/Svc_Handler.h
Examining data/ace-6.5.12+dfsg/ace/Framework_Component_T.cpp
Examining data/ace-6.5.12+dfsg/ace/FILE_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/Vector_T.cpp
Examining data/ace-6.5.12+dfsg/ace/ATM_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Multihomed_INET_Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Bcast.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/Obchunk.h
Examining data/ace-6.5.12+dfsg/ace/QtReactor/QtReactor.h
Examining data/ace-6.5.12+dfsg/ace/QtReactor/QtReactor.cpp
Examining data/ace-6.5.12+dfsg/ace/QtReactor/ACE_QtReactor_export.h
Examining data/ace-6.5.12+dfsg/ace/Reverse_Lock_T.h
Examining data/ace-6.5.12+dfsg/ace/Guard_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread.cpp
Examining data/ace-6.5.12+dfsg/ace/Time_Policy_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Timer_Wheel.h
Examining data/ace-6.5.12+dfsg/ace/Remote_Name_Space.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Admin.h
Examining data/ace-6.5.12+dfsg/ace/SV_Message_Queue.h
Examining data/ace-6.5.12+dfsg/ace/OS_Errno.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Semaphore.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Bcast.h
Examining data/ace-6.5.12+dfsg/ace/Caching_Utility_T.h
Examining data/ace-6.5.12+dfsg/ace/Strategies_T.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp
Examining data/ace-6.5.12+dfsg/ace/Event_Handler_T.h
Examining data/ace-6.5.12+dfsg/ace/Token_Manager.h
Examining data/ace-6.5.12+dfsg/ace/Init_ACE.cpp
Examining data/ace-6.5.12+dfsg/ace/DEV.cpp
Examining data/ace-6.5.12+dfsg/ace/Based_Pointer_T.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-panther.h
Examining data/ace-6.5.12+dfsg/ace/Typed_SV_Message_Queue.cpp
Examining data/ace-6.5.12+dfsg/ace/IPC_SAP.h
Examining data/ace-6.5.12+dfsg/ace/MEM_SAP.h
Examining data/ace-6.5.12+dfsg/ace/Intrusive_List_Node.h
Examining data/ace-6.5.12+dfsg/ace/LSOCK_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/DEV_IO.cpp
Examining data/ace-6.5.12+dfsg/ace/Versioned_Namespace.h
Examining data/ace-6.5.12+dfsg/ace/MMAP_Memory_Pool.cpp
Examining data/ace-6.5.12+dfsg/ace/CDR_Base.cpp
Examining data/ace-6.5.12+dfsg/ace/Recyclable.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control_Action.cpp
Examining data/ace-6.5.12+dfsg/ace/Shared_Memory_Pool.h
Examining data/ace-6.5.12+dfsg/ace/Null_Condition.h
Examining data/ace-6.5.12+dfsg/ace/UUID.cpp
Examining data/ace-6.5.12+dfsg/ace/UNIX_Addr.h
Examining data/ace-6.5.12+dfsg/ace/config-macros.h
Examining data/ace-6.5.12+dfsg/ace/OS.h
Examining data/ace-6.5.12+dfsg/ace/Service_Object.h
Examining data/ace-6.5.12+dfsg/ace/Codeset_Registry.cpp
Examining data/ace-6.5.12+dfsg/ace/Lock.cpp
Examining data/ace-6.5.12+dfsg/ace/ICMP_Socket.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Queue.h
Examining data/ace-6.5.12+dfsg/ace/Sample_History.h
Examining data/ace-6.5.12+dfsg/ace/Sched_Params.h
Examining data/ace-6.5.12+dfsg/ace/Based_Pointer_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Handle_Gobbler.h
Examining data/ace-6.5.12+dfsg/ace/Thread_Exit.cpp
Examining data/ace-6.5.12+dfsg/ace/Event_Base.cpp
Examining data/ace-6.5.12+dfsg/ace/Condition_Attributes.cpp
Examining data/ace-6.5.12+dfsg/ace/Pair_T.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Heap_T.h
Examining data/ace-6.5.12+dfsg/ace/Auto_IncDec_T.h
Examining data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/RW_Process_Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/Timer_Wheel_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Shared_Memory_MM.h
Examining data/ace-6.5.12+dfsg/ace/Version.h
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc-14.h
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_NT_Event_Log.cpp
Examining data/ace-6.5.12+dfsg/ace/config-aix-7.h
Examining data/ace-6.5.12+dfsg/ace/FILE_Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Admin.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc-7.h
Examining data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.cpp
Examining data/ace-6.5.12+dfsg/ace/pre.h
Examining data/ace-6.5.12+dfsg/ace/ICMP_Socket.cpp
Examining data/ace-6.5.12+dfsg/ace/IOStream_T.h
Examining data/ace-6.5.12+dfsg/ace/Proactor_Impl.h
Examining data/ace-6.5.12+dfsg/ace/SPIPE.cpp
Examining data/ace-6.5.12+dfsg/ace/Future_Set.h
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_Backend.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_wait.h
Examining data/ace-6.5.12+dfsg/ace/FIFO_Send.cpp
Examining data/ace-6.5.12+dfsg/ace/Sample_History.cpp
Examining data/ace-6.5.12+dfsg/ace/ATM_Stream.h
Examining data/ace-6.5.12+dfsg/ace/Compression/Compressor.h
Examining data/ace-6.5.12+dfsg/ace/Compression/rle/RLECompressor.h
Examining data/ace-6.5.12+dfsg/ace/Compression/rle/RLECompressor.cpp
Examining data/ace-6.5.12+dfsg/ace/Compression/rle/ACE_RLECompression_export.h
Examining data/ace-6.5.12+dfsg/ace/Compression/Compressor.cpp
Examining data/ace-6.5.12+dfsg/ace/Compression/ACE_Compression_export.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_strings.h
Examining data/ace-6.5.12+dfsg/ace/Cache_Map_Manager_T.h
Examining data/ace-6.5.12+dfsg/ace/Flag_Manip.h
Examining data/ace-6.5.12+dfsg/ace/String_Base.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc.h
Examining data/ace-6.5.12+dfsg/ace/Guard_T.h
Examining data/ace-6.5.12+dfsg/ace/Map_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/SV_Shared_Memory.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_math.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Association.h
Examining data/ace-6.5.12+dfsg/ace/Service_Gestalt.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-mountainlion.h
Examining data/ace-6.5.12+dfsg/ace/Process_Mutex.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_Dgram.h
Examining data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Admin_Manager.h
Examining data/ace-6.5.12+dfsg/ace/SString.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Wheel_T.h
Examining data/ace-6.5.12+dfsg/ace/ace_wchar.cpp
Examining data/ace-6.5.12+dfsg/ace/Stats.h
Examining data/ace-6.5.12+dfsg/ace/Atomic_Op_GCC_T.h
Examining data/ace-6.5.12+dfsg/ace/Handle_Set.h
Examining data/ace-6.5.12+dfsg/ace/config-hpux-11.00.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_devctl.cpp
Examining data/ace-6.5.12+dfsg/ace/Event_Handler_Handle_Timeout_Upcall.cpp
Examining data/ace-6.5.12+dfsg/ace/Token_Invariants.cpp
Examining data/ace-6.5.12+dfsg/ace/Reactor.h
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XML_Typedefs.cpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XML_Helper.h
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XercesString.cpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XML_Error_Handler.h
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XML_Typedefs.h
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XML_Error_Handler.cpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XercesString.h
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XMLSchema/Traversal.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XMLSchema/Types.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XMLSchema/TypeInfo.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XMLSchema/id_map.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XMLSchema/Writer.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/Traversal.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/XML.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/XMLSchema.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/Elements.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/ExtendedTypeInfo.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/Parser.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/Writer.hpp
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XML_Utils_Export.h
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XML_Schema_Resolver.h
Examining data/ace-6.5.12+dfsg/ace/XML_Utils/XML_Schema_Resolver.cpp
Examining data/ace-6.5.12+dfsg/ace/Reactor_Timer_Interface.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Exit.h
Examining data/ace-6.5.12+dfsg/ace/UTF16_Encoding_Converter.cpp
Examining data/ace-6.5.12+dfsg/ace/svc_export.h
Examining data/ace-6.5.12+dfsg/ace/Netlink_Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/Naming_Context.cpp
Examining data/ace-6.5.12+dfsg/ace/Get_Opt.cpp
Examining data/ace-6.5.12+dfsg/ace/Message_Block.h
Examining data/ace-6.5.12+dfsg/ace/Malloc.cpp
Examining data/ace-6.5.12+dfsg/ace/Unbounded_Set.cpp
Examining data/ace-6.5.12+dfsg/ace/Local_Tokens.h
Examining data/ace-6.5.12+dfsg/ace/Lib_Find.h
Examining data/ace-6.5.12+dfsg/ace/UUID.h
Examining data/ace-6.5.12+dfsg/ace/Asynch_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/Active_Map_Manager.h
Examining data/ace-6.5.12+dfsg/ace/OS_QoS.h
Examining data/ace-6.5.12+dfsg/ace/CORBA_macros.h
Examining data/ace-6.5.12+dfsg/ace/config-kfreebsd.h
Examining data/ace-6.5.12+dfsg/ace/Hash_Map_Manager_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Name_Request_Reply.h
Examining data/ace-6.5.12+dfsg/ace/Numeric_Limits.h
Examining data/ace-6.5.12+dfsg/ace/Process_Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/TTY_IO.h
Examining data/ace-6.5.12+dfsg/ace/System_Time.h
Examining data/ace-6.5.12+dfsg/ace/Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/Select_Reactor.h
Examining data/ace-6.5.12+dfsg/ace/TP_Reactor.h
Examining data/ace-6.5.12+dfsg/ace/Log_Category.h
Examining data/ace-6.5.12+dfsg/ace/CDR_Size.h
Examining data/ace-6.5.12+dfsg/ace/IOStream_T.cpp
Examining data/ace-6.5.12+dfsg/ace/FoxReactor/ACE_FoxReactor_export.h
Examining data/ace-6.5.12+dfsg/ace/FoxReactor/FoxReactor.h
Examining data/ace-6.5.12+dfsg/ace/FoxReactor/FoxReactor.cpp
Examining data/ace-6.5.12+dfsg/ace/config-vxworks6.9.h
Examining data/ace-6.5.12+dfsg/ace/Event_Base.h
Examining data/ace-6.5.12+dfsg/ace/Reverse_Lock_T.cpp
Examining data/ace-6.5.12+dfsg/ace/config-sunos5.11.h
Examining data/ace-6.5.12+dfsg/ace/Service_Types.h
Examining data/ace-6.5.12+dfsg/ace/Reactor_Notification_Strategy.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_resource.h
Examining data/ace-6.5.12+dfsg/ace/Token_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/ARGV.cpp
Examining data/ace-6.5.12+dfsg/ace/config-vxworks6.5.h
Examining data/ace-6.5.12+dfsg/ace/config-pharlap.h
Examining data/ace-6.5.12+dfsg/ace/Dirent_Selector.h
Examining data/ace-6.5.12+dfsg/ace/Containers.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h
Examining data/ace-6.5.12+dfsg/ace/High_Res_Timer.h
Examining data/ace-6.5.12+dfsg/ace/Lock.h
Examining data/ace-6.5.12+dfsg/ace/Encoding_Converter_Factory.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_Android_Logcat.h
Examining data/ace-6.5.12+dfsg/ace/Activation_Queue.h
Examining data/ace-6.5.12+dfsg/ace/Functor.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Control.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp
Parsing failed to find end of parameter list; semicolon terminated it in  (SOCK_STREAM,
#else
  if (ACE_SOCK::open (SOCK_SEQPACKET,
#endif
                      protocol_family,
                      protocol,
                      protocolinfo,
                      g,
  
Parsing failed to find end of parameter list; semicolon terminated it in  (SOCK_STREAM,
#else
  if (ACE_SOCK::open (SOCK_SEQPACKET,
#endif
                      protocol_family,
                      protocol,
                      reuse_addr) == -1)
    return -1;
  else

Parsing failed to find end of parameter list; semicolon terminated it in  (SOCK_STREAM,
#else
  if (ACE_SOCK::open (SOCK_SEQPACKET,
#endif
                      protocol_family,
                      protocol,
                      reuse_addr) == -1)
    return -1;
  else

Examining data/ace-6.5.12+dfsg/ace/Copy_Disabled.h
Examining data/ace-6.5.12+dfsg/ace/config-openbsd.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Point_Registry.cpp
Examining data/ace-6.5.12+dfsg/ace/MEM_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_Android_Logcat.cpp
Examining data/ace-6.5.12+dfsg/ace/Global_Macros.h
Examining data/ace-6.5.12+dfsg/ace/Hash_Map_With_Allocator_T.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_stropts.cpp
Examining data/ace-6.5.12+dfsg/ace/Stream.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_time.h
Examining data/ace-6.5.12+dfsg/ace/RW_Thread_Mutex.h
Examining data/ace-6.5.12+dfsg/ace/Thread.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-yosemite.h
Examining data/ace-6.5.12+dfsg/ace/FIFO.h
Examining data/ace-6.5.12+dfsg/ace/Handle_Ops.cpp
Examining data/ace-6.5.12+dfsg/ace/Trace.cpp
Examining data/ace-6.5.12+dfsg/ace/Auto_Functor.cpp
Examining data/ace-6.5.12+dfsg/ace/Method_Request.h
Examining data/ace-6.5.12+dfsg/ace/Synch.h
Examining data/ace-6.5.12+dfsg/ace/Intrusive_List.cpp
Examining data/ace-6.5.12+dfsg/ace/Synch_Options.cpp
Examining data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.h
Examining data/ace-6.5.12+dfsg/ace/FIFO_Send_Msg.cpp
Examining data/ace-6.5.12+dfsg/ace/Typed_SV_Message.h
Examining data/ace-6.5.12+dfsg/ace/ATM_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/Array_Base.cpp
Examining data/ace-6.5.12+dfsg/ace/Typed_SV_Message.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_wctype.h
Examining data/ace-6.5.12+dfsg/ace/Condition_Recursive_Thread_Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/TP_Reactor.cpp
Examining data/ace-6.5.12+dfsg/ace/Atomic_Op.cpp
Examining data/ace-6.5.12+dfsg/ace/Basic_Stats.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/Priority_Reactor.cpp
Examining data/ace-6.5.12+dfsg/ace/MEM_Addr.h
Examining data/ace-6.5.12+dfsg/ace/Stream_Modules.cpp
Examining data/ace-6.5.12+dfsg/ace/Dirent_Selector.cpp
Examining data/ace-6.5.12+dfsg/ace/MEM_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_UNIX_Syslog.h
Examining data/ace-6.5.12+dfsg/ace/Framework_Component_T.h
Examining data/ace-6.5.12+dfsg/ace/Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/Service_Manager.h
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_IPC.cpp
Examining data/ace-6.5.12+dfsg/ace/Reactor_Timer_Interface.h
Examining data/ace-6.5.12+dfsg/ace/Local_Tokens.cpp
Examining data/ace-6.5.12+dfsg/ace/config-sunos5.9.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Association.cpp
Examining data/ace-6.5.12+dfsg/ace/Name_Space.cpp
Examining data/ace-6.5.12+dfsg/ace/SPIPE_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/Svc_Conf_y.cpp
Examining data/ace-6.5.12+dfsg/ace/MEM_IO.cpp
Examining data/ace-6.5.12+dfsg/ace/Addr.h
Examining data/ace-6.5.12+dfsg/ace/Framework_Component.h
Examining data/ace-6.5.12+dfsg/ace/LSOCK.cpp
Examining data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp
Examining data/ace-6.5.12+dfsg/ace/Auto_IncDec_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Signal.h
Examining data/ace-6.5.12+dfsg/ace/Proactor.cpp
Examining data/ace-6.5.12+dfsg/ace/Sig_Handler.cpp
Examining data/ace-6.5.12+dfsg/ace/Codeset_Registry.h
Examining data/ace-6.5.12+dfsg/ace/Obstack_T.h
Examining data/ace-6.5.12+dfsg/ace/config-WinCE.h
Examining data/ace-6.5.12+dfsg/ace/Dump_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Event.h
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc-10.h
Examining data/ace-6.5.12+dfsg/ace/UPIPE_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/FIFO.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_errno.cpp
Examining data/ace-6.5.12+dfsg/ace/Truncate.h
Examining data/ace-6.5.12+dfsg/ace/WIN32_Proactor.h
Examining data/ace-6.5.12+dfsg/ace/Proactor_Impl.cpp
Examining data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp
Examining data/ace-6.5.12+dfsg/ace/Init_ACE.h
Examining data/ace-6.5.12+dfsg/ace/Containers_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Monitor_Point_Registry.h
Examining data/ace-6.5.12+dfsg/ace/Name_Proxy.cpp
Examining data/ace-6.5.12+dfsg/ace/Remote_Tokens.cpp
Examining data/ace-6.5.12+dfsg/ace/WFMO_Reactor.cpp
Examining data/ace-6.5.12+dfsg/ace/Timeprobe_T.h
Examining data/ace-6.5.12+dfsg/ace/config-sunos5.7.h
Examining data/ace-6.5.12+dfsg/ace/LSOCK_Stream.h
Examining data/ace-6.5.12+dfsg/ace/UPIPE_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Control.h
Examining data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.h
Examining data/ace-6.5.12+dfsg/ace/Sig_Adapter.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_main.cpp
Examining data/ace-6.5.12+dfsg/ace/Monotonic_Time_Policy.cpp
Examining data/ace-6.5.12+dfsg/ace/Obstack.h
Examining data/ace-6.5.12+dfsg/ace/Reactor_Impl.cpp
Examining data/ace-6.5.12+dfsg/ace/Time_Value.h
Examining data/ace-6.5.12+dfsg/ace/Object_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/Bound_Ptr.cpp
Examining data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp
Examining data/ace-6.5.12+dfsg/ace/config-sunos5.4-g++.h
Examining data/ace-6.5.12+dfsg/ace/config-sunos5.8.h
Examining data/ace-6.5.12+dfsg/ace/Select_Reactor_Base.h
Examining data/ace-6.5.12+dfsg/ace/SPIPE_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Record.h
Examining data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h
Examining data/ace-6.5.12+dfsg/ace/SV_Shared_Memory.cpp
Examining data/ace-6.5.12+dfsg/ace/config-lite.h
Examining data/ace-6.5.12+dfsg/ace/Method_Request.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_strings.cpp
Examining data/ace-6.5.12+dfsg/ace/Pipe.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_pwd.cpp
Examining data/ace-6.5.12+dfsg/ace/Service_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/config-vxworks6.7.h
Examining data/ace-6.5.12+dfsg/ace/Malloc_Allocator.cpp
Examining data/ace-6.5.12+dfsg/ace/config-icc-common.h
Examining data/ace-6.5.12+dfsg/ace/Functor_T.h
Examining data/ace-6.5.12+dfsg/ace/Refcounted_Auto_Ptr.h
Examining data/ace-6.5.12+dfsg/ace/CE_Screen_Output.h
Examining data/ace-6.5.12+dfsg/ace/Obstack_T.cpp
Examining data/ace-6.5.12+dfsg/ace/LSOCK_Dgram.h
Examining data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp
Examining data/ace-6.5.12+dfsg/ace/SV_Semaphore_Complex.cpp
Examining data/ace-6.5.12+dfsg/ace/Timeprobe.h
Examining data/ace-6.5.12+dfsg/ace/Local_Name_Space.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Hash_T.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/config-rtems.h
Examining data/ace-6.5.12+dfsg/ace/Hash_Multi_Map_Manager_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Logging_Strategy.h
Examining data/ace-6.5.12+dfsg/ace/Service_Config.cpp
Examining data/ace-6.5.12+dfsg/ace/config-macosx-highsierra.h
Examining data/ace-6.5.12+dfsg/ace/Mem_Map.cpp
Examining data/ace-6.5.12+dfsg/ace/UTF32_Encoding_Converter.h
Examining data/ace-6.5.12+dfsg/ace/Process_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp
Examining data/ace-6.5.12+dfsg/ace/config-vxworks7.0.h
Examining data/ace-6.5.12+dfsg/ace/Capabilities.cpp
Examining data/ace-6.5.12+dfsg/ace/config-sunos5.5.h
Examining data/ace-6.5.12+dfsg/ace/Configuration.h
Examining data/ace-6.5.12+dfsg/ace/Dump.h
Examining data/ace-6.5.12+dfsg/ace/SV_Message_Queue.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-cegcc.h
Examining data/ace-6.5.12+dfsg/ace/Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_Log_Msg_Attributes.cpp
Examining data/ace-6.5.12+dfsg/ace/Asynch_Pseudo_Task.cpp
Examining data/ace-6.5.12+dfsg/ace/config-all.h
Examining data/ace-6.5.12+dfsg/ace/config-suncc-common.h
Examining data/ace-6.5.12+dfsg/ace/UTF8_Encoding_Converter.cpp
Examining data/ace-6.5.12+dfsg/ace/Memory_Pool.h
Examining data/ace-6.5.12+dfsg/ace/WIN32_Proactor.cpp
Examining data/ace-6.5.12+dfsg/ace/Svc_Handler.cpp
Examining data/ace-6.5.12+dfsg/ace/Event_Handler.h
Examining data/ace-6.5.12+dfsg/ace/Message_Queue_T.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Queue_Adapters.h
Examining data/ace-6.5.12+dfsg/ace/Dynamic.h
Examining data/ace-6.5.12+dfsg/ace/Functor_String.cpp
Examining data/ace-6.5.12+dfsg/ace/Obchunk.cpp
Examining data/ace-6.5.12+dfsg/ace/Assert.h
Examining data/ace-6.5.12+dfsg/ace/Framework_Component.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_mman.h
Examining data/ace-6.5.12+dfsg/ace/Array_Base.h
Examining data/ace-6.5.12+dfsg/ace/Containers.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_sendfile.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc-142.h
Examining data/ace-6.5.12+dfsg/ace/Read_Buffer.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Manager.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control_Types.h
Examining data/ace-6.5.12+dfsg/ace/Auto_Event.cpp
Examining data/ace-6.5.12+dfsg/ace/Time_Value_T.h
Examining data/ace-6.5.12+dfsg/ace/TSS_Adapter.cpp
Examining data/ace-6.5.12+dfsg/ace/TSS_Adapter.h
Examining data/ace-6.5.12+dfsg/ace/ATM_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/Dynamic_Service.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_Netlink.cpp
Examining data/ace-6.5.12+dfsg/ace/Object_Manager.h
Examining data/ace-6.5.12+dfsg/ace/Intrusive_List.h
Examining data/ace-6.5.12+dfsg/ace/streams.h
Examining data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/Intrusive_Auto_Ptr.cpp
Examining data/ace-6.5.12+dfsg/ace/IO_Cntl_Msg.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Priority.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Queue_T.h
Examining data/ace-6.5.12+dfsg/ace/XML_Svc_Conf.h
Examining data/ace-6.5.12+dfsg/ace/Cleanup.h
Examining data/ace-6.5.12+dfsg/ace/Lock_Adapter_T.h
Examining data/ace-6.5.12+dfsg/ace/config-face-conftest.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-snowleopard.h
Examining data/ace-6.5.12+dfsg/ace/Parse_Node.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK.h
Examining data/ace-6.5.12+dfsg/ace/FIFO_Recv_Msg.h
Examining data/ace-6.5.12+dfsg/ace/If_Then_Else.h
Examining data/ace-6.5.12+dfsg/ace/ATM_Addr.h
Examining data/ace-6.5.12+dfsg/ace/Priority_Reactor.h
Examining data/ace-6.5.12+dfsg/ace/Abstract_Timer_Queue.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_select.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_stat.cpp
Examining data/ace-6.5.12+dfsg/ace/Arg_Shifter.h
Examining data/ace-6.5.12+dfsg/ace/Dirent.h
Examining data/ace-6.5.12+dfsg/ace/Handle_Ops.h
Examining data/ace-6.5.12+dfsg/ace/Notification_Strategy.cpp
Examining data/ace-6.5.12+dfsg/ace/Task.h
Examining data/ace-6.5.12+dfsg/ace/Filecache.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_wait.cpp
Examining data/ace-6.5.12+dfsg/ace/File_Lock.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.h
Examining data/ace-6.5.12+dfsg/ace/Reactor.cpp
Examining data/ace-6.5.12+dfsg/ace/Svc_Conf_Token_Table.h
Examining data/ace-6.5.12+dfsg/ace/FILE_IO.cpp
Examining data/ace-6.5.12+dfsg/ace/Intrusive_Auto_Ptr.h
Examining data/ace-6.5.12+dfsg/ace/checked_iterator.h
Examining data/ace-6.5.12+dfsg/ace/Dynamic_Message_Strategy.cpp
Examining data/ace-6.5.12+dfsg/ace/Profile_Timer.cpp
Examining data/ace-6.5.12+dfsg/ace/Condition_T.h
Examining data/ace-6.5.12+dfsg/ace/Shared_Memory_Pool.cpp
Examining data/ace-6.5.12+dfsg/ace/Managed_Object.h
Examining data/ace-6.5.12+dfsg/ace/Malloc.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_uio.h
Examining data/ace-6.5.12+dfsg/ace/ARGV.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp
Examining data/ace-6.5.12+dfsg/ace/Caching_Strategies_T.h
Examining data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp
Examining data/ace-6.5.12+dfsg/ace/Auto_Event.h
Examining data/ace-6.5.12+dfsg/ace/MQX_Filesystem.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_arpa_inet.h
Examining data/ace-6.5.12+dfsg/ace/Ping_Socket.h
Examining data/ace-6.5.12+dfsg/ace/SV_Message.cpp
Examining data/ace-6.5.12+dfsg/ace/Message_Block_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Codecs.h
Examining data/ace-6.5.12+dfsg/ace/Sched_Params.cpp
Examining data/ace-6.5.12+dfsg/ace/Hash_Multi_Map_Manager_T.h
Examining data/ace-6.5.12+dfsg/ace/TSS_T.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/SPIPE_Stream.h
Examining data/ace-6.5.12+dfsg/ace/POSIX_Proactor.h
Examining data/ace-6.5.12+dfsg/ace/INET_Addr.cpp
Examining data/ace-6.5.12+dfsg/ace/Registry.cpp
Examining data/ace-6.5.12+dfsg/ace/Name_Request_Reply.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_mman.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp
Examining data/ace-6.5.12+dfsg/ace/Stream_Modules.h
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_UNIX_Syslog.cpp
Examining data/ace-6.5.12+dfsg/ace/Encoding_Converter.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h
Examining data/ace-6.5.12+dfsg/ace/config-win32-common.h
Examining data/ace-6.5.12+dfsg/ace/TLI_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/Hash_Cache_Map_Manager_T.h
Examining data/ace-6.5.12+dfsg/ace/Hash_Map_Manager_T.h
Examining data/ace-6.5.12+dfsg/ace/Codeset_IBM1047.cpp
Examining data/ace-6.5.12+dfsg/ace/LSOCK_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/Basic_Types.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_devctl.h
Examining data/ace-6.5.12+dfsg/ace/config-win32-msvc-11.h
Examining data/ace-6.5.12+dfsg/ace/MEM_Stream.h
Examining data/ace-6.5.12+dfsg/ace/TLI_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/ATM_QoS.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_IO.cpp
Examining data/ace-6.5.12+dfsg/ace/Service_Repository.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_macros.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-elcapitan.h
Examining data/ace-6.5.12+dfsg/ace/Select_Reactor_T.h
Examining data/ace-6.5.12+dfsg/ace/Null_Mutex.h
Examining data/ace-6.5.12+dfsg/ace/Malloc_Base.h
Examining data/ace-6.5.12+dfsg/ace/config-android.h
Examining data/ace-6.5.12+dfsg/ace/Recyclable.h
Examining data/ace-6.5.12+dfsg/ace/Name_Space.h
Examining data/ace-6.5.12+dfsg/ace/Argv_Type_Converter.h
Examining data/ace-6.5.12+dfsg/ace/Hash_Cache_Map_Manager_T.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_wchar.cpp
Examining data/ace-6.5.12+dfsg/ace/IOStream.cpp
Examining data/ace-6.5.12+dfsg/ace/Stats.cpp
Examining data/ace-6.5.12+dfsg/ace/Timer_Queue_Adapters.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp
Examining data/ace-6.5.12+dfsg/ace/Dynamic_Service_Base.cpp
Examining data/ace-6.5.12+dfsg/ace/Read_Buffer.h
Examining data/ace-6.5.12+dfsg/ace/Functor_String.h
Examining data/ace-6.5.12+dfsg/ace/TLI.cpp
Examining data/ace-6.5.12+dfsg/ace/config-sunos5.6.h
Examining data/ace-6.5.12+dfsg/ace/Test_and_Set.cpp
Examining data/ace-6.5.12+dfsg/ace/ETCL/ETCL_Interpreter.cpp
Examining data/ace-6.5.12+dfsg/ace/ETCL/ETCL_Constraint_Visitor.h
Examining data/ace-6.5.12+dfsg/ace/ETCL/ETCL_Interpreter.h
Examining data/ace-6.5.12+dfsg/ace/ETCL/ETCL_Constraint.cpp
Examining data/ace-6.5.12+dfsg/ace/ETCL/etcl_parser_export.h
Examining data/ace-6.5.12+dfsg/ace/ETCL/ETCL_y.h
Examining data/ace-6.5.12+dfsg/ace/ETCL/ace_etcl_export.h
Examining data/ace-6.5.12+dfsg/ace/ETCL/ETCL_l.cpp
Examining data/ace-6.5.12+dfsg/ace/ETCL/ETCL_Constraint_Visitor.cpp
Examining data/ace-6.5.12+dfsg/ace/ETCL/ETCL_y.cpp
Examining data/ace-6.5.12+dfsg/ace/ETCL/ETCL_Constraint.h
Examining data/ace-6.5.12+dfsg/ace/Log_Msg.cpp
Examining data/ace-6.5.12+dfsg/ace/Abstract_Timer_Queue.cpp
Examining data/ace-6.5.12+dfsg/ace/Lock_Adapter_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Local_Memory_Pool.cpp
Examining data/ace-6.5.12+dfsg/ace/Asynch_IO_Impl.cpp
Examining data/ace-6.5.12+dfsg/ace/LSOCK_Acceptor.cpp
Examining data/ace-6.5.12+dfsg/ace/Sig_Adapter.h
Examining data/ace-6.5.12+dfsg/ace/Ping_Socket.cpp
Examining data/ace-6.5.12+dfsg/ace/Registry_Name_Space.h
Examining data/ace-6.5.12+dfsg/ace/POSIX_Proactor.cpp
Examining data/ace-6.5.12+dfsg/ace/Pagefile_Memory_Pool.cpp
Examining data/ace-6.5.12+dfsg/ace/Task.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_Log_Msg_Attributes.h
Examining data/ace-6.5.12+dfsg/ace/FIFO_Send.h
Examining data/ace-6.5.12+dfsg/ace/Atomic_Op_GCC_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Free_List.cpp
Examining data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp
Examining data/ace-6.5.12+dfsg/ace/Countdown_Time_T.h
Examining data/ace-6.5.12+dfsg/ace/SUN_Proactor.h
Examining data/ace-6.5.12+dfsg/ace/Service_Object.cpp
Examining data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.h
Examining data/ace-6.5.12+dfsg/ace/Caching_Utility_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Shared_Memory_SV.h
Examining data/ace-6.5.12+dfsg/ace/config-win32.h
Examining data/ace-6.5.12+dfsg/ace/Manual_Event.h
Examining data/ace-6.5.12+dfsg/ace/Encoding_Converter.h
Examining data/ace-6.5.12+dfsg/ace/FILE_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Static_Object_Lock.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_wchar.h
Examining data/ace-6.5.12+dfsg/ace/NT_Service.h
Examining data/ace-6.5.12+dfsg/ace/Message_Queue.h
Examining data/ace-6.5.12+dfsg/ace/MEM_SAP.cpp
Examining data/ace-6.5.12+dfsg/ace/IO_Cntl_Msg.h
Examining data/ace-6.5.12+dfsg/ace/Auto_Ptr.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_Memory.h
Examining data/ace-6.5.12+dfsg/ace/Hash_Map_Manager.h
Examining data/ace-6.5.12+dfsg/ace/Pagefile_Memory_Pool.h
Examining data/ace-6.5.12+dfsg/ace/Timeprobe.cpp
Examining data/ace-6.5.12+dfsg/ace/Hashable.cpp
Examining data/ace-6.5.12+dfsg/ace/String_Base.h
Examining data/ace-6.5.12+dfsg/ace/Event_Handler_T.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-mingw64.h
Examining data/ace-6.5.12+dfsg/ace/Map_T.cpp
Examining data/ace-6.5.12+dfsg/ace/TLI_Stream.h
Examining data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Factory.cpp
Examining data/ace-6.5.12+dfsg/ace/QoS/SOCK_Dgram_Mcast_QoS.h
Examining data/ace-6.5.12+dfsg/ace/QoS/ACE_QoS_Export.h
Examining data/ace-6.5.12+dfsg/ace/QoS/QoS_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/QoS/QoS_Decorator.cpp
Examining data/ace-6.5.12+dfsg/ace/QoS/QoS_Decorator.h
Examining data/ace-6.5.12+dfsg/ace/QoS/QoS_Session.h
Examining data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Impl.h
Examining data/ace-6.5.12+dfsg/ace/QoS/QoS_Manager.h
Examining data/ace-6.5.12+dfsg/ace/QoS/SOCK_Dgram_Mcast_QoS.cpp
Examining data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Factory.h
Examining data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Impl.cpp
Examining data/ace-6.5.12+dfsg/ace/Event.cpp
Examining data/ace-6.5.12+dfsg/ace/MEM_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/CDR_Size.cpp
Examining data/ace-6.5.12+dfsg/ace/XtReactor/ACE_XtReactor_export.h
Examining data/ace-6.5.12+dfsg/ace/XtReactor/XtReactor.cpp
Examining data/ace-6.5.12+dfsg/ace/XtReactor/XtReactor.h
Examining data/ace-6.5.12+dfsg/ace/UTF8_Encoding_Converter.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_msg.h
Examining data/ace-6.5.12+dfsg/ace/Notification_Queue.cpp
Examining data/ace-6.5.12+dfsg/ace/PI_Malloc.cpp
Examining data/ace-6.5.12+dfsg/ace/UPIPE_Addr.h
Examining data/ace-6.5.12+dfsg/ace/Lib_Find.cpp
Examining data/ace-6.5.12+dfsg/ace/config-lynxos-178.h
Examining data/ace-6.5.12+dfsg/ace/FILE.cpp
Examining data/ace-6.5.12+dfsg/ace/iosfwd.h
Examining data/ace-6.5.12+dfsg/ace/config-freebsd.h
Examining data/ace-6.5.12+dfsg/ace/Timer_Queue_Iterator.cpp
Examining data/ace-6.5.12+dfsg/ace/Thread_Hook.cpp
Examining data/ace-6.5.12+dfsg/ace/Service_Gestalt.cpp
Examining data/ace-6.5.12+dfsg/ace/Malloc_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Obstack.cpp
Examining data/ace-6.5.12+dfsg/ace/Service_Config.h
Examining data/ace-6.5.12+dfsg/ace/Min_Max.h
Examining data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_Errno.h
Examining data/ace-6.5.12+dfsg/ace/config-vxworks6.6.h
Examining data/ace-6.5.12+dfsg/ace/Reactor_Notification_Strategy.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Msg_NT_Event_Log.h
Examining data/ace-6.5.12+dfsg/ace/Asynch_Acceptor.h
Examining data/ace-6.5.12+dfsg/ace/IPC_SAP.cpp
Examining data/ace-6.5.12+dfsg/ace/Sig_Handler.h
Examining data/ace-6.5.12+dfsg/ace/Svc_Conf_Tokens.h
Examining data/ace-6.5.12+dfsg/ace/SOCK_CODgram.cpp
Examining data/ace-6.5.12+dfsg/ace/OS_QoS.cpp
Examining data/ace-6.5.12+dfsg/ace/DEV_Connector.cpp
Examining data/ace-6.5.12+dfsg/ace/Timer_Hash.h
Examining data/ace-6.5.12+dfsg/ace/ace_wchar.h
Examining data/ace-6.5.12+dfsg/ace/Free_List.h
Examining data/ace-6.5.12+dfsg/ace/ACE_crc32.cpp
Examining data/ace-6.5.12+dfsg/ace/Connection_Recycling_Strategy.cpp
Examining data/ace-6.5.12+dfsg/ace/TLI_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/Message_Queue_Vx.h
Examining data/ace-6.5.12+dfsg/ace/ACE.cpp
Examining data/ace-6.5.12+dfsg/ace/RW_Thread_Mutex.cpp
Examining data/ace-6.5.12+dfsg/ace/DLL_Manager.h
Examining data/ace-6.5.12+dfsg/ace/Atomic_Op_Sparc.h
Examining data/ace-6.5.12+dfsg/ace/Select_Reactor_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Value_Ptr.h
Examining data/ace-6.5.12+dfsg/ace/DLL_Manager.cpp
Examining data/ace-6.5.12+dfsg/ace/config-sunos5.4-sunc++-4.x.h
Examining data/ace-6.5.12+dfsg/ace/config-macosx-jaguar.h
Examining data/ace-6.5.12+dfsg/ace/DEV_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Manual_Event.cpp
Examining data/ace-6.5.12+dfsg/ace/config-win32-mingw.h
Examining data/ace-6.5.12+dfsg/ace/Dynamic_Service.h
Examining data/ace-6.5.12+dfsg/ace/config-cygwin32.h
Examining data/ace-6.5.12+dfsg/ace/Caching_Strategies_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Reactor_Token_T.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_sys_sendfile.h
Examining data/ace-6.5.12+dfsg/ace/config-qnx.h
Examining data/ace-6.5.12+dfsg/ace/Unbounded_Set_Ex.h
Examining data/ace-6.5.12+dfsg/ace/config-linux-common.h
Examining data/ace-6.5.12+dfsg/ace/Object_Manager_Base.cpp
Examining data/ace-6.5.12+dfsg/ace/Asynch_IO.h
Examining data/ace-6.5.12+dfsg/ace/Active_Map_Manager_T.h
Examining data/ace-6.5.12+dfsg/ace/Token.cpp
Examining data/ace-6.5.12+dfsg/ace/RB_Tree.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp
Examining data/ace-6.5.12+dfsg/ace/Notification_Queue.h
Examining data/ace-6.5.12+dfsg/ace/config-sunos5.10.h
Examining data/ace-6.5.12+dfsg/ace/Condition_Attributes.h
Examining data/ace-6.5.12+dfsg/ace/Copy_Disabled.cpp
Examining data/ace-6.5.12+dfsg/ace/Task_T.cpp
Examining data/ace-6.5.12+dfsg/ace/Date_Time.cpp
Examining data/ace-6.5.12+dfsg/ace/config-macosx-mavericks.h
Examining data/ace-6.5.12+dfsg/ace/Trace.h
Examining data/ace-6.5.12+dfsg/ace/Null_Semaphore.h
Examining data/ace-6.5.12+dfsg/ace/OS_NS_signal.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Msg.h
Examining data/ace-6.5.12+dfsg/ace/Pair_T.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Connector.h
Examining data/ace-6.5.12+dfsg/ace/Process.h
Examining data/ace-6.5.12+dfsg/ace/LSOCK_Connector.h
Examining data/ace-6.5.12+dfsg/ace/Select_Reactor_Base.cpp
Examining data/ace-6.5.12+dfsg/ace/SOCK_Stream.cpp
Examining data/ace-6.5.12+dfsg/ace/Singleton.h
Examining data/ace-6.5.12+dfsg/ace/Time_Policy.cpp
Examining data/ace-6.5.12+dfsg/ace/Timer_List_T.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Control_Types.cpp
Examining data/ace-6.5.12+dfsg/ace/Shared_Memory.h
Examining data/ace-6.5.12+dfsg/ace/Atomic_Op_T.cpp
Examining data/ace-6.5.12+dfsg/ace/FIFO_Send_Msg.h
Examining data/ace-6.5.12+dfsg/ace/Mem_Map.h
Examining data/ace-6.5.12+dfsg/ace/Metrics_Cache.h
Examining data/ace-6.5.12+dfsg/ace/ACE.h
Examining data/ace-6.5.12+dfsg/ace/Event_Handler.cpp
Examining data/ace-6.5.12+dfsg/ace/Task_T.h
Examining data/ace-6.5.12+dfsg/ace/Monitor_Base.h
Examining data/ace-6.5.12+dfsg/ace/Throughput_Stats.cpp
Examining data/ace-6.5.12+dfsg/ace/ACE_crc_ccitt.cpp
Examining data/ace-6.5.12+dfsg/ace/Log_Category.cpp
Examining data/ace-6.5.12+dfsg/ace/Shared_Memory_MM.cpp
Examining data/ace-6.5.12+dfsg/ace/DLL.cpp
Examining data/ace-6.5.12+dfsg/ace/Capabilities.h
Examining data/ace-6.5.12+dfsg/ace/config-face-safety.h
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_Sched_Queue_T.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/Dispatcher_Task.h
Examining data/ace-6.5.12+dfsg/Kokyu/Default_Dispatcher_Impl.h
Examining data/ace-6.5.12+dfsg/Kokyu/Kokyu_defs.h
Examining data/ace-6.5.12+dfsg/Kokyu/tests/DSRT_MIF/MIF.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/tests/FIFO/test.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/tests/EDF/test.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_CV_Dispatcher_Impl_T.h
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_Direct_Dispatcher_Impl_T.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/kokyu_export.h
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_Dispatch_Item_T.h
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_Direct_Dispatcher_Impl_T.h
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_Dispatch_Item_T.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/kokyu_config.h
Examining data/ace-6.5.12+dfsg/Kokyu/Default_Dispatcher_Impl.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_CV_Dispatcher_Impl_T.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/Kokyu_defs.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/Dispatcher_Impl.h
Examining data/ace-6.5.12+dfsg/Kokyu/Kokyu.h
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_Sched_Queue_T.h
Examining data/ace-6.5.12+dfsg/Kokyu/Dispatcher_Task.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/Kokyu.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_Dispatcher_Impl_T.h
Examining data/ace-6.5.12+dfsg/Kokyu/Dispatcher_Impl.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/Kokyu_dsrt.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/DSRT_Dispatcher_Impl_T.cpp
Examining data/ace-6.5.12+dfsg/Kokyu/Kokyu_dsrt.h
Examining data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/client.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/server.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h
Examining data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/client.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/server.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Recv_Tests/client.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Recv_Tests/server.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/client.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/server.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/INet/MT_Get/Main.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/RMCast/Receiver.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/RMCast/Sender.cpp
Examining data/ace-6.5.12+dfsg/protocols/tests/RMCast/Protocol.h
Examining data/ace-6.5.12+dfsg/protocols/examples/TMCast/Member/member.cpp
Examining data/ace-6.5.12+dfsg/protocols/examples/INet/FTP_Simple_exec.cpp
Examining data/ace-6.5.12+dfsg/protocols/examples/INet/HTTP_Simple_exec.cpp
Examining data/ace-6.5.12+dfsg/protocols/examples/RMCast/Send_Msg/Receiver.cpp
Examining data/ace-6.5.12+dfsg/protocols/examples/RMCast/Send_Msg/Sender.cpp
Examining data/ace-6.5.12+dfsg/protocols/examples/RMCast/Send_Msg/Protocol.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Filter_Factory.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Session.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Environment.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_ID_Requestor.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Stream.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Notifier.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Filter.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Macros.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Outside_Squid_Filter.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Filter.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Channel.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Environment.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Stream.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Outside_Squid_Filter.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Notifier.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Addr.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_ID_Requestor.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Addr.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Channel.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Export.h
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Session.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Filter_Factory.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/Export.hpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/Protocol.hpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/LinkListener.hpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/Group.hpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/MTQueue.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/MTQueue.hpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/GroupFwd.hpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/FaultDetector.hpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/TransactionController.hpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/Messaging.hpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/Group.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/TMCast/Protocol.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Response.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/String_IOStream.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_IOStream.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_ClientRequestHandler.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_IOStream.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Response.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_Session.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Request.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/BidirStreamBuffer.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/String_IOStream.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HeaderBase.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_ClientRequestHandler.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_PasswordCallback.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/AuthenticationBase.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_URL.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/ClientRequestHandler.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/URLBase.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/INet_Log.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_SessionBase.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/INet_SSL_Export.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_BasicAuthentication.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Session.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_CallbackManager.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicyBase.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/IOS_util.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/Response.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSLSock_IOStream.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_URL.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/Request.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/AuthenticationBase.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/IOS_util.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_PasswordCallback.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/ClientRequestHandler.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Status.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_URL.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/StreamInterceptor.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/Sock_IOStream.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/RequestHandler.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_URL.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/BidirStreamBuffer.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Header.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/Response.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_X509Cert.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_CertificateCallback.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_X509Cert.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HeaderBase.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Request.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_Context.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_IOStream.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/Sock_IOStream.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/Request.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Request.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_CallbackManager.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/ConnectionCache.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicyBase.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_URL.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Header.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_Session.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Response.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_SessionFactory.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_CertificateCallback.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Session.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/URLBase.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_Proxy_Connector.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/BufferedStreamBuffer.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Response.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Session.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_BasicAuthentication.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_Context.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Status.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_Proxy_Connector.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_SessionBase.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Session.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_ClientRequestHandler.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_SessionFactory.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Request.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/INet_Log.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/SSLSock_IOStream.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/StreamHandler.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/StreamInterceptor.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/StreamHandler.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/INet_Export.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_ClientRequestHandler.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/ConnectionCache.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/BufferedStreamBuffer.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_IOStream.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/RequestHandler.h
Examining data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_URL.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Retransmit.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Socket.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Reassemble.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Bits.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Link.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Flow.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Stack.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Parameters.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Flow.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Simulator.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Acknowledge.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Fragment.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Stack.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Link.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Fragment.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/RMCast_Export.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Reassemble.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Socket.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Simulator.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Acknowledge.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Protocol.h
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Retransmit.cpp
Examining data/ace-6.5.12+dfsg/protocols/ace/RMCast/Protocol.cpp
Examining data/ace-6.5.12+dfsg/debian/config.h

FINAL RESULTS:

data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:502:42:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
              ssize_t link_len = ACE_OS::readlink (rpath, link_buf, PATH_MAX);
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:261:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  ssize_t readlink (const char *path,
data/ace-6.5.12+dfsg/ace/Pagefile_Memory_Pool.cpp:241:9:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
      ::SetSecurityDescriptorDacl (&sd,
data/ace-6.5.12+dfsg/ace/Pagefile_Memory_Pool.cpp:241:9:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
      ::SetSecurityDescriptorDacl (&sd,
data/ace-6.5.12+dfsg/apps/soreduce/Library.cpp:196:32:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  ssize_t abspathlen = ACE_OS::readlink(p,abspath,999);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/test.cpp:14:3:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
  gets (line);
data/ace-6.5.12+dfsg/tests/Process_Mutex_Test.cpp:80:11:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
  ACE_OS::strncat (mutex_check, ACE_TEXT ("_checker"), MAXPATHLEN);
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:100:30:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
          if ((size= ACE_OS::readlink (fullp.c_str (),
data/ace-6.5.12+dfsg/tests/RW_Process_Mutex_Test.cpp:163:11:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
  ACE_OS::strncat (mutex_check, ACE_TEXT ("_checker"), MAXPATHLEN);
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp:291:23:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  int bytes = ACE_OS::sprintf (command, "GET %s HTTP/1.0\r\n", path);
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp:292:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  bytes += ACE_OS::sprintf (&command[bytes], "Host: %s\r\n",
data/ace-6.5.12+dfsg/ACEXML/common/URL_Addr.cpp:33:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      ACE_OS::sprintf (s, ACE_TEXT ("%s:%d/%s"),
data/ace-6.5.12+dfsg/ACEXML/common/URL_Addr.cpp:54:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (this->addr_string_,
data/ace-6.5.12+dfsg/ACEXML/parser/parser/Parser.cpp:691:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (normalized_uri + pos, systemId);
data/ace-6.5.12+dfsg/ace/ACE.cpp:304:21:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
      end = ACE_OS::strecpy (new_name, old_name);
data/ace-6.5.12+dfsg/ace/ACE.cpp:308:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (end - 1, ACE_TEXT (".exe"));
data/ace-6.5.12+dfsg/ace/ACE.cpp:2332:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          ACE_OS::snprintf (obuf, obuf_sz - (obuf - obuf_start),
data/ace-6.5.12+dfsg/ace/ACE.cpp:2345:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (obuf, obuf_sz - (obuf - obuf_start),
data/ace-6.5.12+dfsg/ace/ACE.cpp:2362:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          ACE_OS::snprintf (obuf, obuf_sz - (obuf - obuf_start),
data/ace-6.5.12+dfsg/ace/ACE.cpp:2375:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          ACE_OS::snprintf (obuf, obuf_sz - (obuf - obuf_start),
data/ace-6.5.12+dfsg/ace/ACE.cpp:2386:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (obuf, obuf_sz - (obuf - obuf_start),
data/ace-6.5.12+dfsg/ace/ACE.cpp:2440:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (date_and_time,
data/ace-6.5.12+dfsg/ace/ACE.cpp:3126:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (unknown_msg,
data/ace-6.5.12+dfsg/ace/ACE.cpp:3343:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return ACE_OS::strcpy (t, s);
data/ace-6.5.12+dfsg/ace/ACE.cpp:3365:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return ACE_OS::strcpy (t, s);
data/ace-6.5.12+dfsg/ace/ARGV.cpp:99:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->buf_, buf);
data/ace-6.5.12+dfsg/ace/ARGV.cpp:204:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->buf_, first_buf);
data/ace-6.5.12+dfsg/ace/ARGV.cpp:207:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (this->buf_, second_buf);
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:382:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (buffer,
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:391:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (addr, buffer);
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:403:19:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          ACE_OS::sprintf (buffer, ACE_TEXT ("%s%02x."),
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:409:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (addr, buffer);
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:425:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (addr,
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:507:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (s,
data/ace-6.5.12+dfsg/ace/ATM_Stream.cpp:70:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    ACE_OS::sprintf (buffer, "%s%02x.", buffer, name.satm_number.Addr[ index ]);
data/ace-6.5.12+dfsg/ace/ATM_Stream.cpp:73:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ACE_OS::sprintf (buffer, "%s%02x.", buffer, 0);
data/ace-6.5.12+dfsg/ace/ATM_Stream.cpp:97:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        ACE_OS::strcpy (host_name, host_ptr);
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:175:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, BUFSIZ,
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:835:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, BUFSIZ,
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:1202:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, BUFSIZ,
data/ace-6.5.12+dfsg/ace/CE_Screen_Output.cpp:127:5:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
    swprintf(buffer, ACE_TEXT("%f"), output);
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1005:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (pData.get (), path);
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1307:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ACE_OS::access (file_name, F_OK) != 0)
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1413:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (pers_name, sub_section);
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1441:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (ptr, section.fast_rep ());
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1814:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (pers_value, value.fast_rep ());
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1823:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (pers_name, t_name);
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1826:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (pers_value, value.fast_rep ());
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1876:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (pers_name, t_name);
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1931:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (pers_name, t_name);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:353:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                ACE_OS::snprintf (int_value, 32, ACE_TEXT ("%08x"), value);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:388:29:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    ACE_OS::snprintf (bin_value, 3, ACE_TEXT ("%02x"), *ptr);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:638:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                ACE_OS::snprintf (int_value, 32, ACE_TEXT ("%08x"), value);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:673:29:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    ACE_OS::snprintf (bin_value, 3, ACE_TEXT ("%02x"), *ptr);
data/ace-6.5.12+dfsg/ace/Connector.cpp:773:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, BUFSIZ,
data/ace-6.5.12+dfsg/ace/DLL_Manager.cpp:138:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                      ACE_OS::strcpy (aix_pathname, name->c_str());
data/ace-6.5.12+dfsg/ace/DLL_Manager.cpp:139:31:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                      ACE_OS::strcat (aix_pathname, SHR_O);
data/ace-6.5.12+dfsg/ace/ETCL/ETCL_y.cpp:1145:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            ACE_OS::strcat(msg, count == 0 ? ", expecting `" : " or `");
data/ace-6.5.12+dfsg/ace/ETCL/ETCL_y.cpp:1146:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            ACE_OS::strcat(msg, yytname[x]);
data/ace-6.5.12+dfsg/ace/FILE_Addr.cpp:37:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->filename_,
data/ace-6.5.12+dfsg/ace/FILE_Addr.cpp:50:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (this->filename_, ACE_TEXT ("ace-fileXXXXXX"));
data/ace-6.5.12+dfsg/ace/FILE_Addr.cpp:54:19:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
      if (ACE_OS::mktemp (this->filename_) == 0)
data/ace-6.5.12+dfsg/ace/Filecache.cpp:510:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->filename_, filename);
data/ace-6.5.12+dfsg/ace/Filecache.cpp:515:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ACE_OS::access (this->filename_, R_OK) == -1)
data/ace-6.5.12+dfsg/ace/Filecache.cpp:570:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->filename_, filename);
data/ace-6.5.12+dfsg/ace/Filecache.cpp:574:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ACE_OS::access (this->filename_, R_OK|W_OK) == -1
data/ace-6.5.12+dfsg/ace/Filecache.cpp:576:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      && ACE_OS::access (this->filename_, F_OK) != -1)
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:121:17:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          if (::sscanf (buf, "cpu : %s\n", arg) == 1)
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:134:25:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
                   && ::sscanf (buf, "model name : Pentium %s\n", arg) == 1)
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:446:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (buf, 100,
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:454:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ACE_OS::snprintf (buf, 100,
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:489:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (buf, 100,
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:497:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ACE_OS::snprintf (buf, 100,
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:73:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ACE_OS::snprintf (s, size, format,
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:804:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (hostname,
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:1063:23:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
              ACE_OS::strcat (dst, scope_buf);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:160:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (pathname, filename);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:171:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (pathname, ACE_DLL_PREFIX);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:172:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (pathname, filename);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:222:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (tempcopy, filename);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:240:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (searchfilename, tempcopy);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:244:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (searchfilename, separator_ptr + 1);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:246:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (searchpathname, tempcopy);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:292:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (searchfilename + len_searchfilename, decorator);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:319:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
              ACE_OS::snprintf (pathname, maxpathnamelen,
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:324:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              if (ACE_OS::access (pathname, F_OK) == 0)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:328:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
              ACE_OS::snprintf (pathname, maxpathnamelen,
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:334:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              if (ACE_OS::access (pathname, F_OK) == 0)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:362:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (searchfilename, ACE_DLL_PREFIX);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:363:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (searchfilename, tempcopy);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:403:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (ld_path_temp,
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:406:29:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    ACE_OS::strcat (ld_path_temp, ld_path);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:469:27:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                  ACE_OS::snprintf (pathname, maxpathnamelen,
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:475:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                  if (ACE_OS::access (pathname, F_OK) == 0)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:480:27:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                  ACE_OS::snprintf (pathname, maxpathnamelen,
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:487:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                  if (ACE_OS::access (pathname, F_OK) == 0)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:552:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (new_name, ACE_TEXT ("_"));
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:553:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (new_name, entry_point);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:572:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (new_name, entry_point);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:640:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (buffer, ACE_TEXT_CHAR_TO_TCHAR (tmpdir));
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:165:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (new_type, type);
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:434:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->context_file_, dir);
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:435:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (this->context_file_, ACE_DIRECTORY_SEPARATOR_STR);
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:436:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (this->context_file_, database);
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:491:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ACE_OS::access (this->context_file_, F_OK) != 0)
data/ace-6.5.12+dfsg/ace/Local_Tokens.cpp:122:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (name, sizeof name / sizeof name[0],
data/ace-6.5.12+dfsg/ace/Local_Tokens.cpp:1191:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (name, BUFSIZ, ACE_TEXT ("token %lx"),
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1050:28:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  bool can_check = ACE_OS::snprintf (test, 1, ACE_TEXT ("x")) != -1;
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1199:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf (fp, fspace,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1202:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf (fp, ACE_TEXT ("%d"), wp);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1210:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("f"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1214:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf (bp, bspace, format, value);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1216:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf (bp, format, value);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1232:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("d"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1234:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf (bp,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1239:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf (bp, format, this->linenum ());
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1245:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1247:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1250:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf (bp, bspace, format,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1255:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf (bp, format,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1264:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1266:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1269:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf (bp, bspace, format,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1274:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf (bp, format,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1284:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("x"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1286:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("d"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1289:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1293:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1316:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        ACE_OS::strcpy (fp, ACE_TEXT ("ls: %ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1319:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        ACE_OS::strcpy (fp, ACE_TEXT ("s: %s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1323:46:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                          this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1328:46:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                          this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1366:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                            ACE_OS::strcpy (fp, ACE_TEXT ("s: %s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1368:50:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                              this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1373:50:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                              this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1380:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                            ACE_OS::strcpy (fp, ACE_TEXT ("s: %s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1382:50:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                              this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1387:50:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                              this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1418:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("c"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1421:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("C"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1423:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("lc"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1430:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                      ACE_OS::strcpy (fp, ACE_TEXT ("c"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1452:44:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1477:44:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                        this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1508:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                      ACE_OS::strcpy (fp, ACE_TEXT ("ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1510:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                      ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1513:44:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1517:44:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                        this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1542:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        ACE_OS::strcpy (fp, ACE_TEXT ("ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1544:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1547:46:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                          this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1550:46:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                          this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1585:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                            ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1587:50:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                              this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1590:50:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                              this_len = ACE_OS::sprintf (bp, format, message);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1594:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                            ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1596:50:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                              this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1599:50:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                              this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1612:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("d"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1614:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1617:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1693:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1695:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1698:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1726:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1728:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1731:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1734:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf (bp, format, day_and_time);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1744:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1746:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1753:44:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1760:44:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                        this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1769:44:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1773:44:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                        this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1783:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("u"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1785:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1790:31:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      ACE_OS::sprintf (bp,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1822:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1825:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1828:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1831:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1841:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("S"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1843:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1846:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1849:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1860:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("S"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1863:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1865:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("S"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1868:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1871:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1874:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1884:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("c"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1886:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("C"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1889:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1892:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1896:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("C"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1898:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("lc"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1901:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1904:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1907:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("u"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1909:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1912:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1926:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("c"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1928:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("C"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1932:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("C"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1934:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("lc"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1937:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("u"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1940:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf (bp, bspace, format, wtchar);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1942:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf (bp, format, wtchar);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1973:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1975:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("S"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1979:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("S"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1981:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("ls"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1985:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1988:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf (bp, format, wchar_t_str);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1999:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("C"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2001:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (fp, ACE_TEXT ("c"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2004:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2007:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2017:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2020:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2030:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2033:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2041:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, &fmt[1]);    // Skip leading %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2043:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf (bp, bspace,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2047:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf (bp,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2057:30:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                     ACE_OS::strcpy (fp, &fmt[1]);    // Skip leading %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2059:43:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                       this_len = ACE_OS::snprintf (bp, bspace,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2063:43:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                       this_len = ACE_OS::sprintf (bp,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2073:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, &fmt[1]);    // Skip leading %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2076:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf (bp, bspace,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2080:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf (bp,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2089:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, &fmt[1]);    // Skip leading %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2092:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf (bp, bspace,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2096:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf (bp,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2109:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, &fmt[1]);    // Skip leading %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2112:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    this_len = ACE_OS::snprintf (bp, bspace,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2116:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    this_len = ACE_OS::sprintf (bp,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2123:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("p"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2125:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2128:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2139:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("S"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2141:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    ACE_OS::strcpy (fp, ACE_TEXT ("s"));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2144:42:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                      this_len = ACE_OS::snprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2147:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                      this_len = ACE_OS::sprintf
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2387:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      len = ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2405:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        len = ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_, msg);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2428:27:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            len = ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2438:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      len = ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2447:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      len = ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2456:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      len = ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2464:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      len = ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2479:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        len = ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2497:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        len = ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2519:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->fp_, ACE_SSIZE_T_FORMAT_SPECIFIER + 1); // skip %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2522:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->fp_, ACE_SIZE_T_FORMAT_SPECIFIER + 1); // skip %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2531:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->fp_, ACE_INT64_FORMAT_SPECIFIER + 1); // skip %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2534:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->fp_, ACE_UINT64_FORMAT_SPECIFIER + 1); // skip %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2569:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        ACE_OS::strcpy (this->fp_, ACE_INT64_FORMAT_SPECIFIER + 1); // skip %
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2592:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  const int n = ACE_OS::snprintf (this->bp_, this->bspace_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2650:29:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      const int n = ACE_OS::snprintf (this->bp_, this->bspace_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2743:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ACE_OS::snprintf (this->bp_, this->bspace_, this->fmt_out_,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2978:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    wr_ptr += ACE_OS::snprintf (wr_ptr,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2987:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  wr_ptr += ACE_OS::snprintf (wr_ptr,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:3001:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      wr_ptr += ACE_OS::snprintf (wr_ptr,
data/ace-6.5.12+dfsg/ace/Log_Msg_NT_Event_Log.cpp:46:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (reg_key,
data/ace-6.5.12+dfsg/ace/Log_Msg_UNIX_Syslog.cpp:96:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (message, log_record.msg_data ());
data/ace-6.5.12+dfsg/ace/Log_Msg_UNIX_Syslog.cpp:118:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            ACE_OS::strcpy (date_and_time, ACE_TEXT ("<time error>"));
data/ace-6.5.12+dfsg/ace/Log_Record.cpp:138:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->msg_data_, data);
data/ace-6.5.12+dfsg/ace/Log_Record.cpp:271:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (verbose_msg, verbose_msg_size,
data/ace-6.5.12+dfsg/ace/Log_Record.cpp:280:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ACE_OS::snprintf (verbose_msg, verbose_msg_size,
data/ace-6.5.12+dfsg/ace/Log_Record.cpp:286:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (verbose_msg, this->msg_data_);
data/ace-6.5.12+dfsg/ace/Log_Record.cpp:322:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
              int const fwrite_result = ACE_OS::fprintf (fp,
data/ace-6.5.12+dfsg/ace/Log_Record.cpp:326:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
              int const fwrite_result = ACE_OS::fprintf (fp,
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:276:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (this->filename_,
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:509:27:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                  ACE_OS::snprintf (backup, MAXPATHLEN + 1,
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:513:27:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                  ACE_OS::snprintf (to_backup, MAXPATHLEN + 1,
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:526:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
              ACE_OS::snprintf (backup, MAXPATHLEN + 1,
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:535:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
              ACE_OS::snprintf (backup, MAXPATHLEN + 1,
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.cpp:145:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (buf, sizeof buf / sizeof buf[0],
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.cpp:162:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (name, 25,
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.cpp:165:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (buf, name);
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.cpp:170:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (buf, unique);
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:182:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (server_sema, basename);
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:183:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (server_sema, ACE_TEXT ("_sema_to_server"));
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:184:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (client_sema, basename);
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:185:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (client_sema, ACE_TEXT ("_sema_to_client"));
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:186:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (server_lock, basename);
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:187:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (server_lock, ACE_TEXT ("_lock_to_server"));
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:188:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (client_lock, basename);
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:189:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (client_lock, ACE_TEXT ("_lock_to_client"));
data/ace-6.5.12+dfsg/ace/MMAP_Memory_Pool.cpp:163:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->backing_store_name_,
data/ace-6.5.12+dfsg/ace/MMAP_Memory_Pool.cpp:177:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (this->backing_store_name_,
data/ace-6.5.12+dfsg/ace/MMAP_Memory_Pool.cpp:190:17:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
        ACE_OS::mktemp(this->backing_store_name_);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:240:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (buf, current_fs_name_);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:241:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (buf, curdirtmp);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:385:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (oldtmp, oldpath + old_fs_name_len);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:388:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (newtmp, newpath + new_fs_name_len);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:463:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (&tmppath[0], path);
data/ace-6.5.12+dfsg/ace/Malloc.cpp:113:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (n, name);
data/ace-6.5.12+dfsg/ace/Monitor_Control/Linux_Network_Interface_Monitor.cpp:51:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf (buf, this->scan_format_.c_str (), &iface_value);
data/ace-6.5.12+dfsg/ace/Monitor_Control/Linux_Network_Interface_Monitor.cpp:109:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf (buf, this->scan_format_.c_str (), &iface_value);
data/ace-6.5.12+dfsg/ace/NT_Service.cpp:197:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (this_exe, ACE_TEXT ("\""));
data/ace-6.5.12+dfsg/ace/Naming_Context.cpp:40:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, BUFSIZ,
data/ace-6.5.12+dfsg/ace/Naming_Context.cpp:445:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->namespace_dir_, ACE_TEXT ("."));
data/ace-6.5.12+dfsg/ace/Naming_Context.cpp:446:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (this->namespace_dir_, ACE_DIRECTORY_SEPARATOR_STR);
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:2577:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    ACE_OS::strcat (str, suffix);
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:3441:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (pcinfo.pc_clname, class_name);
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:4842:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (name, length, ACE_TEXT ("%p%d"), object,
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:85:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            ACE_OS::strcpy (extra, ACE_TEXT ("/*"));
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:87:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            ACE_OS::strcpy (extra, ACE_TEXT ("*"));
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:95:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (dir->directory_name_, filename);
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:97:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    ACE_OS::strcat (dir->directory_name_, extra);
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:148:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (d->dirent_->d_name, d->fdata_.cFileName);
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:268:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (newdp->d_name, dp->d_name);
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp:81:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                access,
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp:90:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                access,
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp:206:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                access,
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:214:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (ifr.ifr_name, p_if->ifa_name);
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:552:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (host, hp->h_name);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:260:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
ACE_OS::fprintf (FILE *fp, const char *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:270:30:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int const result = ACE_OS::vfprintf (fp, format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:279:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
ACE_OS::fprintf (FILE *fp, const wchar_t *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:289:30:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int const result = ACE_OS::vfprintf (fp, format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:334:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
ACE_OS::printf (const char *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:343:30:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int const result = ACE_OS::vprintf (format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:352:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
ACE_OS::printf (const wchar_t *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:361:30:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int const result = ACE_OS::vprintf (format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:370:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
ACE_OS::snprintf (char *buf, size_t maxlen, const char *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:381:30:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int const result = ACE_OS::vsnprintf (buf, maxlen, format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:390:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
ACE_OS::snprintf (wchar_t *buf, size_t maxlen, const wchar_t *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:401:30:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int const result = ACE_OS::vsnprintf (buf, maxlen, format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:409:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
ACE_OS::sprintf (char *buf, const char *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:419:30:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  int const result = ACE_OS::vsprintf (buf, format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:427:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
ACE_OS::sprintf (wchar_t *buf, const wchar_t *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:437:30:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  int const result = ACE_OS::vsprintf (buf, format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:450:22:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int size = ACE_OS::vsnprintf (0, 0, format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:461:22:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      size = ACE_OS::vsnprintf(buf, size + 1, format, aq);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:479:22:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int size = ACE_OS::vsnprintf(0, 0, format, ap);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:491:22:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      size = ACE_OS::vsnprintf(buf, size + 1, format, aq);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:846:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            ACE_OS::strcpy (it, flags.has (SNPRINTF_UCASE) ? "NAN" : "nan");
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:848:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            ACE_OS::strcpy (it, flags.has (SNPRINTF_UCASE) ? "INF" : "inf");
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:157:10:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
  return cuserid(user);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:220:16:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
#   if defined(cuserid)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:221:13:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
#     undef cuserid
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:225:9:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
  char *cuserid (char *user,
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:230:12:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
  wchar_t *cuserid (wchar_t *user,
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:238:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 2, 3);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:389:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  using ::fprintf;
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:392:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int fprintf (FILE *fp, const char *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:393:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 2, 3);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:398:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int fprintf (FILE *fp, const wchar_t *format, ...);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:460:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  using ::printf;
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:463:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int printf (const char *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:464:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 1, 2);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:469:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int printf (const wchar_t *format, ...);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:496:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  using ::snprintf;
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:499:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int snprintf (char *buf, size_t maxlen, const char *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:500:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 3, 4);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:505:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int snprintf (wchar_t *buf, size_t maxlen, const wchar_t *format, ...);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:509:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  int sprintf (char *buf, const char *format, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:510:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 2, 3);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:514:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  int sprintf (wchar_t *buf, const wchar_t *format, ...);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:531:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 2, 0);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:534:7:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int vprintf (const char *format, va_list argptr)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:535:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 1, 0);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:538:7:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int vfprintf (FILE *fp, const char *format, va_list argptr)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:539:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 2, 0);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:542:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  int vsprintf (char *buffer, const char *format, va_list argptr)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:543:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 2, 0);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:546:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int vsnprintf (char *buffer, size_t maxlen, const char *format, va_list argptr)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:547:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 3, 0);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:554:7:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int vprintf (const wchar_t *format, va_list argptr);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:557:7:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  int vfprintf (FILE *fp, const wchar_t *format, va_list argptr);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:560:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  int vsprintf (wchar_t *buffer, const wchar_t *format, va_list argptr);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:563:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int vsnprintf (wchar_t *buffer, size_t maxlen, const wchar_t *format, va_list argptr);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:161:23:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
          p = ACE_OS::strecpy (p, temp) - 1;
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:163:23:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
          p = ACE_OS::strecpy (p, ACE_TEXT_CHAR_TO_TCHAR (temp)) - 1;
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:172:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (p, &start[var_len]);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:294:9:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
ACE_OS::mktemp (ACE_TCHAR *s)
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:318:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (xxxxxx, 7,
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:242:9:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
  char *mktemp (char *s);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:246:12:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
  wchar_t *mktemp (wchar_t *s);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:250:14:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
  ACE_TCHAR *mktemp (ACE_TCHAR *s);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:423:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int system (const ACE_TCHAR *s);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:31:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return ACE_OS::strcpy (t, s);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:47:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return ACE_OS::strcpy (buffer, s);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:53:9:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
ACE_OS::strecpy (char *s, const char *t)
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:66:9:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
ACE_OS::strecpy (wchar_t *s, const wchar_t *t)
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:74:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  char *strcat (char *s, const char *t);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:79:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  wchar_t *strcat (wchar_t *s, const wchar_t *t);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:114:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  char *strcpy (char *s, const char *t);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:119:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  wchar_t *strcpy (wchar_t *s, const wchar_t *t);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:159:9:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
  char *strecpy (char *des, const char *src);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:165:12:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
  wchar_t *strecpy (wchar_t *s, const wchar_t *t);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_socket.cpp:111:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          ACE_OS::snprintf (buf, 80, fmt, ACE_TEXT ("WSAStartup %d"), error);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_socket.cpp:142:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          ACE_OS::snprintf (buf, 80, fmt, ACE_TEXT ("WSACleanup %d"), error);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:76:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (name->release, maxnamelen,
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:194:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (name->release, unknown);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:206:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        ACE_OS::strcpy (name->machine, unknown);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:213:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (name->release, unknown);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:214:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (name->version, unknown);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:215:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (name->machine, unknown);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:227:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (name->release, kernelVersion());
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:228:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (name->version, sysBspRev ());
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:229:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (name->machine, sysModel ());
data/ace-6.5.12+dfsg/ace/OS_NS_time.cpp:76:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, buflen, ACE_OS_CTIME_R_FMTSTR,
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:165:27:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
            end = ACE_OS::strecpy (end, temp);
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:202:21:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
      end = ACE_OS::strecpy (end, argv_p[i]);
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:229:9:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
ACE_OS::execl (const char * /* path */, const char * /* arg0 */, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:238:9:  [4] (shell) execle:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
ACE_OS::execle (const char * /* path */, const char * /* arg0 */, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:247:9:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
ACE_OS::execlp (const char * /* file */, const char * /* arg0 */, ...)
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:380:23:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
          if (ACE_OS::execv (cargv[0], cargv) == -1)
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:383:23:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
          if (ACE_OS::execv (argv[0], argv) == -1)
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:43:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int access (const char *path, int amode);
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:47:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int access (const wchar_t *path, int amode);
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:100:7:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int execl (const char *path,
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:104:7:  [4] (shell) execle:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int execle (const char *path,
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:108:7:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int execlp (const char *file,
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:112:7:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int execv (const char *path,
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:121:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int execvp (const char *file,
data/ace-6.5.12+dfsg/ace/OS_main.cpp:131:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (cmd_iter, msg_file);
data/ace-6.5.12+dfsg/ace/OS_main.cpp:132:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (cmd_iter, quote ? ACE_TEXT ("\" ") : ACE_TEXT (" "));
data/ace-6.5.12+dfsg/ace/OS_main.cpp:136:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (cmdline, ACE_TEXT ("program "));
data/ace-6.5.12+dfsg/ace/OS_main.cpp:138:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (cmdline, ACE_TEXT_WCHAR_TO_TCHAR (lpCmdLine));
data/ace-6.5.12+dfsg/ace/PI_Malloc.cpp:110:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (n, name);
data/ace-6.5.12+dfsg/ace/Pagefile_Memory_Pool.cpp:92:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (this->backing_store_name_,
data/ace-6.5.12+dfsg/ace/Parse_Node.cpp:652:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (mangled_func_name,
data/ace-6.5.12+dfsg/ace/Process.cpp:122:31:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          curr_len += ACE_OS::sprintf (&cmd_line_buf[curr_len],
data/ace-6.5.12+dfsg/ace/Process.cpp:129:31:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          curr_len += ACE_OS::sprintf (&cmd_line_buf[curr_len],
data/ace-6.5.12+dfsg/ace/Process.cpp:134:31:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          curr_len += ACE_OS::sprintf (&cmd_line_buf[curr_len],
data/ace-6.5.12+dfsg/ace/Process.cpp:252:15:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      ACE_OS::execvp (options.process_name (),
data/ace-6.5.12+dfsg/ace/Process.cpp:540:30:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            result = ACE_OS::execv (procname, procargv);
data/ace-6.5.12+dfsg/ace/Process.cpp:542:30:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            result = ACE_OS::execvp (procname, procargv);
data/ace-6.5.12+dfsg/ace/Process.cpp:806:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy(wenv + start, buffer[i]);
data/ace-6.5.12+dfsg/ace/Process.cpp:1012:24:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int status = ACE_OS::vsnprintf (stack_buf, DEFAULT_COMMAND_LINE_BUF_LEN,
data/ace-6.5.12+dfsg/ace/Process.cpp:1051:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (safe_newformat.get (), buflen, fmt,
data/ace-6.5.12+dfsg/ace/Process.cpp:1072:24:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      retval = ACE_OS::vsnprintf (safe_stack_buf.get (), tmp_buflen, safe_newformat.get (), argp);
data/ace-6.5.12+dfsg/ace/Process.cpp:1100:28:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
          retval = ACE_OS::vsprintf (safe_stack_buf.get (), safe_newformat.get (), argp);
data/ace-6.5.12+dfsg/ace/Process.cpp:1284:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (command_line_buf_, argv[i]);
data/ace-6.5.12+dfsg/ace/Process.cpp:1305:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (command_line_buf_, ACE_TEXT (" "));
data/ace-6.5.12+dfsg/ace/Process.cpp:1306:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (command_line_buf_, argv[i]);
data/ace-6.5.12+dfsg/ace/Process.cpp:1328:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::vsnprintf (command_line_buf_,
data/ace-6.5.12+dfsg/ace/Process.cpp:1357:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::vsnprintf (anti_clb, this->command_line_buf_len_, format, argp);
data/ace-6.5.12+dfsg/ace/Process.cpp:1362:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->command_line_buf_,
data/ace-6.5.12+dfsg/ace/Process.h:123:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 2, 3)
data/ace-6.5.12+dfsg/ace/Process.h:139:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 3, 4)
data/ace-6.5.12+dfsg/ace/Process.h:168:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ACE_GCC_FORMAT_ATTRIBUTE (printf, 2, 3)
data/ace-6.5.12+dfsg/ace/Profile_Timer.cpp:49:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (buf, 20, "/proc/%d", static_cast<int> (ACE_OS::getpid ()));
data/ace-6.5.12+dfsg/ace/Remote_Name_Space.cpp:120:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (type, reply.type ());
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:728:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (if_address.ifr_name, ACE_TEXT_ALWAYS_CHAR (net_if));
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:54:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        ACE_OS::strcpy (ret_string, ACE_TEXT ("<?>"));
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:123:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        ACE_OS::strcpy (iface_string, ACE_TEXT ("<default>"));
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:256:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->send_net_if_, net_if);
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:105:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (temp, ACE_TEXT ( "\\\\.\\pipe\\"));
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:106:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (temp, addr);
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:115:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        ACE_OS::strcpy (temp, ACE_TEXT ("\\\\."));
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:118:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (temp, ACE_TEXT ("\\\\"));
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:127:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (temp, t);
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:132:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (temp, ACE_TEXT ("\\pipe\\"));
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:133:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (temp, colonp + 1);
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:138:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->SPIPE_addr_.rendezvous_, temp);
data/ace-6.5.12+dfsg/ace/SString.cpp:247:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->rep_, s);
data/ace-6.5.12+dfsg/ace/SString.cpp:310:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->rep_, s.rep_);
data/ace-6.5.12+dfsg/ace/Sched_Params.cpp:157:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (pcinfo.pc_clname,
data/ace-6.5.12+dfsg/ace/Service_Gestalt.cpp:140:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy(name_,assd->name_);
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:81:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, BUFSIZ,
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:202:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (buf, sr->name ());
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:203:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (buf, (sr->active ()) ?
data/ace-6.5.12+dfsg/ace/Service_Types.cpp:270:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, BUFSIZ,
data/ace-6.5.12+dfsg/ace/Service_Types.cpp:360:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, BUFSIZ,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:440:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                   ACE_OS::strcpy (hostname, *q);
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:459:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       ACE_OS::strcpy (hostname, hp->h_name);
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:1276:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          ACE_OS::snprintf (s_ipaddr, 64, ip_fmt,
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:66:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (&this->buf_[0], UNABLE_TO_GET_TRACE);
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:112:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (&this->buf_[0], UNABLE_TO_GET_TRACE);
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:171:22:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      len += ACE_OS::sprintf(&buf[len], "0x" ACE_VX_ARG_FORMAT, args[i]);
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:253:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (this->buf_, UNABLE_TO_GET_TRACE);
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:288:33:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
              written = ACE_OS::snprintf (cursor, space,
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:750:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (&this->buf_[0], UNSUPPORTED);
data/ace-6.5.12+dfsg/ace/Stats.cpp:220:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (format, 32, ACE_TEXT ("%%%d"), tmp_precision);
data/ace-6.5.12+dfsg/ace/Stats.cpp:222:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (format, 32, ACE_TEXT ("%%d.%%0%du"), tmp_precision);
data/ace-6.5.12+dfsg/ace/Stats.cpp:226:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (mean_string, 128, format, u.whole (), u.fractional ());
data/ace-6.5.12+dfsg/ace/Stats.cpp:238:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (std_dev_string, 128, format, sd.whole (),
data/ace-6.5.12+dfsg/ace/Stats.cpp:252:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (min_string, 128, format,
data/ace-6.5.12+dfsg/ace/Stats.cpp:254:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (max_string, 128, format,
data/ace-6.5.12+dfsg/ace/Stats.cpp:260:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      ACE_OS::fprintf (file, ACE_TEXT ("samples: %u (%s - %s); mean: ")
data/ace-6.5.12+dfsg/ace/Stats.cpp:268:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      ACE_OS::fprintf (file,
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:103:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->dll_name_, dll_name);
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:104:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->factory_function_, factory_function);
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:105:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->svc_name_, svc_name);
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:602:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (param->buffer->input_ + skip_bytes, target);
data/ace-6.5.12+dfsg/ace/Svc_Conf_y.cpp:716:29:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF ACE_OS::fprintf
data/ace-6.5.12+dfsg/ace/Svc_Conf_y.cpp:1984:28:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    (void) ACE_OS::ACE_OS::fprintf (stderr, ACE_TEXT ("usage: %s [file]\n"), argv[0]), ACE_OS::exit (1);
data/ace-6.5.12+dfsg/ace/System_Time.cpp:27:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->poolname_,
data/ace-6.5.12+dfsg/ace/System_Time.cpp:41:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (this->poolname_, ACE_TEXT ("ace-malloc-XXXXXX"));
data/ace-6.5.12+dfsg/ace/UNIX_Addr.cpp:96:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (this->unix_addr_.sun_path,
data/ace-6.5.12+dfsg/ace/UNIX_Addr.cpp:119:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->unix_addr_.sun_path, un->sun_path);
data/ace-6.5.12+dfsg/ace/UUID.cpp:242:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          ::sscanf (uuid_string.c_str (),
data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/ExtendedTypeInfo.hpp:77:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      BaseInfo (Access::Value access, bool virtual_base, TypeId const& tid);
data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/ExtendedTypeInfo.hpp:84:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access () const;
data/ace-6.5.12+dfsg/ace/XML_Utils/XSCRT/ExtendedTypeInfo.hpp:119:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    add_base (Access::Value access, bool virtual_base, TypeId const& tid);
data/ace-6.5.12+dfsg/ace/config-all.h:30:69:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define ACE_NOTSUP_RETURN(FAILVALUE) do { errno = ENOTSUP; ACE_OS::fprintf (stderr, ACE_TEXT ("ACE_NOTSUP: %s, line %d\n"), __FILE__, __LINE__); return FAILVALUE; } while (0)
data/ace-6.5.12+dfsg/ace/config-all.h:31:51:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define ACE_NOTSUP do { errno = ENOTSUP; ACE_OS::fprintf (stderr, ACE_TEXT ("ACE_NOTSUP: %s, line %d\n"), __FILE__, __LINE__); return; } while (0)
data/ace-6.5.12+dfsg/ace/config-mqx.h:151:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#undef sscanf
data/ace-6.5.12+dfsg/ace/config-mqx.h:152:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef snprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:153:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef vsnprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:201:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#ifdef printf
data/ace-6.5.12+dfsg/ace/config-mqx.h:202:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#undef printf
data/ace-6.5.12+dfsg/ace/config-mqx.h:205:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#ifdef sprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:206:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#undef sprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:209:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#ifdef fprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:210:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#undef fprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:211:12:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
inline int fprintf(FILE* s, const char* f, ...) {
data/ace-6.5.12+dfsg/ace/config-mqx.h:219:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#ifdef vprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:220:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#undef vprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:223:8:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#ifdef vsprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:224:8:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#undef vsprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:227:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#ifdef vfprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:228:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#undef vfprintf
data/ace-6.5.12+dfsg/ace/config-mqx.h:229:12:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
inline int vfprintf(FILE* s, const char* f, va_list argp) {
data/ace-6.5.12+dfsg/ace/config-mqx.h:287:12:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
inline int printf(const char* f, ...) {
data/ace-6.5.12+dfsg/ace/config-mqx.h:297:12:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
inline int sprintf(char* s, const char* f, ...) {
data/ace-6.5.12+dfsg/ace/config-mqx.h:307:12:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
inline int vprintf(const char* f, va_list argp) {
data/ace-6.5.12+dfsg/ace/config-mqx.h:313:12:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
inline int vsprintf(char* s, const char* f, va_list argp) {
data/ace-6.5.12+dfsg/ace/os_include/os_stdlib.h:52:9:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
  char *mktemp (char *);
data/ace-6.5.12+dfsg/ace/os_include/os_syslog.h:26:18:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
#  include /**/ <syslog.h>
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.cpp:164:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:63:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->connection_config_file_, ACE_TEXT("connection_config"));
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:64:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->consumer_config_file_, ACE_TEXT("consumer_config"));
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/gatewayd.cpp:24:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ACE_OS::access (ACE_DEFAULT_SVC_CONF, F_OK) != 0)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:807:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (buf, ACE_TEXT ("peerd\t C:"));
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:808:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (buf, consumer_addr_str);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:809:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (buf, ACE_TEXT ("|S:"));
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:810:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (buf, supplier_addr_str);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:811:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat
data/ace-6.5.12+dfsg/apps/Gateway/Peer/peerd.cpp:20:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ACE_OS::access (ACE_DEFAULT_SVC_CONF, F_OK) != 0)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:104:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  int len = ACE_OS::sprintf (mesg, "%s %s %s",
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:281:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  mesglen = ACE_OS::sprintf (mesg, "%s /%s %s " ACE_SIZE_T_FORMAT_SPECIFIER_ASCII "\n\n",
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_client.cpp:53:23:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
          if (ACE_OS::system (ACE_TEXT_CHAR_TO_TCHAR (s)) == -1)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:31:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    ACE_OS::sprintf (this->request_,
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:45:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ACE_OS::sprintf (this->filename_, "%s", last);
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:209:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  if (3 != ::sscanf (url, "http://%[^:/]:%hu%s", host, port, path))
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:213:22:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          if (2 != ::sscanf (url, "http://%[^:/]%s", host, path))
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.cpp:101:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    ACE_OS::sprintf (buffer,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.cpp:136:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    ACE_OS::sprintf (buffer,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:75:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  else if (::sscanf(buf, "%s,;%2d-%3s-%2d;%2d:%2d:%2d;GMT", // RFC-850 date format
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:149:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    ACE_OS::sprintf (date_string,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:340:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (data, buf);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:631:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            ACE_OS::strcpy (buf, ACE_OS::getenv ("HOME"));
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:641:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              ACE_OS::strcpy (buf, pw_struct.pw_dir);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:646:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (buf, HTTP_Config::instance ()->user_dir ());
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:647:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (buf, file_name);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:652:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (buf, HTTP_Config::instance ()->document_root ());
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:653:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (buf, file_name - 1);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:122:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    ACE_OS::sprintf (buf2, error_message,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:132:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        ACE_OS::sprintf (buf1, error_header,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:200:56:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            = HTTP_Helper::HTTP_decode_base64 (ACE_OS::strcpy (buf, hvv));
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:275:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (buf, ACE_TEXT ("HTTP_"));
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:337:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        ACE_OS::sprintf (HTTP_HEADER, "%s", "HTTP/1.0 200 OK\r\n");
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:344:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          ACE_OS::sprintf (HTTP_HEADER+HTTP_HEADER_LENGTH,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:349:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          ACE_OS::sprintf (HTTP_HEADER+HTTP_HEADER_LENGTH,
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:479:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ACE_OS::access (filename, R_OK) == -1)
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/connection.cpp:13:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    ACE_OS::sprintf(hostname_with_port, "%s:%d", hostname_opt_port, 80);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp:35:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ACE_OS::sprintf(request,"GET /%s HTTP/1.0\r\n\r\n",u->get_filename());
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp:159:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s %d %f %s %f %s %f %s %f %d %d\n", id, &total_num, &rate, url1, &p1, url2, &p2, url3, &p3, &tcp, &sock);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp:7:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy(buffer,input_buf);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp:16:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy(protocol_, temp);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp:21:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy(hostname_, temp);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp:25:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy(filename_, temp);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp:29:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy(filename_,INDEX_NAME);
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_base.cpp:213:27:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                  ACE_OS::sprintf (buf, "%s, %s",
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_request.cpp:33:23:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      count = ACE_OS::sprintf (this->mb_->wr_ptr (), "%s /%s\r\n\r\n",
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_request.cpp:45:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  count = ACE_OS::sprintf (this->mb_->wr_ptr (), "%s /%s %s\r\n",
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_request.cpp:60:27:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          count = ACE_OS::sprintf (this->mb_->wr_ptr (), "Host: %s\r\n",
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_response.cpp:22:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  count = ACE_OS::sprintf (this->mb_->wr_ptr (), "%s %d %s\r\n",
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_http_request.cpp:45:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  int n = ::sscanf (this->request_, "%s %*s HTTP/%d.%d",
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:83:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            ACE_OS::strcpy (buf, ACE_OS::getenv ("HOME"));
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:92:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              ACE_OS::strcpy (buf, pw_struct.pw_dir);
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:98:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (buf, HTTP_Config::instance ()->user_dir ());
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:102:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (buf, file_name);
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:108:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (buf, HTTP_Config::instance ()->document_root ());
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:112:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (buf, file_name - 1);
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:239:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ACE_OS::sprintf (rq, "GET /%s\r\n", buf);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Config_File.cpp:279:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (filename, config_dir);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Config_File.cpp:280:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (filename, config_file);
data/ace-6.5.12+dfsg/apps/drwho/File_Manager.cpp:134:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          ACE_OS::strcat (directory, home);
data/ace-6.5.12+dfsg/apps/drwho/File_Manager.cpp:137:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (directory, filename);
data/ace-6.5.12+dfsg/apps/drwho/PMC_Flo.cpp:44:23:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
    buf_ptr = ACE_OS::strecpy (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMC_Usr.cpp:25:21:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
  buf_ptr = ACE_OS::strecpy (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMS_All.cpp:39:46:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
      this->handle_protocol_entries (ACE_OS::strecpy
data/ace-6.5.12+dfsg/apps/drwho/PMS_All.cpp:40:49:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
                                       (ACE_OS::strecpy (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMS_Flo.cpp:36:54:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
    buf_ptr = this->handle_protocol_entries (ACE_OS::strecpy (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMS_Ruser.cpp:39:54:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
    buf_ptr = this->handle_protocol_entries (ACE_OS::strecpy (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMS_Ruser.cpp:123:25:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
      buf_ptr = ACE_OS::strecpy (ACE_OS::strecpy (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMS_Ruser.cpp:123:42:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
      buf_ptr = ACE_OS::strecpy (ACE_OS::strecpy (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMS_Usr.cpp:34:56:  [4] (buffer) strecpy:
  This function does not protect against buffer overflows (CWE-120). Ensure
  the destination has 4 times the size of the source, to leave room for
  expansion.
      buf_ptr = this->handle_protocol_entries (ACE_OS::strecpy (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PM_Server.cpp:65:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ACE_OS::sprintf (buf_ptr,
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:48:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (buf, str);
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:583:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        ACE_OS::sprintf (comp_buffer, "%s == *resword->%s && !ACE_OS::%s (str + 1, resword->%s + 1, len - 1)",
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:587:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        ACE_OS::sprintf (comp_buffer, "%s == *resword->%s && !ACE_OS::%s (str + 1, resword->%s + 1)",
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:730:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
              ACE_OS::printf (option[LENTABLE] && !option[DUP]
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:946:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  ACE_OS::printf (option[ANSI]
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1047:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  ACE_OS::printf (option[ANSI]
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1147:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  ACE_OS::printf (option[ANSI]
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1210:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
              ACE_OS::printf (option[STRCASECMP] ? "asso_values[static_cast<int>(charmap[str[%d]])]" : "asso_values[static_cast<int>(str[%d])]", key_pos - 1);
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1256:27:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  ACE_OS::printf (option[STRCASECMP]
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1545:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        ACE_OS::printf (option[STRCASECMP] ? "if (charmap[*str] == **ptr && !ACE_OS::%s" : "if (*str == **ptr && !ACE_OS::%s",
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1731:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      ACE_OS::printf (option[ANSI]
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:112:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          ACE_OS::sprintf (emsg,"\"%s\" encountered before \"start\"",tags_[i]);
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:177:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          ACE_OS::sprintf (emsg,"invalid rgy_value, '%s'",line_data_);
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:233:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ACE_OS::sprintf (tempfilename_,
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:302:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ACE_OS::sprintf (target,"%s/ace/%s",ace_src_,tgt);
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:314:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          ACE_OS::sprintf (fname,"%s.%03d",target,i);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:167:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (err, "Can't parse input: %s\n", line);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:343:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (msg, "Exception in %s caught by labview_test_controller\n",
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:374:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (this->name_, name);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:385:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (&this->cmdline_[cmdchars], token);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:391:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (libspec, "%s.dll", name);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:581:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (errmsg, "%s: ", prefix);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:600:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (errmsg, "err %d: %s", errcode, msg);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Consumer_Router.cpp:144:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (buf,
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Supplier_Router.cpp:150:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (buf,
data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/buffer_stream.cpp:246:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      ACE_OS::sprintf (mb->rd_ptr (),
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.cpp:126:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (buf, FMTSTR,
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.cpp:125:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (buf, FMTSTR,
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/event_server.cpp:152:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (mb_p->rd_ptr (), (char *) dummy);
data/ace-6.5.12+dfsg/examples/ConfigViewer/ValueDlg.cpp:33:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  m_Value.sprintf("%d", Value);
data/ace-6.5.12+dfsg/examples/ConfigViewer/ValueListCtrl.cpp:54:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        Text.sprintf("%d", UINTValue);
data/ace-6.5.12+dfsg/examples/ConfigViewer/ValueListCtrl.cpp:180:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  Message.sprintf("Enter new name for '%s'", Name);
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp:68:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (rendezvous_, ACE_TEXT ("acepipe"));
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.cpp:135:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (rendezvous_, ACE_TEXT ("acepipe"));
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-test.cpp:35:15:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (ACE_OS::execvp (EXEC_NAME, argv) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-client.cpp:30:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (buf, ACE_TEXT_ALWAYS_CHAR (emp_num));
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-server.cpp:67:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        n = ACE_OS::sprintf (sendline,
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-server.cpp:72:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    n = ACE_OS::sprintf (sendline, "%s", "ERROR");
data/ace-6.5.12+dfsg/examples/Log_Msg/Log_Msg_MFC/MFC_Log.cpp:30:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (Message,
data/ace-6.5.12+dfsg/examples/Log_Msg/test_log_msg.cpp:200:19:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      if (ACE_OS::execv (badname,
data/ace-6.5.12+dfsg/examples/Logger/client/logging_app.cpp:39:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      ACE_OS::sprintf (buf, ACE_TEXT ("message = %d\n"), i + 1);
data/ace-6.5.12+dfsg/examples/Naming/test_multiple_contexts.cpp:31:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (address_arg1,
data/ace-6.5.12+dfsg/examples/Naming/test_multiple_contexts.cpp:45:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (address_arg2,
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:413:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (environment,
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:581:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy(buf1, ACE_TEXT (" -f hi honey -g \"I\'m home\""));
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:582:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy(buf2, ACE_TEXT ("\"token 1\"\'token 2\'\"token 3\" "));
data/ace-6.5.12+dfsg/examples/Reactor/Misc/pingpong.cpp:83:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->buf_ + (2 * sizeof (int)), b);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_dgram_client_test.cpp:95:11:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
  ACE_OS::cuserid (name);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:46:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (buf, ACE_TEXT("%d/"), sa.get_port_number ());
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:47:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (buf, ACE_TEXT("tcp # tests threaded remote stream\n"));
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:160:11:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
  ACE_OS::cuserid (login_name);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:165:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ACE_OS::sprintf (buf,
data/ace-6.5.12+dfsg/examples/Service_Configurator/Misc/Timer_Service.cpp:9:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->name_,
data/ace-6.5.12+dfsg/examples/Service_Configurator/Misc/Timer_Service.cpp:110:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->name_,
data/ace-6.5.12+dfsg/examples/Service_Configurator/Misc/Timer_Service.cpp:116:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->name_,
data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.cpp:135:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->program_name_, ACE_TEXT_ALWAYS_CHAR (argv[0]));
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_malloc.cpp:150:23:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
          if (ACE_OS::execv (Options::instance ()->program_name (),
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_multiple_mallocs.cpp:76:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy ((char *) data,
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_multiple_mallocs.cpp:108:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy ((char *) data,
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:36:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (this->name_, name);
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:50:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (this->name_, name);
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:106:11:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (::scanf ("%s", option) <= 0)
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:118:15:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        if (::scanf ("%s %s", buf1, buf2) <= 0)
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:125:15:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:131:15:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:299:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (backing_store, argv[1]);
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:311:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (backing_store,
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:324:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (backing_store, ACE_TEXT ("ace-malloc-XXXXXX"));
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/MQ_Client.cpp:23:35:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
                          ACE_OS::cuserid (static_cast<char *> (0)),
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/MQ_Server.cpp:35:35:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
                          ACE_OS::cuserid (static_cast<char *> (0)),
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/TMQ_Client.cpp:22:34:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
                         ACE_OS::cuserid (static_cast<char *> (0)),
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/TMQ_Server.cpp:33:28:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
  char *username = ACE_OS::cuserid (static_cast<char *> (0));
data/ace-6.5.12+dfsg/examples/Threads/barrier2.cpp:225:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (mb->rd_ptr (), str);
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:183:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->name_, newname);
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:261:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (the_name, this->name_);
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:183:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy ((char *) this->name_, newname);
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:257:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (the_name, this->name_);
data/ace-6.5.12+dfsg/examples/Web_Crawler/HTTP_URL.cpp:42:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ACE_OS::sprintf (cmd_ptr.get (),
data/ace-6.5.12+dfsg/examples/Web_Crawler/HTTP_URL.cpp:52:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ACE_OS::sprintf (cmd_ptr.get (),
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:34:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      ACE_OS::sprintf (s, ACE_TEXT ("%s:%d/%s"),
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:67:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (this->addr_string_,
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:72:9:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  if (::scanf ("%s", option) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:89:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s %d", buf1, &port) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:100:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (buf1, temp_buf);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:107:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              ACE_OS::strcpy (buf2, temp_buf);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:114:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (buf3, temp_buf);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:129:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:141:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (buf1, temp_buf);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:148:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              ACE_OS::strcpy (buf2, temp_buf);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:154:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  ACE_OS::strcpy (buf3, temp_buf);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:169:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:174:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:180:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:186:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:192:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:198:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:204:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", buf1) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:39:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (this->hostname_,
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:77:9:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  if (::scanf ("%s", option) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:96:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s %hu", buf1, &port) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:102:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", filename_) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:122:13:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (::scanf ("%s", dump_filename_) <= 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:262:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->hostname_, hostname);
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:188:9:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  if (::scanf ("%s %s %s %s", tid, token, type, operation) <= 0)
data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.cpp:520:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (buf, ACE_TEXT ("%d/%s %s"),
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Clerk_Handler.cpp:308:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (this->poolname_,
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Clerk_Handler.cpp:321:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (this->poolname_, ACE_TEXT ("ace-malloc-XXXXXX"));
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_ID_Requestor.cpp:81:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ACE_OS::sprintf (buffer,"GET %s HTTP/1.0\n\n",
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.cpp:79:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (buffer,format,
data/ace-6.5.12+dfsg/protocols/ace/TMCast/Group.cpp:259:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (hdr->member_id.id, id_);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:117:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (temp, ACE_TEXT ("%s%s%s"), \
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:139:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (temp, ACE_TEXT ("%s%s%s"), \
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:215:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (temp,
data/ace-6.5.12+dfsg/tests/ARGV_Test.cpp:156:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (pid_str, 100,
data/ace-6.5.12+dfsg/tests/Based_Pointer_Test.cpp:304:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf( store, MAXPATHLEN + 1, ACE_TEXT("foo%d"), i );
data/ace-6.5.12+dfsg/tests/Basic_Types_Test.cpp:20:31:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define ACE_DEBUG(x) ACE_OS::fprintf x
data/ace-6.5.12+dfsg/tests/Basic_Types_Test.cpp:23:31:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define ACE_ERROR(x) ACE_OS::fprintf x
data/ace-6.5.12+dfsg/tests/Basic_Types_Test.cpp:25:36:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define ACE_START_TEST(x) ACE_OS::printf (x ACE_TEXT ("\n"))
data/ace-6.5.12+dfsg/tests/Buffer_Stream_Test.cpp:135:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (mb->wr_ptr (), d);
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:47:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define PRINTF std::printf
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:49:18:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define PRINTF printf
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:75:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (dllFile, subdir_env);
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:77:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (dllFile, DllTestName);
data/ace-6.5.12+dfsg/tests/Bug_3912_Regression_Test.cpp:157:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (conf_file_name, TEST_DIR);
data/ace-6.5.12+dfsg/tests/Bug_3912_Regression_Test.cpp:158:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (conf_file_name, ACE_DIRECTORY_SEPARATOR_STR);
data/ace-6.5.12+dfsg/tests/Bug_3912_Regression_Test.cpp:159:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (conf_file_name, ACE_TEXT ("Bug_3912_Regression_Test.conf"));
data/ace-6.5.12+dfsg/tests/Bug_3912_Regression_Test.cpp:161:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (conf_file_name, ACE_TEXT ("Bug_3912_Regression_Test.conf"));
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:352:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (import_file_name, TEST_DIR);
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:353:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    ACE_OS::strcat (import_file_name, ACE_DIRECTORY_SEPARATOR_STR);
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:354:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    ACE_OS::strcat (import_file_name, ACE_TEXT ("Config_Test_Import_1.ini"));
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:356:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (import_file_name, ACE_TEXT ("Config_Test_Import_1.ini"));
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1044:35:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                          ACE_OS::snprintf (int_value, 32, ACE_TEXT ("%08x"),
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1069:43:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                                  ACE_OS::snprintf (bin_value, 3,
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1493:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (pszString, ACE_TEXT ("0"));
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1526:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (pszString, ACE_TEXT ("0"));
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:631:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      ACE_OS::sprintf (server_name[i],
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:193:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (fifo_path, ACE_TEXT ("FIFO_Test"));
data/ace-6.5.12+dfsg/tests/Future_Set_Test.cpp:235:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy ((ACE_TCHAR *) this->name_,
data/ace-6.5.12+dfsg/tests/Future_Test.cpp:241:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy ((ACE_TCHAR *) this->name_,
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:67:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (decorated_func_name, 10*1024, ACE_TEXT ("_%s"), func_name);
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:140:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (backup_ct, MAXPATHLEN + 1,
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:144:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (backup_ct, MAXPATHLEN + 1,
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:239:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (backup_1, MAXPATHLEN + 1,
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:243:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (backup_2, MAXPATHLEN + 1,
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:298:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (backup, MAXPATHLEN + 1,
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:440:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (arg_str, 250,
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:447:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (arg_str, argv[i]);
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:448:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      ACE_OS::strcat (arg_str, ACE_TEXT (" "));
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:451:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (arg_str, ACE_TEXT ("\""));
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:92:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (this->name_, MAXPATHLEN, ACE_TEXT ("Connection %d --> "),
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:117:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (return_buf, this->name_);
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:118:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (return_buf, buf);
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:184:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (buf, MAXPATHLEN,
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:456:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (lognm, MAXPATHLEN,
data/ace-6.5.12+dfsg/tests/MM_Shared_Memory_Test.cpp:213:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (temp_file, ACE_TEXT ("mm_shared_mem_testXXXXXX"));
data/ace-6.5.12+dfsg/tests/MM_Shared_Memory_Test.cpp:218:15:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
  if (ACE_OS::mktemp (shm_key) == 0
data/ace-6.5.12+dfsg/tests/MT_Reactor_Upcall_Test.cpp:225:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (data_message.data_, message);
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:157:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (temp_file1, test_file);
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:158:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (temp_file2, test_file);
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:161:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (test_file,
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:163:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (temp_file1,
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:165:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (temp_file2,
data/ace-6.5.12+dfsg/tests/Message_Block_Test.cpp:261:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (buf, BUFSIZ, ACE_SIZE_T_FORMAT_SPECIFIER, count);
data/ace-6.5.12+dfsg/tests/Message_Queue_Test.cpp:332:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (buffer[i], BUFSIZ, ACE_TEXT ("%d"), i + 1);
data/ace-6.5.12+dfsg/tests/Message_Queue_Test_Ex.h:31:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (this->message_, inputMsg);
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:872:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (buf, MAX_STRING_SIZE, ACE_TEXT ("%d.%d.%d.%d:%d"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:902:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (buf, MAX_STRING_SIZE, ACE_TEXT ("%d.%d.%d.%d:%d"),
data/ace-6.5.12+dfsg/tests/Naming_Test.cpp:261:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf(temp_file, BUFSIZ,
data/ace-6.5.12+dfsg/tests/Naming_Test.cpp:315:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (temp_file, BUFSIZ, ACE_TEXT ("%s%s%s"),
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:51:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int status = ACE_OS::access (ACE_TEXT ("missing_file.txt"), F_OK);
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:81:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (old_file, ACE_TEXT ("rename_test_old"));
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:82:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (new_file, ACE_TEXT ("rename_test_new"));
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:351:32:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      (ACE_OS::strcmp (ACE_OS::strcpy (strcpy2, strcpy1),
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:366:32:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      (ACE_OS::strcmp (ACE_OS::strcat (strcat2, strcat3),
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:667:23:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
  const char* login = getlogin ();
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:766:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (bufcheck, buf);
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:957:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (str_w, ACE_Ascii_To_Wide (test1_n).wchar_rep ());
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:964:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (str_n, ACE_Wide_To_Ascii (test1_w).char_rep ());
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:971:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (str_w, ACE_Ascii_To_Wide (test2_n).wchar_rep ());
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:978:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (str_n, ACE_Wide_To_Ascii (test2_w).char_rep ());
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:1652:40:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  if ((result = snprintf_test (ACE_OS::snprintf)) != 0)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:577:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256,
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:583:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256,
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:594:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256,
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:600:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256,
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:578:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256,
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:584:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256,
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:595:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256,
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:601:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256,
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:695:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256,
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:701:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256,
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:712:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256,
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:718:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256,
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:94:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (cmd, ACE_TEXT ("-d"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:102:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'above normal'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:107:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'below normal'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:112:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'idle'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:117:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'high'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:122:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'normal'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:128:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (pd, 16, ACE_TEXT (" -p %d"), my_process_id);
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:129:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (cmd, pd);
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:309:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (lognm, MAXPATHLEN,
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:323:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'above normal'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:325:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'below normal'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:327:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'high'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:329:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'idle'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:331:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'normal'"));
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:333:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ACE_OS::snprintf (prio, 64, ACE_TEXT ("and priority 'realtime'"));
data/ace-6.5.12+dfsg/tests/Process_Mutex_Test.cpp:130:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (lognm, MAXPATHLEN,
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:164:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (this->filename_, ACE_TEXT ("process_strategy_test_temp"));
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:190:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        ACE_OS::strcpy (this->filename_, get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:34:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    ACE_OS::strcat (bigval,
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:129:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (tempfile, t);
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:230:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (lognm, MAXPATHLEN,
data/ace-6.5.12+dfsg/tests/RW_Process_Mutex_Test.cpp:407:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (lognm, MAXPATHLEN,
data/ace-6.5.12+dfsg/tests/SOCK_Connector_Test.cpp:50:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (test_host, hostname);
data/ace-6.5.12+dfsg/tests/SOCK_Connector_Test.cpp:76:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (other_host,
data/ace-6.5.12+dfsg/tests/SOCK_Connector_Test.cpp:89:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        ACE_OS::strcpy (other_host, ACE_LOCALHOST);
data/ace-6.5.12+dfsg/tests/SOCK_Connector_Test.cpp:92:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        ACE_OS::strcpy (other_host, ACE_TEXT_CHAR_TO_TCHAR (h->h_name));
data/ace-6.5.12+dfsg/tests/SOCK_Connector_Test.cpp:119:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               ACE_OS::strcpy (candidate[candidate_count].host_name,
data/ace-6.5.12+dfsg/tests/SOCK_Connector_Test.cpp:130:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            ACE_OS::strcpy (other_host, candidate[i].host_name);
data/ace-6.5.12+dfsg/tests/SOCK_Connector_Test.cpp:138:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      ACE_OS::strcpy (cached_other_host, other_host);
data/ace-6.5.12+dfsg/tests/SOCK_Connector_Test.cpp:141:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    ACE_OS::strcpy (other_host, cached_other_host);
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:861:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (ip_slash_mask,
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:879:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (net_dev_name,
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:933:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (ip_slash_mask,
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:935:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          ACE_OS::strcpy (net_dev_name,
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:245:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (&buf[1], msg);
data/ace-6.5.12+dfsg/tests/Sendfile_Test.cpp:94:18:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      || ACE_OS::strcat (test_file, file) == 0
data/ace-6.5.12+dfsg/tests/Service_Config_DLL.cpp:54:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (this->directive_[0], BUFSIZ,
data/ace-6.5.12+dfsg/tests/Service_Config_DLL.cpp:63:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      ACE_OS::snprintf (this->directive_[1], BUFSIZ,
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:120:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      ACE_OS::fprintf (stderr,
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:210:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (pid_file_name, TEST_DIR);
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:211:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (pid_file_name, ACE_DIRECTORY_SEPARATOR_STR);
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:212:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (pid_file_name, ACE_TEXT ("Service_Config_Test.pid"));
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:214:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (pid_file_name, ACE_TEXT ("Service_Config_Test.pid"));
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:218:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (svc_conf_file_name, TEST_DIR);
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:219:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (svc_conf_file_name, ACE_DIRECTORY_SEPARATOR_STR);
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:220:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (svc_conf_file_name, svc_conf);
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:222:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (svc_conf_file_name, svc_conf);
data/ace-6.5.12+dfsg/tests/Signal_Test.cpp:267:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (pid_str, 100, ACE_TEXT ("-p %ld -t %d"),
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:323:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256, ACE_TEXT ("%ld(%ld)"),
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:327:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256, ACE_TEXT ("%ld(%ld)"),
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:682:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256, ACE_TEXT ("%ld(%ld)"),
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:686:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256, ACE_TEXT ("%ld(%ld)"),
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1204:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256, ACE_TEXT ("%ld(%ld)"),
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1208:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256, ACE_TEXT ("%ld(%ld)"),
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1218:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufs, 256, ACE_TEXT ("%ld(%ld)"),
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1222:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ACE_OS::snprintf (bufr, 256, ACE_TEXT ("%ld(%ld)"),
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:113:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (temp, ACE_LOG_DIRECTORY);
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:114:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (temp,
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:116:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (temp, ACE_LOG_FILE_EXT_NAME);
data/ace-6.5.12+dfsg/tests/Thread_Manager_Test.cpp:296:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          ACE_OS::snprintf (thread_name[i], 32, ACE_TEXT ("thread%u"), i);
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:297:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (&buf[1], msg);
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:254:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (&buf[1], msg);
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:239:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          ACE_OS::snprintf (reinterpret_cast<ACE_TCHAR *> (mb->wr_ptr ()), BUFSIZ,
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:331:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          ACE_OS::snprintf (reinterpret_cast<ACE_TCHAR *> (mb->wr_ptr ()), BUFSIZ,
data/ace-6.5.12+dfsg/tests/Time_Service_Test.cpp:45:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (backing_store,
data/ace-6.5.12+dfsg/tests/Time_Service_Test.cpp:58:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  ACE_OS::strcat (backing_store,
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:37:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (buf,s);
data/ace-6.5.12+dfsg/tests/Tokens_Test.cpp:227:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int status = ACE_OS::access (token_exe, F_OK);
data/ace-6.5.12+dfsg/tests/UPIPE_SAP_Test.cpp:125:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ACE_OS::strcpy (s_buf, svr_response);
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:90:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf (date_and_time,
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:101:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf (date_and_time,
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:149:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy (buf, ace_root);
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:154:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
              strcat (buf, subdir_env);
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:159:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat (buf, ACE_LIB_NAME);
data/ace-6.5.12+dfsg/tests/test_config.h:137:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (temp, ACE_TEXT ("%s%s%s"), \
data/ace-6.5.12+dfsg/tests/test_config.h:159:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  ACE_OS::sprintf (temp, ACE_INIT_LOG_FMT, \
data/ace-6.5.12+dfsg/ace/ACE.cpp:168:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  static const char *debug = ACE_OS::getenv ("ACE_DEBUG");
data/ace-6.5.12+dfsg/ace/Get_Opt.cpp:127:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (ACE_OS::getenv (env_check) != 0)
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:515:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      const char *env_value = ACE_OS::getenv (ACE_TEXT_ALWAYS_CHAR (env));
data/ace-6.5.12+dfsg/ace/IOStream_T.h:175:7:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      setstate (failbit);
data/ace-6.5.12+dfsg/ace/IOStream_T.h:191:7:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      setstate (failbit);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:384:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
          ld_path = ACE_OS::getenv (ACE_LD_SEARCH_PATH);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:389:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            (ACE_OS::getenv (ACE_TEXT_ALWAYS_CHAR (ACE_LD_SEARCH_PATH)));
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:619:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *tmpdir = ACE_OS::getenv ("TMPDIR");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:658:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *timestamp = ACE_OS::getenv ("ACE_LOG_TIMESTAMP");
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:519:9:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
  char *tempnam (const char *dir = 0,
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:524:12:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
  wchar_t *tempnam (const wchar_t *dir,
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:131:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      ACE_TCHAR *temp = ACE_OS::getenv (buf);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:134:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char *temp = ACE_OS::getenv (ACE_TEXT_ALWAYS_CHAR (buf));
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:349:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
ACE_OS::realpath (const char *file_name,
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:189:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *getenv (const char *symbol);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:193:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  wchar_t *getenv (const wchar_t *symbol);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:292:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  char *realpath (const char *file_name, char *resolved_name);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:296:12:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  wchar_t *realpath (const wchar_t *file_name, wchar_t *resolved_name);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:308:8:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  void srand (u_int seed);
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:159:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  int getopt (int argc,
data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.cpp:186:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        ACE_OS::getenv (ACE_SSL_EGD_FILE_ENV);
data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.cpp:192:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      const char *rand_file = ACE_OS::getenv (ACE_SSL_RAND_FILE_ENV);
data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.cpp:420:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      ca_file = ACE_OS::getenv (ACE_SSL_CERT_FILE_ENV);
data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.cpp:430:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      ca_dir = ACE_OS::getenv (ACE_SSL_CERT_DIR_ENV);
data/ace-6.5.12+dfsg/ace/Service_Config.cpp:176:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc,
data/ace-6.5.12+dfsg/ace/Service_Config.cpp:185:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/ace/Service_Config.cpp:190:46:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        ACE_Service_Config::pid_file_name_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/ace/Service_Config.cpp:201:27:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
            ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:106:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("dp:s:"), 0); // Start at argv[0]
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:108:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:116:50:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
         local_addr.set ((u_short) ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:119:40:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
         this->signum_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/ace/os_include/os_unistd.h:183:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  int getopt(int, char * const [], const char *);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:33:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *timeout = ACE_OS::getenv ("TIMEOUT");
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Config.cpp:77:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      this->document_root_ = ACE_OS::getenv ("JAWS_DOCUMENT_ROOT");
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Config.cpp:92:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      this->cgi_path_ = ACE_OS::getenv ("JAWS_CGI_PATH");
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Config.cpp:108:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      this->user_dir_ = ACE_OS::getenv ("JAWS_USER_DIR");
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Config.cpp:123:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      this->dir_index_ = ACE_OS::getenv ("JAWS_DIR_INDEX");
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:631:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            ACE_OS::strcpy (buf, ACE_OS::getenv ("HOME"));
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp:77:11:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ACE_OS::srand(ACE_OS::time(0));
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:83:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            ACE_OS::strcpy (buf, ACE_OS::getenv ("HOME"));
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:147:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT("t" "p:c:d:n:m:f:r:"));
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:148:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != -1)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:156:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:159:29:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        if (ACE_OS::strcmp (getopt.opt_arg (), "PER_REQUEST") == 0)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:164:29:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        if (ACE_OS::strcmp (getopt.opt_arg (), "ASYNCH") == 0)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:169:41:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->nthreads_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:172:43:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->maxthreads_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:175:29:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        if (ACE_OS::strcmp (getopt.opt_arg (), "THR_BOUND") == 0)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:177:34:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        else if (ACE_OS::strcmp (getopt.opt_arg (), "THR_DAEMON") == 0)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:179:34:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        else if (ACE_OS::strcmp (getopt.opt_arg (), "THR_DETACHED") == 0)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:183:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->ratio_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Concurrency.cpp:52:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      concurrency = JAWS_Options::instance ()->getenv ("JAWS_CONCURRENCY");
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Jaws_IO.cpp:22:56:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      const char *io_type = JAWS_Options::instance ()->getenv ("JAWS_IO");
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Options.cpp:15:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
JAWS_Options::getenv (const char *key)
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Options.cpp:19:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    value = ACE_OS::getenv (key);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Options.h:25:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *getenv (const char *key);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/THYBRID_Concurrency.cpp:23:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  value = JAWS_Options::instance ()->getenv ("JAWS_MIN_THYBRID_THREADS");
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/THYBRID_Concurrency.cpp:33:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  value = JAWS_Options::instance ()->getenv ("JAWS_MAX_THYBRID_THREADS");
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/TPOOL_Concurrency.cpp:17:50:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *value = JAWS_Options::instance ()->getenv ("JAWS_TPOOL_THREADS");
data/ace-6.5.12+dfsg/apps/drwho/File_Manager.cpp:131:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      const char *home = ACE_OS::getenv ("HOME");
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:82:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT("?aA:bdF:f:hH:Llp:rRsSt:w:"));
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:84:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != -1)
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:93:40:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          Multicast_Manager::add_host (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:105:34:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          Options::friend_file = getopt.opt_arg ();
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:108:58:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          if (Multicast_Manager::insert_hosts_from_file (getopt.opt_arg ()) < 0)
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:116:40:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          Multicast_Manager::add_host (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:129:48:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          Options::port_number = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:144:55:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          Options::max_server_timeout = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:147:32:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          Options::user_name = getopt.opt_arg ();
data/ace-6.5.12+dfsg/apps/gperf/src/Gen_Perf.cpp:257:15:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      ACE_OS::srand ((u_int) ACE_OS::time (0));
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:70:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ace_src_ = ACE_OS::getenv("ACE_ROOT");
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:392:28:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  if ((this->dll_handle_ = LoadLibrary (libspec)) == NULL)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:100:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("C:c:bdH:i:L:l:M:nS:s:t:T:v"));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:103:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != -1)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:111:30:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->consumer_file (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:114:30:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->consumer_port (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:120:46:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->high_water_mark (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:123:41:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->iterations (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:126:45:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->low_water_mark (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:129:51:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->initial_queue_length (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:132:43:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->message_size (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:138:30:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->supplier_file (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:141:30:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->supplier_port (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:145:33:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        if (ACE_OS::strcasecmp (getopt.opt_arg (), ACE_TEXT ("ON")) == 0)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:147:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        else if (ACE_OS::strcasecmp (getopt.opt_arg (), ACE_TEXT ("OFF")) == 0)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:152:40:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->thr_count (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-Msg-client.cpp:20:11:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ACE_OS::srand (unsigned (ACE_OS::time (0)));
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:121:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT("2h:i:m:p:q:st:T:"), 1);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:123:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:131:23:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->host_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:134:43:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:137:44:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:140:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:143:30:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->quit_string_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:149:49:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->threads_ = (size_t) ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:152:49:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->sleep_time_.set (0, ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:167:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT("p:r:v"), 1);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:169:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:174:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:177:50:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->reply_message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:103:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("2h:i:m:p:q:sT:"), 1);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:105:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:113:23:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->host_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:116:43:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:119:44:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:122:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:126:48:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
                         ACE_TEXT_ALWAYS_CHAR (getopt.opt_arg ()),
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:133:49:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->sleep_time_.set (0, ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:115:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("2h:i:m:p:q:st:T:"), 1);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:117:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:125:23:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->host_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:128:43:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:131:44:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:134:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:138:48:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
                         ACE_TEXT_ALWAYS_CHAR (getopt.opt_arg ()),
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:145:49:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->threads_ = (size_t) ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:148:49:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->sleep_time_.set (0, ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:174:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("p:r:v"), 1);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:176:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:181:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:184:50:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->reply_message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-client.cpp:24:25:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((opt = ACE_OS::getopt (argc, argv, "s:?h")) != EOF)
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-server.cpp:18:25:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((opt = ACE_OS::getopt (argc, argv, "s:?h")) != EOF)
data/ace-6.5.12+dfsg/examples/OS/Process/imore.cpp:94:35:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
  ACE_TCHAR *rendezvous = ACE_OS::tempnam (rendezvous_dir,
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:554:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char *value = ACE_OS::getenv ("ACE_PROCESS_TEST");
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:555:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char *value2 = ACE_OS::getenv ("ACE_PROCESS_TEST2");
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp:34:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT("m:ui:"), 1);
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp:36:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp:41:42:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        max_message_size = ACE_OS::atoi (getopt.opt_arg ()) * BUFSIZ;
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp:44:36:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        iterations = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Handle_Close.cpp:250:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("swmc"), 1);
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Handle_Close.cpp:252:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Multithreading.cpp:209:11:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ACE_OS::srand ((u_int) ACE_OS::time (0L));
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_dgram_client_test.cpp:66:31:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
  char *sock_client = ACE_OS::tempnam ();
data/ace-6.5.12+dfsg/examples/Synch/proc_sema.cpp:48:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("csn:xi:d:"));
data/ace-6.5.12+dfsg/examples/Synch/proc_sema.cpp:60:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((opt = getopt ()) != -1)
data/ace-6.5.12+dfsg/examples/Synch/proc_sema.cpp:75:23:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          sema_name = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/Synch/proc_sema.cpp:78:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          iteration = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Synch/proc_sema.cpp:81:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          exit_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:13:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("df:h:i:l:rt:u:vo:p:"));
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:33:13:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
       (c = getopt ()) != EOF;
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:42:29:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->url_filter_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:45:27:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->hostname_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:48:22:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->uri_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:51:45:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->handle_limit_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:57:43:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->timeout_.sec (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:61:29:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          this->hostname_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:62:42:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          ACE_TCHAR *s = ACE_OS::strchr (getopt.opt_arg (), ACE_TEXT ('/'));
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:71:25:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
                        getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:79:24:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->order_ = getopt.opt_arg ();
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:83:40:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        this->port_no_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Logger/indirect_logging.cpp:19:11:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ACE_OS::srand ((u_int) ACE_OS::time (0));
data/ace-6.5.12+dfsg/protocols/ace/RMCast/Link.cpp:31:13:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    ACE_OS::srand ((unsigned int) ACE_OS::time (0));
data/ace-6.5.12+dfsg/protocols/ace/RMCast/Simulator.cpp:9:13:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    ACE_OS::srand ((unsigned int)ACE_OS::time (0));
data/ace-6.5.12+dfsg/protocols/examples/TMCast/Member/member.cpp:29:28:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    if (!receiver) ACE_OS::srand ((u_int) ACE_OS::time ());
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:209:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  test_dir = ACE_OS::getenv (ACE_TEXT ("ACE_TEST_DIR"));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:293:11:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ACE_OS::srand (0);
data/ace-6.5.12+dfsg/tests/ACE_Test.cpp:48:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* debug = ACE_OS::getenv ("ACE_DEBUG");
data/ace-6.5.12+dfsg/tests/Auto_Event_Test.cpp:201:11:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ACE_OS::srand ((u_int) ACE_OS::time (0L));
data/ace-6.5.12+dfsg/tests/Based_Pointer_Test.cpp:85:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *subdir_env = ACE_OS::getenv ("ACE_EXE_SUB_DIR");
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:70:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *subdir_env = getenv ("ACE_EXE_SUB_DIR");
data/ace-6.5.12+dfsg/tests/Cache_Map_Manager_Test.cpp:540:11:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ACE_OS::srand (static_cast<u_int> (ACE_OS::time (0)));
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:720:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("c:i:s:"));
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:721:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:726:35:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        n_clients = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:729:45:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        n_client_iterations = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:732:35:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        n_servers = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/DLL_Test.cpp:61:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *subdir_env = ACE_OS::getenv ("ACE_EXE_SUB_DIR");
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:357:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *root = ACE_OS::getenv ("top_srcdir");
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:359:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    root = ACE_OS::getenv ("ACE_ROOT");
data/ace-6.5.12+dfsg/tests/Message_Queue_Test.cpp:120:11:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ACE_OS::srand (static_cast<unsigned int> (ACE_OS::time ()));
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:163:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT (":?"), 1, 1);
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:166:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("GroupStart"),
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:173:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Groups"),
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:179:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Debug"),
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:185:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Role"),
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:191:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("SDM_options"),
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:198:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Iterations"),
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:205:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("TTL"),
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:212:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Wait"),
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:219:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("help"),
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:229:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != EOF)
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:244:32:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
            ACE_TCHAR *group = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:253:45:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:257:35:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
            int n = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:272:28:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
            ACE_TCHAR *c = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:287:28:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
            ACE_TCHAR *c = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:324:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          this->ttl_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:327:39:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          this->wait_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:334:23:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
                      getopt.opt_opt ()));
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:341:36:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          if (ACE_OS::strcmp (argv[getopt.opt_ind () - 1], ACE_TEXT ("-?")) != 0
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:342:18:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
              && getopt.opt_opt () != 'h')
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:347:25:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
                        getopt.opt_opt ()));
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:172:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT (":?"), 1, 1);
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:175:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("GroupStart"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:182:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Groups"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:188:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Debug"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:194:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Role"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:200:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("SDM_options"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:207:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Iterations"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:214:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("TTL"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:221:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("Wait"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:228:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  if (getopt.long_option (ACE_TEXT ("help"),
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:239:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != EOF)
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:254:32:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
            ACE_TCHAR *group = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:263:45:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:267:35:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
            int n = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:282:28:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
            ACE_TCHAR *c = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:297:28:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
            ACE_TCHAR *c = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:334:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          this->ttl_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:337:39:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          this->wait_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:344:23:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
                      getopt.opt_opt ()));
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:351:36:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          if (ACE_OS::strcmp (argv[getopt.opt_ind () - 1], ACE_TEXT ("-?")) != 0
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:352:18:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
              && getopt.opt_opt () != 'h')
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:357:25:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
                        getopt.opt_opt ()));
data/ace-6.5.12+dfsg/tests/Notify_Performance_Test.cpp:164:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("pswdc:l:"));
data/ace-6.5.12+dfsg/tests/Notify_Performance_Test.cpp:166:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/tests/Notify_Performance_Test.cpp:180:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_nthreads = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Notify_Performance_Test.cpp:183:36:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_nloops = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:236:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("dc:l:m:t:"));
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:238:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:246:39:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_nchildren = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:249:36:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_nloops = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:252:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        max_retries = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:255:42:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_max_duration = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Process_Semaphore_Test.cpp:186:40:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      const char *subdir_env = ACE_OS::getenv ("ACE_EXE_SUB_DIR");
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:140:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *subdir_env = ACE_OS::getenv ("ACE_EXE_SUB_DIR");
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:204:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("ch:f:"));
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:206:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != -1)
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:213:42:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          handle_inherit = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:216:28:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          temp_file_name = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:331:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("c:s:t:d"), 1);
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:332:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:337:42:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_nconnections = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:340:34:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_secs = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:343:45:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_reactor_threads = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:310:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("dswc:l:"), 1);
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:311:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for (int c; (c = getopt ()) != -1; )
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:322:42:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_nconnections = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:325:36:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        opt_nloops = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:170:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("r:t:d:i:n:"));
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:174:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != -1)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:180:24:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          rendezvous = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:183:39:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          num_threads = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:186:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          req_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:189:39:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_conn_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:192:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_req_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:75:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("r:s:c:d:i:n:"));
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:79:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != -1)
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:85:24:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          rendezvous = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:88:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          svr_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:91:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:94:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          req_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:97:39:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_conn_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:100:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_req_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Semaphore_Test.cpp:208:11:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ACE_OS::srand ((u_int) ACE_OS::time (0L));
data/ace-6.5.12+dfsg/tests/Signal_Test.cpp:285:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *subdir_env = ACE_OS::getenv ("ACE_EXE_SUB_DIR");
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:89:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  test_dir = ACE_OS::getenv (ACE_TEXT ("ACE_TEST_DIR"));
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:92:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char const * const test_dir_n = ACE_OS::getenv ("ACE_TEST_DIR");
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:82:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("r:s:c:d:i:n:"));
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:86:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != -1)
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:92:24:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          rendezvous = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:95:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          svr_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:98:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:101:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          req_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:104:39:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_conn_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:107:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_req_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:84:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  ACE_Get_Opt getopt (argc, argv, ACE_TEXT ("r:s:c:d:i:n:"));
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:88:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt ()) != -1)
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:94:24:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          rendezvous = getopt.opt_arg ();
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:97:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          svr_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:100:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:103:37:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          req_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:106:39:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_conn_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:109:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
          cli_req_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:145:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if ((ace_root = getenv ("ACE_ROOT")) != 0)
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:151:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
          const char *subdir_env = getenv ("ACE_EXE_SUB_DIR");
data/ace-6.5.12+dfsg/ACEXML/apps/svcconf/Svcconf.cpp:53:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (fstm->open (file) != 0)
data/ace-6.5.12+dfsg/ACEXML/apps/svcconf/Svcconf.cpp:82:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (stm->open (str, ACE_TEXT ("Svcconf")) < 0)
data/ace-6.5.12+dfsg/ACEXML/apps/svcconf/Svcconf_Handler.cpp:64:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (svc_dll.open (active_info->path ()) == -1)
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp:56:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACEXML_FileCharStream::open (const ACEXML_Char *name)
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp:59:31:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return use_stream_i(ACE_OS::fopen (name, ACE_TEXT ("r")), name);
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[4];
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.h:39:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACEXML_Char *name);
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp:42:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACEXML_HttpCharStream::open (const ACEXML_Char *url)
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp:58:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->stream_->open (this->connector_, *this->url_addr_) == -1) {
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp:294:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  bytes += ACE_OS::sprintf (&command[bytes], "\r\n");
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.h:40:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACEXML_Char *url);
data/ace-6.5.12+dfsg/ACEXML/common/Mem_Map_Stream.cpp:146:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACEXML_Mem_Map_Stream::open (Connector *connector,
data/ace-6.5.12+dfsg/ACEXML/common/Mem_Map_Stream.cpp:169:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->mem_map_.open (file.get_path_name (),
data/ace-6.5.12+dfsg/ACEXML/common/Mem_Map_Stream.cpp:193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8192];
data/ace-6.5.12+dfsg/ACEXML/common/Mem_Map_Stream.h:59:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (Connector *connector,
data/ace-6.5.12+dfsg/ACEXML/common/StrCharStream.cpp:19:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACEXML_StrCharStream::open (const ACEXML_Char *str, const ACEXML_Char* name)
data/ace-6.5.12+dfsg/ACEXML/common/StrCharStream.cpp:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[4] = {0,0,0,0};
data/ace-6.5.12+dfsg/ACEXML/common/StrCharStream.h:39:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACEXML_Char *str, const ACEXML_Char* name);
data/ace-6.5.12+dfsg/ACEXML/common/StreamFactory.cpp:28:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (hstream->open (uri) != -1)
data/ace-6.5.12+dfsg/ACEXML/common/StreamFactory.cpp:36:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (fstream->open (uri) != -1)
data/ace-6.5.12+dfsg/ACEXML/common/StreamFactory.cpp:43:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (zstream->open (uri) != -1)
data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.cpp:19:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACEXML_ZipCharStream::open (const ACEXML_Char *name)
data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.cpp:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[4];
data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.h:47:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACEXML_Char *name);
data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.h:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          buf_[80];
data/ace-6.5.12+dfsg/ACEXML/examples/SAXPrint/main.cpp:95:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (zstm->open (filename) != 0)
data/ace-6.5.12+dfsg/ACEXML/examples/SAXPrint/main.cpp:106:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (fstm->open (filename) != 0)
data/ace-6.5.12+dfsg/ACEXML/examples/SAXPrint/main.cpp:120:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (ustm->open (url) != 0)
data/ace-6.5.12+dfsg/ACEXML/examples/SAXPrint/main.cpp:130:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (sstm->open (test_string, ACE_TEXT ("test_string")) < 0)
data/ace-6.5.12+dfsg/ACEXML/parser/parser/Parser.cpp:2078:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (str->open (entity, replace) < 0
data/ace-6.5.12+dfsg/ACEXML/parser/parser/Parser.cpp:2172:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (sstream->open (str.c_str(), replace) < 0
data/ace-6.5.12+dfsg/ACEXML/tests/ContentHandler_Test.cpp:73:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (test_stream->open (tester.get_test_string (),
data/ace-6.5.12+dfsg/ACEXML/tests/HttpCharStream_Test.cpp:15:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (first.open (test) != -1)
data/ace-6.5.12+dfsg/ACEXML/tests/HttpCharStream_Test.cpp:25:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (second.open (simple) != -1)
data/ace-6.5.12+dfsg/ace/ACE.cpp:2745:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      int fd = ACE_OS::open ("/dev/null", O_RDWR, 0);
data/ace-6.5.12+dfsg/ace/ACE_crc32.cpp:141:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      for (const char *p = (const char *) iov[i].iov_base,
data/ace-6.5.12+dfsg/ace/ACE_crc32.cpp:142:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      *e = (const char *) iov[i].iov_base + iov[i].iov_len;
data/ace-6.5.12+dfsg/ace/ACE_crc_ccitt.cpp:109:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      for (const char *p = (const char *) iov[i].iov_base,
data/ace-6.5.12+dfsg/ace/ACE_crc_ccitt.cpp:110:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      *e = (const char *) iov[i].iov_base + iov[i].iov_len;
data/ace-6.5.12+dfsg/ace/ARGV.cpp:387:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy ((void *) ptr,
data/ace-6.5.12+dfsg/ace/ARGV.cpp:399:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy ((void *) ptr,
data/ace-6.5.12+dfsg/ace/ATM_Acceptor.cpp:57:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy ((void *)& (laddr -> satm_number),
data/ace-6.5.12+dfsg/ace/ATM_Acceptor.cpp:88:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_ATM_Acceptor::open (const ACE_Addr &remote_sap,
data/ace-6.5.12+dfsg/ace/ATM_Acceptor.cpp:94:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE handle = acceptor_.open (remote_sap,
data/ace-6.5.12+dfsg/ace/ATM_Acceptor.h:72:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE open (const ACE_Addr &remote_sap,
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:153:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (atm_addr_.sap.t_atm_sap_appl.ID.user_defined_ID,
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:200:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 (void) ACE_OS::memcpy ((void *) &this->atm_addr_,
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:223:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 (void) ACE_OS::memcpy ((void *) &this->atm_addr_,
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:275:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (atm_addr_.sap.t_atm_sap_addr.address,
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:281:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (atm_addr_.sap.t_atm_sap_addr.address,
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:296:4:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
   MultiByteToWideChar (CP_ACP, MB_PRECOMPOSED, sap, -1, tmpWStr, 100);
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:379:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (nsap.atmnsap,
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:463:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (&this->atm_addr_, addr, len);
data/ace-6.5.12+dfsg/ace/ATM_QoS.cpp:129:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy(ie_ptr->IE, &ie_aalparams, sizeof(AAL_PARAMETERS_IE));
data/ace-6.5.12+dfsg/ace/ATM_QoS.cpp:136:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy(ie_ptr->IE, &ie_td, sizeof(ATM_TRAFFIC_DESCRIPTOR_IE));
data/ace-6.5.12+dfsg/ace/ATM_QoS.cpp:143:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy(ie_ptr->IE,
data/ace-6.5.12+dfsg/ace/ATM_QoS.cpp:152:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy(ie_ptr->IE, &ie_qos, sizeof(ATM_QOS_CLASS_IE));
data/ace-6.5.12+dfsg/ace/ATM_QoS.cpp:508:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy(source_addr->address,
data/ace-6.5.12+dfsg/ace/ATM_Stream.cpp:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[256];
data/ace-6.5.12+dfsg/ace/ATM_Stream.cpp:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[256];
data/ace-6.5.12+dfsg/ace/ATM_Stream.cpp:208:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (connect_opts,
data/ace-6.5.12+dfsg/ace/ATM_Stream.h:53:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_ATM_Params params = ACE_ATM_Params());
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:61:43:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Acceptor<SVC_HANDLER, PEER_ACCEPTOR>::open
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:83:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->peer_acceptor_.open (local_addr, reuse_addr) == -1)
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:128:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (addr,
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:348:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (result == 0 && svc_handler->open ((void *) this) == -1)
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:529:52:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Strategy_Acceptor<SVC_HANDLER, PEER_ACCEPTOR>::open
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:537:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->open
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:543:52:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Strategy_Acceptor<SVC_HANDLER, PEER_ACCEPTOR>::open
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:596:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->accept_strategy_->open (local_addr, reuse_addr) == -1)
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:693:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (addr,
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:879:51:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Oneshot_Acceptor<SVC_HANDLER, PEER_ACCEPTOR>::open
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:899:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->peer_acceptor_.open (local_addr, 1);
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:924:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local_addr, reactor, cs) == -1)
data/ace-6.5.12+dfsg/ace/Acceptor.h:147:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const typename PEER_ACCEPTOR::PEER_ADDR &local_addr,
data/ace-6.5.12+dfsg/ace/Acceptor.h:357:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const typename PEER_ACCEPTOR::PEER_ADDR &local_addr,
data/ace-6.5.12+dfsg/ace/Acceptor.h:369:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const typename PEER_ACCEPTOR::PEER_ADDR &,
data/ace-6.5.12+dfsg/ace/Acceptor.h:568:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const typename PEER_ACCEPTOR::PEER_ADDR &,
data/ace-6.5.12+dfsg/ace/Active_Map_Manager_T.h:64:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t length = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/Argv_Type_Converter.cpp:88:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char *[this->saved_argc_ + 1]);
data/ace-6.5.12+dfsg/ace/Asynch_Acceptor.cpp:48:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Acceptor<HANDLER>::open (const ACE_INET_Addr &address,
data/ace-6.5.12+dfsg/ace/Asynch_Acceptor.cpp:75:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->asynch_accept_.open (*this,
data/ace-6.5.12+dfsg/ace/Asynch_Acceptor.cpp:183:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->asynch_accept_.open (*this,
data/ace-6.5.12+dfsg/ace/Asynch_Acceptor.cpp:317:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      new_handler->open (result.accept_handle (),
data/ace-6.5.12+dfsg/ace/Asynch_Acceptor.h:107:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_INET_Addr &address,
data/ace-6.5.12+dfsg/ace/Asynch_Connector.cpp:36:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Connector<HANDLER>::open (bool pass_addresses,
data/ace-6.5.12+dfsg/ace/Asynch_Connector.cpp:45:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->asynch_connect_.open (*this,
data/ace-6.5.12+dfsg/ace/Asynch_Connector.cpp:156:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      new_handler->open (result.connect_handle (), mb);
data/ace-6.5.12+dfsg/ace/Asynch_Connector.h:56:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (bool pass_addresses = false,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:94:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Operation::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:99:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->implementation ()->open (handler.proxy (),
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:165:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Read_Stream::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:178:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Asynch_Operation::open (handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:283:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Write_Stream::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:296:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Asynch_Operation::open (handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:401:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Read_File::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:414:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Asynch_Operation::open (handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:509:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Write_File::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:522:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Asynch_Operation::open (handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:617:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Accept::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:630:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Asynch_Operation::open (handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:726:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Connect::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:739:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Asynch_Operation::open (handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:816:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Transmit_File::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:829:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Asynch_Operation::open (handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:1185:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Service_Handler::open (ACE_HANDLE,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:1206:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Read_Dgram::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:1219:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Asynch_Operation::open (handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:1318:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Asynch_Write_Dgram::open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:1331:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Asynch_Operation::open (handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:207:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:310:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:458:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:616:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:750:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:882:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:1017:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:1123:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:1328:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:1461:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:1716:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE new_handle,
data/ace-6.5.12+dfsg/ace/Asynch_IO_Impl.h:121:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/CDR_Base.cpp:517:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (start, mb->rd_ptr (), mb_len);
data/ace-6.5.12+dfsg/ace/CDR_Base.cpp:598:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char rhs_ptr[16];
data/ace-6.5.12+dfsg/ace/CDR_Base.cpp:647:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (rhs_ptr, this->ld, sizeof (this->ld));
data/ace-6.5.12+dfsg/ace/CDR_Base.cpp:653:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy(this->ld,
data/ace-6.5.12+dfsg/ace/CDR_Base.cpp:689:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char copy[16];
data/ace-6.5.12+dfsg/ace/CDR_Base.cpp:745:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy(lhs_ptr, this->ld, sizeof (ret));
data/ace-6.5.12+dfsg/ace/CDR_Base.cpp:950:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (f.value_ + 16 - len, array, len);
data/ace-6.5.12+dfsg/ace/CDR_Base.cpp:1511:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char digits[ACE_CDR::Fixed::MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/ace/CDR_Base.h:221:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char f[4];
data/ace-6.5.12+dfsg/ace/CDR_Base.h:236:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char f[8];
data/ace-6.5.12+dfsg/ace/CDR_Base.h:271:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char ld[16];
data/ace-6.5.12+dfsg/ace/CDR_Stream.cpp:632:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf, x, size*length);
data/ace-6.5.12+dfsg/ace/CDR_Stream.cpp:637:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (buf, x, size*length);
data/ace-6.5.12+dfsg/ace/CDR_Stream.cpp:1840:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (x, buf, size*length);
data/ace-6.5.12+dfsg/ace/CDR_Stream.cpp:1843:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy (x, buf, size*length);
data/ace-6.5.12+dfsg/ace/CDR_Stream.cpp:2287:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void) ACE_OS::memcpy (this->start_.wr_ptr (),
data/ace-6.5.12+dfsg/ace/Cache_Map_Manager_T.cpp:29:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (size, alloc) == -1)
data/ace-6.5.12+dfsg/ace/Cache_Map_Manager_T.cpp:43:115:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Cache_Map_Manager<KEY, VALUE, CMAP_TYPE, ITERATOR_IMPL, REVERSE_ITERATOR_IMPL, CACHING_STRATEGY, ATTRIBUTES>::open (size_t length,
data/ace-6.5.12+dfsg/ace/Cache_Map_Manager_T.cpp:46:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->map_.open (length,
data/ace-6.5.12+dfsg/ace/Cache_Map_Manager_T.h:104:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t length = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/Cached_Connect_Strategy_T.cpp:32:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (cre_s, con_s, rec_s) == -1)
data/ace-6.5.12+dfsg/ace/Capabilities.cpp:111:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->caps_.open ();
data/ace-6.5.12+dfsg/ace/Capabilities.cpp:307:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = ACE_OS::fopen (fname, ACE_TEXT ("r"));
data/ace-6.5.12+dfsg/ace/Codeset_IBM1047.cpp:205:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf, x, len);
data/ace-6.5.12+dfsg/ace/Codeset_IBM1047.cpp:360:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf, x, len);
data/ace-6.5.12+dfsg/ace/Codeset_Registry.cpp:43:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (*char_sets, element->char_sets_,
data/ace-6.5.12+dfsg/ace/Codeset_Registry.cpp:71:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (*char_sets, element->char_sets_,
data/ace-6.5.12+dfsg/ace/Compression/rle/RLECompressor.cpp:123:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            ACE_OS::memcpy(out_p, in_p, cpy_len);
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1256:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Configuration_Heap::open (size_t default_map_size)
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1276:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Configuration_Heap::open (const ACE_TCHAR* file_name,
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1922:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (pers_value, data, length);
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1933:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (pers_value, data, length);
data/ace-6.5.12+dfsg/ace/Configuration.cpp:2079:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (data, VIntId.data_.ptr_, VIntId.length_);
data/ace-6.5.12+dfsg/ace/Configuration.h:795:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR* file_name,
data/ace-6.5.12+dfsg/ace/Configuration.h:809:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t default_map_size = ACE_DEFAULT_CONFIG_SECTION_SIZE);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:37:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* in = ACE_OS::fopen (filename, ACE_TEXT ("r"));
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:85:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (temp_buffer, buffer, buffer_size);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:285:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* out = ACE_OS::fopen (filename, ACE_TEXT ("w"));
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:457:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          u_int value = ACE_OS::atoi (end + 1);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:484:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* in = ACE_OS::fopen (filename, ACE_TEXT ("r"));
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:586:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* out = ACE_OS::fopen (filename, ACE_TEXT ("w"));
data/ace-6.5.12+dfsg/ace/Connector.cpp:268:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (error || svc_handler->open ((void *) this) == -1)
data/ace-6.5.12+dfsg/ace/Connector.cpp:332:45:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Connector<SVC_HANDLER, PEER_CONNECTOR>::open (ACE_Reactor *r, int flags)
data/ace-6.5.12+dfsg/ace/Connector.cpp:344:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  (void) this->open (r, flags);
data/ace-6.5.12+dfsg/ace/Connector.cpp:786:54:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Strategy_Connector<SVC_HANDLER, PEER_CONNECTOR>::open (ACE_Reactor *r,
data/ace-6.5.12+dfsg/ace/Connector.cpp:790:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->open (r, 0, 0, 0, flags);
data/ace-6.5.12+dfsg/ace/Connector.cpp:794:54:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Strategy_Connector<SVC_HANDLER, PEER_CONNECTOR>::open
data/ace-6.5.12+dfsg/ace/Connector.cpp:894:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (reactor, cre_s, conn_s, con_s, flags) == -1)
data/ace-6.5.12+dfsg/ace/Connector.h:190:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Reactor *r = ACE_Reactor::instance (),
data/ace-6.5.12+dfsg/ace/Connector.h:451:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Reactor *r,
data/ace-6.5.12+dfsg/ace/Connector.h:460:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Reactor *r = ACE_Reactor::instance (),
data/ace-6.5.12+dfsg/ace/DLL.cpp:40:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      && this->open (rhs.dll_name_,
data/ace-6.5.12+dfsg/ace/DLL.cpp:83:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (dll_name, this->open_mode_, close_handle_on_destruction) != 0
data/ace-6.5.12+dfsg/ace/DLL.cpp:123:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_DLL::open (const ACE_TCHAR *dll_filename,
data/ace-6.5.12+dfsg/ace/DLL.h:129:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *dll_name,
data/ace-6.5.12+dfsg/ace/DLL_Manager.cpp:49:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_DLL_Handle::open (const ACE_TCHAR *dll_name,
data/ace-6.5.12+dfsg/ace/DLL_Manager.cpp:540:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (size) != 0 && ACE::debug ())
data/ace-6.5.12+dfsg/ace/DLL_Manager.cpp:586:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (dll_handle->open (dll_name, open_mode, handle, errors) != 0)
data/ace-6.5.12+dfsg/ace/DLL_Manager.cpp:667:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_DLL_Manager::open (int size)
data/ace-6.5.12+dfsg/ace/DLL_Manager.h:109:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *dll_name,
data/ace-6.5.12+dfsg/ace/DLL_Manager.h:276:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int size);
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:60:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Dev_Poll_Reactor_Notify::open (ACE_Reactor_Impl *r,
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:76:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (this->notification_pipe_.open () == -1)
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:92:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (notification_queue_.open () == -1)
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:224:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char b[1024];
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:457:43:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Dev_Poll_Reactor::Handler_Repository::open (size_t size)
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:613:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (ACE::max_handles (),
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:654:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (size,
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:674:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Dev_Poll_Reactor::open (size_t size,
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:756:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->poll_fd_ = ACE_OS::open ("/dev/poll", O_RDWR);
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:762:42:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (result != -1 && this->handler_rep_.open (size) == -1)
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.cpp:767:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (this->notify_handler_->open (this,
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.h:78:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Reactor_Impl *,
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.h:324:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int open (size_t size);
data/ace-6.5.12+dfsg/ace/Dev_Poll_Reactor.h:442:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t size,
data/ace-6.5.12+dfsg/ace/Dirent.h:44:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *filename);
data/ace-6.5.12+dfsg/ace/Dirent_Selector.cpp:31:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Dirent_Selector::open (const ACE_TCHAR *dir,
data/ace-6.5.12+dfsg/ace/Dirent_Selector.h:54:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *dir,
data/ace-6.5.12+dfsg/ace/ETCL/ETCL_Interpreter.cpp:94:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf,
data/ace-6.5.12+dfsg/ace/ETCL/ETCL_l.cpp:897:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        new ETCL_Literal_Constraint (ACE_OS::atoi (yytext));
data/ace-6.5.12+dfsg/ace/ETCL/ETCL_y.cpp:1136:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        ACE_OS::strcpy(msg, "parse error");
data/ace-6.5.12+dfsg/ace/Env_Value_T.h:60:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  void open (const ACE_TCHAR *varname, const T &defval);
data/ace-6.5.12+dfsg/ace/FIFO.cpp:33:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_FIFO::open (const ACE_TCHAR *r, int flags, mode_t perms,
data/ace-6.5.12+dfsg/ace/FIFO.cpp:44:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->set_handle (ACE_OS::open (this->rendezvous_, flags, 0, sa));
data/ace-6.5.12+dfsg/ace/FIFO.cpp:54:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (fifo_name, flags, perms, sa) == -1)
data/ace-6.5.12+dfsg/ace/FIFO.h:51:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *rendezvous, int flags, mode_t perms,
data/ace-6.5.12+dfsg/ace/FIFO_Recv.cpp:47:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_FIFO_Recv::open (const ACE_TCHAR *fifo_name,
data/ace-6.5.12+dfsg/ace/FIFO_Recv.cpp:55:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_FIFO::open (fifo_name, ACE_NONBLOCK | flags, perms, sa) == -1)
data/ace-6.5.12+dfsg/ace/FIFO_Recv.cpp:60:44:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
           && (this->aux_handle_ = ACE_OS::open (fifo_name, O_WRONLY, 0, sa)) == ACE_INVALID_HANDLE)
data/ace-6.5.12+dfsg/ace/FIFO_Recv.cpp:81:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ACE_FIFO_Recv::open (fifo_name,
data/ace-6.5.12+dfsg/ace/FIFO_Recv.h:59:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *rendezvous,
data/ace-6.5.12+dfsg/ace/FIFO_Recv_Msg.cpp:30:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_FIFO_Recv_Msg::open (const ACE_TCHAR *fifo_name,
data/ace-6.5.12+dfsg/ace/FIFO_Recv_Msg.cpp:38:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_FIFO_Recv::open (fifo_name,
data/ace-6.5.12+dfsg/ace/FIFO_Recv_Msg.cpp:58:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ACE_FIFO_Recv_Msg::open (fifo_name,
data/ace-6.5.12+dfsg/ace/FIFO_Recv_Msg.h:57:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *rendezvous,
data/ace-6.5.12+dfsg/ace/FIFO_Send.cpp:32:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_FIFO_Send::open (const ACE_TCHAR *rendezvous_name,
data/ace-6.5.12+dfsg/ace/FIFO_Send.cpp:38:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_FIFO::open (rendezvous_name,
data/ace-6.5.12+dfsg/ace/FIFO_Send.cpp:50:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ACE_FIFO_Send::open (fifo_name,
data/ace-6.5.12+dfsg/ace/FIFO_Send.h:51:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *rendezvous,
data/ace-6.5.12+dfsg/ace/FIFO_Send_Msg.cpp:62:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_FIFO_Send_Msg::open (const ACE_TCHAR *fifo_name,
data/ace-6.5.12+dfsg/ace/FIFO_Send_Msg.cpp:68:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_FIFO_Send::open (fifo_name, flags | O_WRONLY, perms, sa);
data/ace-6.5.12+dfsg/ace/FIFO_Send_Msg.cpp:77:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ACE_FIFO_Send_Msg::open (fifo_name, flags, perms, sa) == -1)
data/ace-6.5.12+dfsg/ace/FIFO_Send_Msg.h:50:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *rendezvous,
data/ace-6.5.12+dfsg/ace/FILE_Connector.cpp:63:24:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
      handle = ACE_OS::mkstemp (filename); // mkstemp() replaces "XXXXXX"
data/ace-6.5.12+dfsg/ace/File_Lock.cpp:50:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (name, flags, perms) == -1)
data/ace-6.5.12+dfsg/ace/File_Lock.cpp:58:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_File_Lock::open (const ACE_TCHAR *name,
data/ace-6.5.12+dfsg/ace/File_Lock.h:57:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *filename,
data/ace-6.5.12+dfsg/ace/Filecache.cpp:532:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->handle_ = ACE_OS::open (this->tempname_,
data/ace-6.5.12+dfsg/ace/Filecache.cpp:586:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->handle_ = ACE_OS::open (this->tempname_, WRITE_FLAGS, W_MASK, this->sa_);
data/ace-6.5.12+dfsg/ace/Filecache.cpp:643:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ACE_HANDLE original = ACE_OS::open (this->filename_, WRITE_FLAGS, W_MASK,
data/ace-6.5.12+dfsg/ace/Filecache.cpp:664:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      this->handle_ = ACE_OS::open (this->tempname_, READ_FLAGS, R_MASK);
data/ace-6.5.12+dfsg/ace/FlReactor/FlReactor.cpp:28:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->notify_handler_->open (this, 0);
data/ace-6.5.12+dfsg/ace/FoxReactor/FoxReactor.cpp:34:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->notify_handler_->open (this, 0);
data/ace-6.5.12+dfsg/ace/Framework_Component.cpp:39:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Framework_Repository::open (int size)
data/ace-6.5.12+dfsg/ace/Framework_Component.cpp:278:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (size) == -1)
data/ace-6.5.12+dfsg/ace/Framework_Component.h:112:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int size = DEFAULT_SIZE);
data/ace-6.5.12+dfsg/ace/Handle_Ops.cpp:28:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ACE_HANDLE const handle = ACE_OS::open (name, flags, perms, sa);
data/ace-6.5.12+dfsg/ace/Handle_Ops.cpp:39:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return ACE_OS::open (name, flags, perms, sa);
data/ace-6.5.12+dfsg/ace/Handle_Set.cpp:104:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy ((void *) &this->mask_,
data/ace-6.5.12+dfsg/ace/Handle_Set.h:165:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char nbits_[NBITS];
data/ace-6.5.12+dfsg/ace/Hash_Map_Manager_T.cpp:134:76:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Hash_Map_Manager_Ex<EXT_ID, INT_ID, HASH_KEY, COMPARE_KEYS, ACE_LOCK>::open (size_t size,
data/ace-6.5.12+dfsg/ace/Hash_Map_Manager_T.h:220:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t size = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/Hash_Multi_Map_Manager_T.cpp:120:79:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Hash_Multi_Map_Manager<EXT_ID, INT_ID, HASH_KEY, COMPARE_KEYS, ACE_LOCK>::open (size_t size,
data/ace-6.5.12+dfsg/ace/Hash_Multi_Map_Manager_T.h:219:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t size = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:89:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *cpuinfo = ACE_OS::fopen (ACE_TEXT ("/proc/cpuinfo"),
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:94:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[128];
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:118:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char arg[128];
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:518:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          int const value = ACE_OS::atoi (env_value);
data/ace-6.5.12+dfsg/ace/ICMP_Socket.cpp:82:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_ICMP_Socket::open (ACE_Addr const & local,
data/ace-6.5.12+dfsg/ace/ICMP_Socket.cpp:113:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_RAW,
data/ace-6.5.12+dfsg/ace/ICMP_Socket.h:70:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Addr const & local = ACE_Addr::sap_any,
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hoststr[MAXHOSTNAMELEN+1];
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:203:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&this->inet_addr_,
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:442:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&addr, curr->ai_addr, curr->ai_addrlen);
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:601:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&this->inet_addr_.in4_, addr, len);
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:611:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&this->inet_addr_.in6_, addr, len);
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:793:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char char_hostname [MAXHOSTNAMELEN + 1];
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:818:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char name[MAXHOSTNAMELEN + 1];
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:820:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    ACE_OS::strcpy (name, "<unknown>");
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:916:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy (&this->inet_addr_.in4_.sin_addr,
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:930:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (&this->inet_addr_.in4_.sin_addr,
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:946:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy (&this->inet_addr_.in6_.sin6_addr,
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:959:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:981:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&this->inet_addr_.in6_.sin6_addr, ip_addr, len);
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:1005:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        intf_name ? ACE_OS::atoi (intf_name) : 0;
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:1058:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char scope_buf[32];
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:1084:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[INET6_ADDRSTRLEN];
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:1087:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[INET_ADDRSTRLEN];
data/ace-6.5.12+dfsg/ace/LSOCK.cpp:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmsgbuf[ACE_BSD_CONTROL_MSG_LEN];
data/ace-6.5.12+dfsg/ace/LSOCK.cpp:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmsgbuf[ACE_BSD_CONTROL_MSG_LEN];
data/ace-6.5.12+dfsg/ace/LSOCK_Acceptor.cpp:52:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_LSOCK_Acceptor::open (const ACE_Addr &remote_sap,
data/ace-6.5.12+dfsg/ace/LSOCK_Acceptor.cpp:60:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_SOCK_Acceptor::open (remote_sap, reuse_addr,
data/ace-6.5.12+dfsg/ace/LSOCK_Acceptor.cpp:73:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (remote_sap,
data/ace-6.5.12+dfsg/ace/LSOCK_Acceptor.h:53:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/LSOCK_CODgram.cpp:35:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_LSOCK_CODgram::open (const ACE_Addr &remote,
data/ace-6.5.12+dfsg/ace/LSOCK_CODgram.cpp:41:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK_CODgram::open (remote, local, protocol_family,
data/ace-6.5.12+dfsg/ace/LSOCK_CODgram.cpp:56:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (remote, local, protocol_family,
data/ace-6.5.12+dfsg/ace/LSOCK_CODgram.h:80:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &remote_sap,
data/ace-6.5.12+dfsg/ace/LSOCK_Dgram.cpp:42:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_LSOCK_Dgram::open (const ACE_Addr &local,
data/ace-6.5.12+dfsg/ace/LSOCK_Dgram.cpp:47:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK_Dgram::open (local,
data/ace-6.5.12+dfsg/ace/LSOCK_Dgram.cpp:62:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local,
data/ace-6.5.12+dfsg/ace/LSOCK_Dgram.h:46:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local,
data/ace-6.5.12+dfsg/ace/LSOCK_Stream.cpp:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmsgbuf[ACE_BSD_CONTROL_MSG_LEN];
data/ace-6.5.12+dfsg/ace/LSOCK_Stream.cpp:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmsgbuf[ACE_BSD_CONTROL_MSG_LEN];
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:533:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return ACE_OS::fopen (buf, type);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:657:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE handle = ACE_OS::open (name,
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:664:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE handle = ACE_OS::open (name, mode, perm);
data/ace-6.5.12+dfsg/ace/Local_Name_Space.cpp:124:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (this->rep_, src, bytes);
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:353:49:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Local_Name_Space<ACE_MEM_POOL_2, ACE_LOCK>::open (
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:381:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (scope_in) == -1)
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.h:121:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Naming_Context::Context_Scope_Type scope_in);
data/ace-6.5.12+dfsg/ace/Local_Tokens.cpp:1175:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Token_Proxy::open (const ACE_TCHAR *token_name,
data/ace-6.5.12+dfsg/ace/Local_Tokens.h:768:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_TCHAR *name,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:774:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Log_Msg::open (const ACE_TCHAR *prog_name,
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:826:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        status = ACE_Log_Msg_Manager::log_backend_->open (logger_key);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:850:47:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        ACE_Log_Msg_Manager::custom_backend_->open (logger_key);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1143:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char strerror_buf[128]; // always narrow chars
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1144:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (strerror_buf, "strerror_r failed");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1805:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char tid_buf[ACE_LOG_MSG_GET_THREAD_ID_BUFFER_SIZE] = {};
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2282:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (this->bp_, str, n);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2302:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char strerror_buf[128]; // always narrow chars
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2303:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        ACE_OS::strcpy (strerror_buf, "strerror_r failed");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2397:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char strerror_buf[128]; // always narrow chars
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2398:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        ACE_OS::strcpy (strerror_buf, "strerror_r failed");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2476:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char day_and_time[27];
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2552:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      ACE_OS::strcpy (this->fp_, "ls");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2560:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      ACE_OS::strcpy (this->fp_, "ls");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2739:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char day_and_time[27];
data/ace-6.5.12+dfsg/ace/Log_Msg.h:292:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *prog_name,
data/ace-6.5.12+dfsg/ace/Log_Msg.h:647:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_[MAXPATHLEN + 1];
data/ace-6.5.12+dfsg/ace/Log_Msg.h:899:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt_out_[128];
data/ace-6.5.12+dfsg/ace/Log_Msg_Android_Logcat.cpp:52:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Log_Msg_Android_Logcat::open (const ACE_TCHAR *)
data/ace-6.5.12+dfsg/ace/Log_Msg_Android_Logcat.h:42:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_TCHAR *);
data/ace-6.5.12+dfsg/ace/Log_Msg_Backend.h:56:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_TCHAR *logger_key) = 0;
data/ace-6.5.12+dfsg/ace/Log_Msg_IPC.cpp:22:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Log_Msg_IPC::open (const ACE_TCHAR *logger_key)
data/ace-6.5.12+dfsg/ace/Log_Msg_IPC.h:59:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_TCHAR *logger_key);
data/ace-6.5.12+dfsg/ace/Log_Msg_NT_Event_Log.cpp:26:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Log_Msg_NT_Event_Log::open (const ACE_TCHAR *logger_key)
data/ace-6.5.12+dfsg/ace/Log_Msg_NT_Event_Log.h:50:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_TCHAR *logger_key);
data/ace-6.5.12+dfsg/ace/Log_Msg_UNIX_Syslog.cpp:35:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Log_Msg_UNIX_Syslog::open (const ACE_TCHAR * logger_key)
data/ace-6.5.12+dfsg/ace/Log_Msg_UNIX_Syslog.h:51:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_TCHAR *logger_key);
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:198:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->max_file_number_ = ACE_OS::atoi (get_opt.opt_arg ()) - 1;
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:366:37:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              output_file = ACE_OS::fopen (this->filename_, ACE_TEXT ("wt"));
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:370:35:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            output_file = ACE_OS::fopen (this->filename_,
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:420:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->log_msg_->open (this->program_name_,
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:462:37:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              output_file = ACE_OS::fopen (this->filename_,
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:470:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              output_file->open (ACE_TEXT_ALWAYS_CHAR (this->filename_),
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:556:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      output_file = ACE_OS::fopen (this->filename_, ACE_TEXT ("wt"));
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:563:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      output_file->open (ACE_TEXT_ALWAYS_CHAR (this->filename_),
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.cpp:60:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (remote_sap,
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.cpp:69:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_MEM_Acceptor::open (const ACE_MEM_Addr &remote_sap,
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.cpp:75:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->ACE_SOCK_Acceptor::open (remote_sap.get_local_addr (),
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.h:74:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_MEM_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.h:133:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.h:139:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:418:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (static_cast<char *> (buf->data ()) + n,
data/ace-6.5.12+dfsg/ace/MMAP_Memory_Pool.cpp:373:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->mmap_.open (this->backing_store_name_,
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:100:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
MQX_Filesystem::open (const char *path, int mode)
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cstdlib_mode[4] = {0}; // r/w/a, t/b, +?, null terminator
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[FS_FILENAME_SIZE];
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char abspath[ACE_MQX_ABS_PATH_SIZE];
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curdirtmp[FS_FILENAME_SIZE];
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:256:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fs_name[IOCFG_FS_MAX_DEVLEN];
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:384:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char oldtmp[FS_FILENAME_SIZE];
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:387:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char newtmp[FS_FILENAME_SIZE];
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:462:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmppath[ACE_MQX_ABS_PATH_SIZE];
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:526:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return MQX_Filesystem::inst ().open (filename, mode);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.h:83:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const char *path, int mode);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.h:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char current_fs_name_[IOCFG_FS_MAX_DEVLEN];
data/ace-6.5.12+dfsg/ace/Malloc.h:284:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char padding_[(ACE_MALLOC_PADDING_SIZE) ? ACE_MALLOC_PADDING_SIZE : ACE_MALLOC_ALIGN];
data/ace-6.5.12+dfsg/ace/Malloc.h:355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lock_name_[MAXNAMELEN];
data/ace-6.5.12+dfsg/ace/Malloc.h:376:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char align_[(ACE_CONTROL_BLOCK_ALIGN_BYTES) ? ACE_CONTROL_BLOCK_ALIGN_BYTES : ACE_MALLOC_ALIGN];
data/ace-6.5.12+dfsg/ace/Malloc_T.cpp:433:49:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Malloc_T<ACE_MEM_POOL_2, ACE_LOCK, ACE_CB>::open (void)
data/ace-6.5.12+dfsg/ace/Malloc_T.cpp:519:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      this->bad_flag_ = this->open ();
data/ace-6.5.12+dfsg/ace/Malloc_T.cpp:544:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      this->bad_flag_ = this->open ();
data/ace-6.5.12+dfsg/ace/Malloc_T.cpp:572:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->bad_flag_ = this->open ();
data/ace-6.5.12+dfsg/ace/Malloc_T.h:381:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pool_[POOL_SIZE];
data/ace-6.5.12+dfsg/ace/Malloc_T.h:628:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void);
data/ace-6.5.12+dfsg/ace/Map_Manager.cpp:27:44:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Map_Manager<EXT_ID, INT_ID, ACE_LOCK>::open (size_t size,
data/ace-6.5.12+dfsg/ace/Map_Manager.h:155:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t length = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/Map_T.cpp:128:78:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Map_Impl<KEY, VALUE, IMPLEMENTATION, ITERATOR, REVERSE_ITERATOR, ENTRY>::open (size_t length,
data/ace-6.5.12+dfsg/ace/Map_T.cpp:131:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->implementation_.open (length,
data/ace-6.5.12+dfsg/ace/Map_T.cpp:409:58:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Active_Map_Manager_Adapter<KEY, VALUE, KEY_ADAPTER>::open (size_t length,
data/ace-6.5.12+dfsg/ace/Map_T.cpp:412:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->implementation_.open (length,
data/ace-6.5.12+dfsg/ace/Map_T.cpp:851:85:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Hash_Map_Manager_Ex_Adapter<KEY, VALUE, HASH_KEY, COMPARE_KEYS, KEY_GENERATOR>::open (size_t length,
data/ace-6.5.12+dfsg/ace/Map_T.cpp:854:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->implementation_.open (length,
data/ace-6.5.12+dfsg/ace/Map_T.cpp:1144:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Map_Manager_Adapter<KEY, VALUE, KEY_GENERATOR>::open (size_t length,
data/ace-6.5.12+dfsg/ace/Map_T.cpp:1147:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->implementation_.open (length,
data/ace-6.5.12+dfsg/ace/Map_T.h:285:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t length = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/Map_T.h:569:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t length = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/Map_T.h:849:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t length = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/Map_T.h:1140:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t length = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/Map_T.h:1424:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t length = ACE_DEFAULT_MAP_SIZE,
data/ace-6.5.12+dfsg/ace/Mem_Map.cpp:182:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Mem_Map::open (const ACE_TCHAR *file_name,
data/ace-6.5.12+dfsg/ace/Mem_Map.cpp:192:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_OSCALL (::open (file_name, flags, perms, "shr=get,put,upd"), ACE_HANDLE, -1, this->handle_);
data/ace-6.5.12+dfsg/ace/Mem_Map.cpp:194:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->handle_ = ACE_OS::open (file_name, flags, perms, sa);
data/ace-6.5.12+dfsg/ace/Mem_Map.cpp:224:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (file_name,
data/ace-6.5.12+dfsg/ace/Mem_Map.h:99:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *filename,
data/ace-6.5.12+dfsg/ace/Message_Block.cpp:89:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      (void) ACE_OS::memcpy (this->wr_ptr (),
data/ace-6.5.12+dfsg/ace/Message_Block.cpp:115:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      (void) ACE_OS::memcpy (this->wr_ptr (),
data/ace-6.5.12+dfsg/ace/Message_Block.cpp:224:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf,
data/ace-6.5.12+dfsg/ace/Message_Block.cpp:659:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      (void) ACE_OS::memcpy (this->wr_ptr (),
data/ace-6.5.12+dfsg/ace/Message_Block.cpp:1131:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (nb->base_,
data/ace-6.5.12+dfsg/ace/Message_Queue_NT.cpp:22:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->open (max_threads);
data/ace-6.5.12+dfsg/ace/Message_Queue_NT.cpp:26:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Message_Queue_NT::open (DWORD max_threads)
data/ace-6.5.12+dfsg/ace/Message_Queue_NT.h:57:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (DWORD max_threads = ACE_Message_Queue_Base::DEFAULT_HWM);
data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp:69:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->queue_.open (high_water_mark, low_water_mark, ns) == -1)
data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp:81:69:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Message_Queue_Ex<ACE_MESSAGE_TYPE, ACE_SYNCH_USE, TIME_POLICY>::open (size_t hwm,
data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp:87:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->queue_.open (hwm, lwm, ns);
data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp:1056:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (hwm, lwm, ns) == -1)
data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp:1065:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pid_buf[sizeof (int) + 1];
data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp:1066:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  ACE_OS::sprintf (pid_buf, "%d", ACE_OS::getpid ());
data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp:1070:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addr_buf[addr_nibbles + 1];
data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp:1071:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  ACE_OS::sprintf (addr_buf, "%p", this);
data/ace-6.5.12+dfsg/ace/Message_Queue_T.cpp:1141:48:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Message_Queue<ACE_SYNCH_USE, TIME_POLICY>::open (size_t hwm,
data/ace-6.5.12+dfsg/ace/Message_Queue_T.h:106:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t hwm = ACE_Message_Queue_Base::DEFAULT_HWM,
data/ace-6.5.12+dfsg/ace/Message_Queue_T.h:1047:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t hwm = ACE_Message_Queue_Base::DEFAULT_HWM,
data/ace-6.5.12+dfsg/ace/Message_Queue_Vx.cpp:68:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (max_messages_, max_message_length_, ns) == -1)
data/ace-6.5.12+dfsg/ace/Message_Queue_Vx.cpp:85:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Message_Queue_Vx::open (size_t max_messages,
data/ace-6.5.12+dfsg/ace/Message_Queue_Vx.h:72:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t max_messages,
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:50:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (name_tmp, name, ACE_OS::strlen (name)+1);
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:77:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (name_tmp, name, ACE_OS::strlen (name)+1);
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:124:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (name_tmp, name, ACE_OS::strlen (name)+1);
data/ace-6.5.12+dfsg/ace/Module.cpp:88:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Module<ACE_SYNCH_USE, TIME_POLICY>::open (const ACE_TCHAR *module_name,
data/ace-6.5.12+dfsg/ace/Module.cpp:198:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (module_name, writer_q, reader_q, args, flags) == -1)
data/ace-6.5.12+dfsg/ace/Module.h:100:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *module_name,
data/ace-6.5.12+dfsg/ace/Monitor_Control/CPU_Load_Monitor.cpp:125:33:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      this->file_ptr_ = ACE_OS::fopen (ACE_TEXT ("/proc/stat"),
data/ace-6.5.12+dfsg/ace/Monitor_Control/CPU_Load_Monitor.h:88:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf_[1024];
data/ace-6.5.12+dfsg/ace/Monitor_Control/Linux_Network_Interface_Monitor.cpp:26:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[1024];
data/ace-6.5.12+dfsg/ace/Monitor_Control/Linux_Network_Interface_Monitor.cpp:27:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE* fp = ACE_OS::fopen (ACE_TEXT ("/proc/net/dev"),
data/ace-6.5.12+dfsg/ace/Monitor_Control/Linux_Network_Interface_Monitor.cpp:85:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[1024];
data/ace-6.5.12+dfsg/ace/Monitor_Control/Linux_Network_Interface_Monitor.cpp:86:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE* fp = ACE_OS::fopen (ACE_TEXT ("/proc/net/dev"),
data/ace-6.5.12+dfsg/ace/Monitor_Control/Num_Threads_Monitor.cpp:39:33:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      this->file_ptr_ = ACE_OS::fopen (ACE_TEXT ("/proc/self/status"),
data/ace-6.5.12+dfsg/ace/Monitor_Control/Num_Threads_Monitor.h:73:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf_[1024];
data/ace-6.5.12+dfsg/ace/NT_Service.cpp:53:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_NT_Service::open (void *args)
data/ace-6.5.12+dfsg/ace/NT_Service.cpp:287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cfgbuff[1024];
data/ace-6.5.12+dfsg/ace/NT_Service.h:122:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/ace/NT_Service.h:398:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _ace_nt_svc_obj_##SVCNAME->open();                                      \
data/ace-6.5.12+dfsg/ace/Name_Proxy.cpp:34:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Name_Proxy::open (const ACE_INET_Addr &remote_addr,
data/ace-6.5.12+dfsg/ace/Name_Proxy.cpp:57:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (remote_addr, options) == -1
data/ace-6.5.12+dfsg/ace/Name_Proxy.h:56:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_INET_Addr &remote_addr,  // Address of ACE_Name Server.
data/ace-6.5.12+dfsg/ace/Name_Request_Reply.cpp:58:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void) ACE_OS::memcpy (this->name_,
data/ace-6.5.12+dfsg/ace/Name_Request_Reply.cpp:61:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void) ACE_OS::memcpy (this->value_,
data/ace-6.5.12+dfsg/ace/Name_Request_Reply.cpp:64:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void) ACE_OS::memcpy (this->type_,
data/ace-6.5.12+dfsg/ace/Name_Request_Reply.cpp:213:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void) ACE_OS::memcpy (this->name_,
data/ace-6.5.12+dfsg/ace/Name_Request_Reply.cpp:232:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void) ACE_OS::memcpy (this->value_,
data/ace-6.5.12+dfsg/ace/Naming_Context.cpp:63:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Naming_Context::open (Context_Scope_Type scope_in, int lite)
data/ace-6.5.12+dfsg/ace/Naming_Context.cpp:164:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (scope_in, lite) == -1)
data/ace-6.5.12+dfsg/ace/Naming_Context.cpp:405:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->open (this->name_options_->context ());
data/ace-6.5.12+dfsg/ace/Naming_Context.cpp:586:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (program_name);
data/ace-6.5.12+dfsg/ace/Naming_Context.cpp:628:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->nameserver_port (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/ace/Naming_Context.h:85:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (Context_Scope_Type scope_in = ACE_Naming_Context::PROC_LOCAL,
data/ace-6.5.12+dfsg/ace/Netlink_Addr.cpp:44:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void) ACE_OS::memcpy ((void *) &this->nl_,un,len);
data/ace-6.5.12+dfsg/ace/Notification_Queue.cpp:29:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Notification_Queue::open()
data/ace-6.5.12+dfsg/ace/Notification_Queue.h:90:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open();
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:2629:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char adj_name[MAXPATHLEN];
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:2693:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sem_name[128] = {};
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:2702:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char lck_name[128] = {};
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:3090:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&rtparms, pcparms.pc_clparms, sizeof rtparms);
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:3105:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&tsparms, pcparms.pc_clparms, sizeof tsparms);
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:3501:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (pcparms.pc_clparms, &tsparms, sizeof tsparms);
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:3530:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (pcparms.pc_clparms, &rtparms, sizeof rtparms);
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:4878:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char *argv[ACE_MAX_ARGS] = { 0 };
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:206:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy (newv, vector, arena_size * sizeof (ACE_DIRENT *));
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:271:49:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      vector[nfiles++] = (ACE_DIRENT *) ACE_OS::memcpy (newdp, dp, dsize);
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp:15:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_OS::open (const char *filename,
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp:126:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ACE_OSCALL_RETURN (::open (filename, mode, perms), ACE_HANDLE, -1);
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp:131:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return MQX_Filesystem::inst ().open (filename, mode);
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp:134:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_OSCALL_RETURN (::open (filename, mode, perms), ACE_HANDLE, ACE_INVALID_HANDLE);
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp:140:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_OS::open (const wchar_t *filename,
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.cpp:237:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_OS::open (ACE_Wide_To_Ascii (filename).char_rep (),
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.h:52:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE open (const char *filename,
data/ace-6.5.12+dfsg/ace/OS_NS_fcntl.h:58:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE open (const wchar_t *filename,
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:98:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (node->node,
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:125:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (node->node,
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname [MAXHOSTNAMELEN];
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:166:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (&(psa->sin_addr),
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:180:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (node->node,
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:239:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (node->node,
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:310:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (node->node,
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:319:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFFERSIZE];
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:352:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy (node->node,
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:403:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (node->node, LLADDR (addr), sizeof node->node);
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:495:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&addr_storage[i].sin_addr, host->h_addr_list[i],
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:546:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (host, hp->h_name, host_len - 1);
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.h:76:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char node[6];
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:140:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_OS::fopen (const char *filename,
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:161:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE const handle = ACE_OS::open (filename, hmode);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:194:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_OS::fopen (const char *filename,
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:197:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_OS::fopen (filename, ACE_TEXT_ANTI_TO_TCHAR (mode));
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:201:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_OS::fopen (const wchar_t *filename,
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:204:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_OS::fopen (filename, ACE_TEXT_ANTI_TO_TCHAR (mode));
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:208:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_OS::fopen (const wchar_t *filename,
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:222:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE handle = ACE_OS::open (filename, hmode);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:696:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (this->buf_, s, m);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:757:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[100];
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:819:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[LDBL_MAX_10_EXP + 2];
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:1462:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      wchar_t tmp_wstr[2] = {};
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:332:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fopen (const char *filename, const char *mode);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:340:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fopen (const char *filename, const wchar_t *mode);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:346:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fopen (const wchar_t *filename, const wchar_t *mode);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:352:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fopen (const wchar_t *filename, const char *mode);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:420:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expand_buf[PATH_MAX]; // Extra buffer needed to expand symbolic links
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:500:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char link_buf[PATH_MAX];
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:520:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy (expand_buf, link_buf, link_len);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:1208:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ACE_HANDLE const handle = ACE_OS::open (s,
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:119:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int atoi (const char *s);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:126:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int atoi (const wchar_t *s);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:133:8:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  long atol (const char *s);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:140:8:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  long atol (const wchar_t *s);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:227:14:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  ACE_HANDLE mkstemp (char *s);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.h:231:14:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  ACE_HANDLE mkstemp (wchar_t *s);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:81:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ret_errortext[128];
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:142:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char signal_text[128];
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:62:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  void *memcpy (void *t, const void *s, size_t len);
data/ace-6.5.12+dfsg/ace/OS_NS_stropts.h:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char szProtocol[255+1];
data/ace-6.5.12+dfsg/ace/OS_NS_sys_uio.cpp:65:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (iov[i].iov_base, ptr,
data/ace-6.5.12+dfsg/ace/OS_NS_sys_uio.cpp:115:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy (iter, iov[i].iov_base, iov[i].iov_len);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:24:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (name->sysname, "Win32");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:91:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char processor[bufsize] = "Unknown";
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:92:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char subtype[bufsize] = "Unknown";
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:99:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (processor, "Intel");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:101:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "80386");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:103:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "80486");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:105:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "Pentium");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:107:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "Pentium Pro");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:109:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "Pentium II");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:114:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (processor, "MIPS");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:116:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "R3000");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:118:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "R4000");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:123:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (processor, "Alpha");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:127:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (processor, "PPC");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:129:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "601");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:131:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "603");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:133:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "604");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:135:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "603+");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:137:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "804+");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:139:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            ACE_OS::strcpy (subtype, "620");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:143:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (processor, "Itanium");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:149:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (processor, "x64");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:155:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (processor, "WOW64");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:161:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (processor, "ARM");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:169:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (processor, "Unknown");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:178:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (name->release, "Windows 95");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:180:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            ACE_OS::strcat (name->release, " OSR2");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:184:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (name->release, "Windows 98");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:186:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            ACE_OS::strcat (name->release, " SE");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:190:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (name->release, "Windows Me");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:200:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        ACE_OS::strcpy (name->machine, "Intel 80386");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:202:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        ACE_OS::strcpy (name->machine, "Intel 80486");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:204:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        ACE_OS::strcpy (name->machine, "Intel Pentium");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:226:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (name->sysname, "VxWorks");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:237:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name->sysname,"INTEGRITY");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:239:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name->release,"4.0");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:240:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name->version,"4.0.9");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.cpp:241:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name->machine,"a standard name");
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.h:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sysname[_SYS_NMLN];
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.h:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nodename[_SYS_NMLN];
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.h:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char release[_SYS_NMLN];
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.h:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char version[_SYS_NMLN];
data/ace-6.5.12+dfsg/ace/OS_NS_sys_utsname.h:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char machine[_SYS_NMLN];
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:86:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy (argv_p, argv, argc * sizeof (ACE_TCHAR *));
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:122:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy (argv_p, argv, argc * sizeof (ACE_TCHAR *));
data/ace-6.5.12+dfsg/ace/Obchunk.h:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char contents_[4];
data/ace-6.5.12+dfsg/ace/Object_Manager.cpp:304:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char newJump[ 100 ];
data/ace-6.5.12+dfsg/ace/Object_Manager.cpp:312:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  ACE_OS::memcpy (&newJump[ 1 ], &dwRelativeAddr, sizeof (pNewFunc));
data/ace-6.5.12+dfsg/ace/Obstack_T.cpp:78:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (this->curr_->block_,
data/ace-6.5.12+dfsg/ace/Obstack_T.cpp:165:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (this->curr_->cur_, s, tsize);
data/ace-6.5.12+dfsg/ace/PI_Malloc.h:78:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char padding_[(ACE_PI_MALLOC_PADDING_SIZE) ? ACE_PI_MALLOC_PADDING_SIZE : ACE_MALLOC_ALIGN];
data/ace-6.5.12+dfsg/ace/PI_Malloc.h:161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lock_name_[MAXNAMELEN];
data/ace-6.5.12+dfsg/ace/PI_Malloc.h:183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char align_[(ACE_PI_CONTROL_BLOCK_ALIGN_BYTES) ? ACE_PI_CONTROL_BLOCK_ALIGN_BYTES : ACE_MALLOC_ALIGN];
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:139:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_POSIX_Asynch_Operation::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:799:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_POSIX_Asynch_Accept::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:814:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == ACE_POSIX_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:1211:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_POSIX_Asynch_Connect::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:1222:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_POSIX_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:1838:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->rf_.open (this->proxy (),
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:1847:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ws_.open (this->proxy (),
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.h:167:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.h:673:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.h:817:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/POSIX_Proactor.cpp:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Buf [32];
data/ace-6.5.12+dfsg/ace/POSIX_Proactor.cpp:631:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->pipe_.open () == -1)
data/ace-6.5.12+dfsg/ace/POSIX_Proactor.cpp:647:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->read_stream_.open (this->proxy (),
data/ace-6.5.12+dfsg/ace/Parse_Node.cpp:493:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == this->dll_.open (this->pathname ()))
data/ace-6.5.12+dfsg/ace/Ping_Socket.cpp:111:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local, protocol, reuse_addr) == -1)
data/ace-6.5.12+dfsg/ace/Ping_Socket.cpp:135:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Ping_Socket::open (ACE_Addr const & local,
data/ace-6.5.12+dfsg/ace/Ping_Socket.cpp:140:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return inherited::open (local, protocol, reuse_addr);
data/ace-6.5.12+dfsg/ace/Ping_Socket.h:53:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Addr const & local = ACE_Addr::sap_any,
data/ace-6.5.12+dfsg/ace/Ping_Socket.h:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char icmp_send_buff_[PING_BUFFER_SIZE];
data/ace-6.5.12+dfsg/ace/Ping_Socket.h:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char icmp_recv_buff_[PING_BUFFER_SIZE];
data/ace-6.5.12+dfsg/ace/Pipe.cpp:44:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Pipe::open (int buffer_size)
data/ace-6.5.12+dfsg/ace/Pipe.cpp:96:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (local_any) == -1
data/ace-6.5.12+dfsg/ace/Pipe.cpp:251:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Pipe::open (ACE_HANDLE handles[2])
data/ace-6.5.12+dfsg/ace/Pipe.cpp:255:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open () == -1)
data/ace-6.5.12+dfsg/ace/Pipe.cpp:279:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (handles) == -1)
data/ace-6.5.12+dfsg/ace/Pipe.h:58:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_HANDLE handles[2]);
data/ace-6.5.12+dfsg/ace/Pipe.h:61:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int buffer_size = ACE_DEFAULT_MAX_SOCKET_BUFSIZ);
data/ace-6.5.12+dfsg/ace/Process.cpp:250:21:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
  this->child_id_ = vfork();
data/ace-6.5.12+dfsg/ace/Process.cpp:317:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char **procargv = new char *[vcount + 1];  // Need 0 at the end
data/ace-6.5.12+dfsg/ace/Process.cpp:328:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      procenv = new char *[vcount + 1];  // Need 0 at the end
data/ace-6.5.12+dfsg/ace/Process.cpp:511:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char **procargv = new char *[vcount + 1];  // Need 0 at the end
data/ace-6.5.12+dfsg/ace/Process.cpp:519:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char **procenv = new char *[vcount + 1];  // Need 0 at the end
data/ace-6.5.12+dfsg/ace/Process.cpp:1139:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (environment_buf_ + environment_buf_index_,
data/ace-6.5.12+dfsg/ace/Process_Manager.cpp:209:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Process_Manager::open (size_t size, ACE_Reactor *r)
data/ace-6.5.12+dfsg/ace/Process_Manager.cpp:244:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (size, r) == -1)
data/ace-6.5.12+dfsg/ace/Process_Manager.h:129:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t size = ACE_Process_Manager::DEFAULT_SIZE,
data/ace-6.5.12+dfsg/ace/Profile_Timer.cpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[20];
data/ace-6.5.12+dfsg/ace/Profile_Timer.cpp:51:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->proc_handle_ = ACE_OS::open (buf, O_RDONLY, 0);
data/ace-6.5.12+dfsg/ace/QoS/QoS_Session.h:70:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_INET_Addr dest_addr,
data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Impl.cpp:236:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_RAPI_Session::open (ACE_INET_Addr dest_addr,
data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Impl.cpp:239:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf [BUFSIZ];
data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Impl.cpp:357:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Impl.cpp:469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Impl.cpp:637:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_GQoS_Session::open (ACE_INET_Addr dest_addr,
data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Impl.h:50:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_INET_Addr dest_addr,
data/ace-6.5.12+dfsg/ace/QoS/QoS_Session_Impl.h:176:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_INET_Addr dest_addr,
data/ace-6.5.12+dfsg/ace/QoS/SOCK_Dgram_Mcast_QoS.cpp:33:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_Dgram_Mcast_QoS::open (const ACE_INET_Addr &addr,
data/ace-6.5.12+dfsg/ace/QoS/SOCK_Dgram_Mcast_QoS.cpp:54:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_DGRAM,
data/ace-6.5.12+dfsg/ace/QoS/SOCK_Dgram_Mcast_QoS.cpp:185:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (mcast_addr,
data/ace-6.5.12+dfsg/ace/QoS/SOCK_Dgram_Mcast_QoS.h:104:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_INET_Addr &addr,
data/ace-6.5.12+dfsg/ace/QtReactor/QtReactor.cpp:65:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        this->notify_handler_->open (this, 0);
data/ace-6.5.12+dfsg/ace/RB_Tree.cpp:57:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (alloc) == -1)
data/ace-6.5.12+dfsg/ace/RB_Tree.h:209:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Allocator *alloc = 0);
data/ace-6.5.12+dfsg/ace/Reactor.h:244:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t max_number_of_handles,
data/ace-6.5.12+dfsg/ace/Reactor_Impl.h:48:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Reactor_Impl *,
data/ace-6.5.12+dfsg/ace/Reactor_Impl.h:132:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t size,
data/ace-6.5.12+dfsg/ace/Read_Buffer.cpp:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/ace/Registry_Name_Space.cpp:16:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (name_options) != 0)
data/ace-6.5.12+dfsg/ace/Registry_Name_Space.cpp:28:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Registry_Name_Space::open (ACE_Name_Options *name_options)
data/ace-6.5.12+dfsg/ace/Registry_Name_Space.h:58:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Name_Options *name_options);
data/ace-6.5.12+dfsg/ace/Remote_Name_Space.cpp:10:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Remote_Name_Space::open (const ACE_TCHAR *servername, u_short port)
data/ace-6.5.12+dfsg/ace/Remote_Name_Space.cpp:20:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ns_proxy_.open (servaddr) == -1)
data/ace-6.5.12+dfsg/ace/Remote_Name_Space.cpp:35:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (hostname, port) == -1)
data/ace-6.5.12+dfsg/ace/Remote_Name_Space.h:63:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *servername, u_short port);
data/ace-6.5.12+dfsg/ace/Remote_Tokens.cpp:105:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Remote_Token_Proxy::open (const ACE_TCHAR *name,
data/ace-6.5.12+dfsg/ace/Remote_Tokens.cpp:111:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Token_Proxy::open (name, 0, debug);
data/ace-6.5.12+dfsg/ace/Remote_Tokens.h:60:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *name,
data/ace-6.5.12+dfsg/ace/Rtems_init.c:84:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ethernet_address[6] = { 0x00, 0x80, 0x7F, 0x22, 0x61, 0x77 };
data/ace-6.5.12+dfsg/ace/SOCK.cpp:86:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK::open (int type,
data/ace-6.5.12+dfsg/ace/SOCK.cpp:122:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (type,
data/ace-6.5.12+dfsg/ace/SOCK.cpp:132:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK::open (int type,
data/ace-6.5.12+dfsg/ace/SOCK.cpp:174:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (type,
data/ace-6.5.12+dfsg/ace/SOCK.h:82:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int type,
data/ace-6.5.12+dfsg/ace/SOCK.h:88:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int type,
data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.cpp:316:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_Acceptor::open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.cpp:331:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_STREAM,
data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.cpp:357:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.cpp:374:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_Acceptor::open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.cpp:394:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_STREAM,
data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.cpp:416:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.h:81:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_Acceptor.h:90:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_CODgram.cpp:33:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (remote,
data/ace-6.5.12+dfsg/ace/SOCK_CODgram.cpp:63:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_CODgram::open (const ACE_Addr &remote, const ACE_Addr &local,
data/ace-6.5.12+dfsg/ace/SOCK_CODgram.cpp:92:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_DGRAM,
data/ace-6.5.12+dfsg/ace/SOCK_CODgram.h:118:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &remote_sap,
data/ace-6.5.12+dfsg/ace/SOCK_Connector.cpp:41:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      && new_stream.open (SOCK_STREAM,
data/ace-6.5.12+dfsg/ace/SOCK_Connector.cpp:63:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      && new_stream.open (SOCK_STREAM,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:166:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_Dgram::open (const ACE_Addr &local,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:175:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_DGRAM,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:194:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_Dgram::open (const ACE_Addr &local,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:213:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_DGRAM,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:235:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:255:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:451:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (ptr, iov[i].iov_base, iov[i].iov_len);
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:519:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (iov[i].iov_base, ptr,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:787:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        (if_ix = ACE_OS::atoi (net_if)) > 0;
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.cpp:841:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (&lmreq.ipv6mr_multiaddr,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.h:67:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram.h:78:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Bcast.cpp:94:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_Dgram_Bcast::open (const ACE_Addr &local,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Bcast.cpp:102:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ACE_SOCK_Dgram::open (local, protocol_family,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Bcast.cpp:130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Bcast.cpp:157:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy ((char *) &host_addr.sin_addr.s_addr,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Bcast.cpp:197:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (&if_addr,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Bcast.h:75:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:160:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_Dgram_Mcast::open (const ACE_INET_Addr &mcast_addr,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:174:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_DGRAM,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:383:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char intf_addr_str[INET_ADDRSTRLEN];
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:428:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char addr_buf[INET6_ADDRSTRLEN];
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:568:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (mcast_addr,
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:732:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char addr_buf[INET6_ADDRSTRLEN];
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:782:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char addr_buf[INET6_ADDRSTRLEN];
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.h:238:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_INET_Addr &mcast_addr,
data/ace-6.5.12+dfsg/ace/SOCK_Netlink.cpp:23:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int ACE_SOCK_Netlink::open (ACE_Netlink_Addr &local,
data/ace-6.5.12+dfsg/ace/SOCK_Netlink.cpp:29:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ACE_SOCK::open (SOCK_RAW,
data/ace-6.5.12+dfsg/ace/SOCK_Netlink.cpp:52:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local,
data/ace-6.5.12+dfsg/ace/SOCK_Netlink.h:53:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Netlink_Addr &local,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:380:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  ACE_OS::memcpy(&(local_sockaddr[i]),
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:430:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_SEQPACK_Acceptor::open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:445:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_STREAM,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:447:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_SEQPACKET,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:472:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:488:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_SEQPACK_Acceptor::open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:508:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_STREAM,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:510:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_SEQPACKET,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:525:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SOCK_SEQPACK_Acceptor::open (const ACE_Multihomed_INET_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:545:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_STREAM,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:547:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_SOCK::open (SOCK_SEQPACKET,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:568:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.cpp:587:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.h:87:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.h:95:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Multihomed_INET_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Acceptor.h:104:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Connector.cpp:46:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         new_association.open (SOCK_STREAM,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Connector.cpp:48:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         new_association.open (SOCK_SEQPACKET,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Connector.cpp:72:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      new_association.open (SOCK_STREAM,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Connector.cpp:74:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      new_association.open (SOCK_SEQPACKET,
data/ace-6.5.12+dfsg/ace/SOCK_SEQPACK_Connector.cpp:189:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy(&(local_sockaddr[i]),
data/ace-6.5.12+dfsg/ace/SPIPE_Acceptor.cpp:54:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SPIPE_Acceptor::open (const ACE_SPIPE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SPIPE_Acceptor.cpp:240:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local_sap, reuse_addr, perms, sa, pipe_mode) == -1)
data/ace-6.5.12+dfsg/ace/SPIPE_Acceptor.h:92:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_SPIPE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:28:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (&this->SPIPE_addr_, addr, len);
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:77:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) ACE_OS::memcpy ((void *) &this->SPIPE_addr_, (void *)
data/ace-6.5.12+dfsg/ace/SPIPE_Connector.cpp:83:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      handle = ACE_OS::open (remote_sap.get_path_name(), flags, perms, sa);
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.cpp:231:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SSL_Asynch_Stream::open (ACE_Handler & handler,
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.cpp:265:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->bio_istream_.open (*this,   // real callbacks to this
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.cpp:272:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->bio_ostream_.open (*this,  // real callbacks to this
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.cpp:793:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.cpp:831:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf, rd_ptr, cur_len);
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.h:200:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Handler &handler,
data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.cpp:362:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[MAXHOSTNAMELEN+1];
data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.cpp:674:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char error_string[256];
data/ace-6.5.12+dfsg/ace/SSL/SSL_SOCK_Acceptor.h:107:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/SString.cpp:187:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy ((void *) this->rep_,
data/ace-6.5.12+dfsg/ace/SString.cpp:288:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (this->rep_, s, len);
data/ace-6.5.12+dfsg/ace/SV_Message_Queue.cpp:41:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (external_id, create, perms) == -1)
data/ace-6.5.12+dfsg/ace/SV_Message_Queue.h:51:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (key_t external_id,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Complex.cpp:65:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SV_Semaphore_Complex::open (key_t k,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Complex.cpp:170:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SV_Semaphore_Complex::open (const char *name,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Complex.cpp:177:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->open (ACE_SV_Semaphore_Simple::name_2_key (name),
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Complex.cpp:235:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (k, flags, initial_value, nsems, perms) == -1)
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Complex.cpp:256:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (key, flags, initial_value, nsems, perms) == -1)
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Complex.h:76:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const char *name,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Complex.h:84:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (key_t key,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.cpp:80:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SV_Semaphore_Simple::open (key_t k,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.cpp:119:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (k, flags, initial_value, n, perms) == -1)
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.cpp:171:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_SV_Semaphore_Simple::open (const char *name,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.cpp:188:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->open (key, flags, initial_value, n, perms);
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.cpp:198:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (name,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.cpp:216:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (ACE_Wide_To_Ascii (name).char_rep (),
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.h:79:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const char *name,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.h:86:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const wchar_t *name,
data/ace-6.5.12+dfsg/ace/SV_Semaphore_Simple.h:95:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (key_t key,
data/ace-6.5.12+dfsg/ace/SV_Shared_Memory.cpp:37:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (external_id, sz, create, perms) == -1)
data/ace-6.5.12+dfsg/ace/SV_Shared_Memory.h:53:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int  open (key_t external_id,
data/ace-6.5.12+dfsg/ace/Sched_Params.cpp:48:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          ACE_OS::strcpy (pcinfo.pc_clname, "TS");
data/ace-6.5.12+dfsg/ace/Select_Reactor_Base.cpp:83:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Select_Reactor_Handler_Repository::open (size_type size)
data/ace-6.5.12+dfsg/ace/Select_Reactor_Base.cpp:88:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->event_handlers_.open (size) == -1)
data/ace-6.5.12+dfsg/ace/Select_Reactor_Base.cpp:594:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Select_Reactor_Notify::open (ACE_Reactor_Impl *r,
data/ace-6.5.12+dfsg/ace/Select_Reactor_Base.cpp:610:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (this->notification_pipe_.open () == -1)
data/ace-6.5.12+dfsg/ace/Select_Reactor_Base.cpp:625:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (notification_queue_.open() == -1)
data/ace-6.5.12+dfsg/ace/Select_Reactor_Base.h:145:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Reactor_Impl *,
data/ace-6.5.12+dfsg/ace/Select_Reactor_Base.h:335:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_type size);
data/ace-6.5.12+dfsg/ace/Select_Reactor_T.cpp:367:49:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Select_Reactor_T<ACE_SELECT_REACTOR_TOKEN>::open
data/ace-6.5.12+dfsg/ace/Select_Reactor_T.cpp:420:42:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (result != -1 && this->handler_rep_.open (size) == -1)
data/ace-6.5.12+dfsg/ace/Select_Reactor_T.cpp:422:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (this->notify_handler_->open (this,
data/ace-6.5.12+dfsg/ace/Select_Reactor_T.cpp:492:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (ACE_Select_Reactor_T<ACE_SELECT_REACTOR_TOKEN>::DEFAULT_SIZE,
data/ace-6.5.12+dfsg/ace/Select_Reactor_T.cpp:513:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (this->open (ACE::max_handles (),
data/ace-6.5.12+dfsg/ace/Select_Reactor_T.cpp:547:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (size,
data/ace-6.5.12+dfsg/ace/Select_Reactor_T.h:112:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t max_number_of_handles = DEFAULT_SIZE,
data/ace-6.5.12+dfsg/ace/Service_Config.cpp:201:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/ace/Service_Config.cpp:258:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE* pidf = ACE_OS::fopen (this->pid_file_name_,
data/ace-6.5.12+dfsg/ace/Service_Config.cpp:290:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (log_msg->open (program_name,
data/ace-6.5.12+dfsg/ace/Service_Config.cpp:411:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (program_name,
data/ace-6.5.12+dfsg/ace/Service_Config.h:399:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static int open (const ACE_TCHAR program_name[],
data/ace-6.5.12+dfsg/ace/Service_Config.h:463:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static int open (int argc,
data/ace-6.5.12+dfsg/ace/Service_Gestalt.cpp:824:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (xmldll.open (ACE_TEXT ("ACEXML_XML_Svc_Conf_Parser")) == -1)
data/ace-6.5.12+dfsg/ace/Service_Gestalt.cpp:881:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = ACE_OS::fopen (file,
data/ace-6.5.12+dfsg/ace/Service_Gestalt.cpp:1050:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (log_msg->open (program_name,
data/ace-6.5.12+dfsg/ace/Service_Gestalt.cpp:1087:34:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              FILE *fp = ACE_OS::fopen (ACE_DEFAULT_SVC_CONF, ACE_TEXT ("r"));
data/ace-6.5.12+dfsg/ace/Service_Gestalt.h:107:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR program_name[],
data/ace-6.5.12+dfsg/ace/Service_Gestalt.h:179:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int argc,
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:56:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Service_Manager::open (const ACE_INET_Addr &sia)
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:61:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->acceptor_.open (sia, 1) == -1)
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:116:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         local_addr.set ((u_short) ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:119:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         this->signum_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:126:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      this->open (local_addr) == -1)
data/ace-6.5.12+dfsg/ace/Service_Manager.h:86:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_INET_Addr &sia);
data/ace-6.5.12+dfsg/ace/Service_Repository.cpp:93:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Service_Repository::open (size_t size)
data/ace-6.5.12+dfsg/ace/Service_Repository.h:63:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t size = DEFAULT_SIZE);
data/ace-6.5.12+dfsg/ace/Shared_Memory_MM.h:59:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/ace/Shared_Memory_MM.h:67:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *file_name,
data/ace-6.5.12+dfsg/ace/Shared_Memory_SV.h:52:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (key_t id,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:215:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy ((char *) &ip_addr.sin_addr.s_addr,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:226:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy ((void *) &ip_addr.sin_addr,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:249:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&if_addr,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:300:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy (&ip_addr,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:304:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy ((void *) &host_addr,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:592:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      ACE_OS::sprintf (dev_name,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:602:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      ACE_OS::sprintf (dev_name,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:612:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      ACE_OS::sprintf (dev_name,
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:1255:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addr_p[8][5];
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:1256:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s_ipaddr[64];
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:1265:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = ACE_OS::fopen (ACE_TEXT ("/proc/net/if_inet6"), ACE_TEXT ("r"))) != 0)
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:1424:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = ACE_OS::fopen (ACE_TEXT ("/proc/net/if_inet6"), ACE_TEXT ("r"))) != 0)
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:1452:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  handle = ACE_OS::open ("/dev/udp", O_RDONLY);
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:166:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  len += ACE_OS::sprintf (&buf[len], "%p: %p (", caller, func);
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:170:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        len += ACE_OS::sprintf (&buf[len], ", ");
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:174:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  len += ACE_OS::sprintf(&buf[len], ")\n");
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:469:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (&this->buf_[0], "<stack traces unsupported on Win64 unless "
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:616:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      ACE_OS::strcpy (static_cast<char *> (usrarg),
data/ace-6.5.12+dfsg/ace/Stack_Trace.h:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf_[SYMBUFSIZ];
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:69:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Singleton_Strategy<SVC_HANDLER>::open (SVC_HANDLER *sh,
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:95:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_DLL_Strategy<SVC_HANDLER>::open (const ACE_TCHAR dll_name[],
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:102:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->inherited::open (thr_mgr);
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:195:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (result == 0 && svc_handler->open (arg) == -1)
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:207:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Reactive_Strategy<SVC_HANDLER>::open (ACE_Reactor *reactor,
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:246:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (svc_handler->open (arg) != -1)
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:264:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Thread_Strategy<SVC_HANDLER>::open (ACE_Thread_Manager *thr_mgr,
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:301:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Accept_Strategy<SVC_HANDLER, ACE_PEER_ACCEPTOR_2>::open
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:306:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->peer_acceptor_.open (local_addr, reuse_addr) == -1)
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:330:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local_addr, reuse_addr) == -1)
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:416:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Process_Strategy<SVC_HANDLER>::open (size_t n_processes,
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:499:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (cre_s,
data/ace-6.5.12+dfsg/ace/Strategies_T.cpp:542:72:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Cached_Connect_Strategy<SVC_HANDLER, ACE_PEER_CONNECTOR_2, MUTEX>::open
data/ace-6.5.12+dfsg/ace/Strategies_T.h:96:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Thread_Manager * = 0,
data/ace-6.5.12+dfsg/ace/Strategies_T.h:144:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (SVC_HANDLER *,
data/ace-6.5.12+dfsg/ace/Strategies_T.h:196:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR dll_name[],
data/ace-6.5.12+dfsg/ace/Strategies_T.h:309:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Reactor *reactor,
data/ace-6.5.12+dfsg/ace/Strategies_T.h:370:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Thread_Manager *tm,
data/ace-6.5.12+dfsg/ace/Strategies_T.h:437:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t n_processes = 1,
data/ace-6.5.12+dfsg/ace/Strategies_T.h:510:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_PEER_ACCEPTOR_ADDR &local_addr,
data/ace-6.5.12+dfsg/ace/Strategies_T.h:853:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Creation_Strategy<SVC_HANDLER> *cre_s,
data/ace-6.5.12+dfsg/ace/Stream.cpp:135:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (mod->reader ()->open (mod->arg ()) == -1)
data/ace-6.5.12+dfsg/ace/Stream.cpp:138:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (mod->writer ()->open (mod->arg ()) == -1)
data/ace-6.5.12+dfsg/ace/Stream.cpp:179:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (mod->reader ()->open (mod->arg ()) == -1)
data/ace-6.5.12+dfsg/ace/Stream.cpp:182:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (mod->writer ()->open (mod->arg ()) == -1)
data/ace-6.5.12+dfsg/ace/Stream.cpp:326:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (nt_reader->open (new_top->arg ()) == -1)
data/ace-6.5.12+dfsg/ace/Stream.cpp:329:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (nt_writer->open (new_top->arg ()) == -1)
data/ace-6.5.12+dfsg/ace/Stream.cpp:335:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Stream<ACE_SYNCH_USE, TIME_POLICY>::open (void *a,
data/ace-6.5.12+dfsg/ace/Stream.cpp:612:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (a, head, tail) == -1)
data/ace-6.5.12+dfsg/ace/Stream.h:79:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *arg,
data/ace-6.5.12+dfsg/ace/Stream_Modules.cpp:39:46:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Stream_Head<ACE_SYNCH_USE, TIME_POLICY>::open (void *)
data/ace-6.5.12+dfsg/ace/Stream_Modules.cpp:177:46:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Stream_Tail<ACE_SYNCH_USE, TIME_POLICY>::open (void *)
data/ace-6.5.12+dfsg/ace/Stream_Modules.cpp:321:44:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Thru_Task<ACE_SYNCH_USE, TIME_POLICY>::open (void *)
data/ace-6.5.12+dfsg/ace/Stream_Modules.h:59:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *a = 0);
data/ace-6.5.12+dfsg/ace/Stream_Modules.h:97:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *a = 0);
data/ace-6.5.12+dfsg/ace/Stream_Modules.h:136:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *a = 0);
data/ace-6.5.12+dfsg/ace/String_Base.cpp:145:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (this->rep_, s, len * sizeof (ACE_CHAR_T));
data/ace-6.5.12+dfsg/ace/String_Base.cpp:176:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (this->rep_, s, len * sizeof (ACE_CHAR_T));
data/ace-6.5.12+dfsg/ace/String_Base.cpp:220:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (this->rep_ + this->len_, s, slen * sizeof (ACE_CHAR_T));
data/ace-6.5.12+dfsg/ace/String_Base.cpp:233:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (t, this->rep_, this->len_ * sizeof (ACE_CHAR_T));
data/ace-6.5.12+dfsg/ace/String_Base.cpp:235:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (t + this->len_, s, slen * sizeof (ACE_CHAR_T));
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:32:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   __extension__ char X[SIZE]
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input_[ACE_YY_CONVERSION_SPACE];
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:267:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (buf,
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:595:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char target[ACE_YY_CONVERSION_SPACE] = "";
data/ace-6.5.12+dfsg/ace/Svc_Conf_y.cpp:1013:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const *ace_yyarg[YYERROR_VERBOSE_ARGS_MAXIMUM];
data/ace-6.5.12+dfsg/ace/Svc_Conf_y.cpp:1030:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ace_yyformat[sizeof ace_yyunexpected
data/ace-6.5.12+dfsg/ace/Svc_Conf_y.cpp:1198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ace_yymsgbuf[128];
data/ace-6.5.12+dfsg/ace/Svc_Handler.cpp:158:45:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Svc_Handler<PEER_STREAM, SYNCH_TRAITS>::open (void *)
data/ace-6.5.12+dfsg/ace/Svc_Handler.h:92:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *acceptor_or_connector = 0);
data/ace-6.5.12+dfsg/ace/TLI.cpp:57:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_TLI::open (const char device[], int oflag, struct t_info *info)
data/ace-6.5.12+dfsg/ace/TLI.cpp:84:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (device, oflag, info) == ACE_INVALID_HANDLE)
data/ace-6.5.12+dfsg/ace/TLI.cpp:150:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (&opthdr[1], optval, optlen);
data/ace-6.5.12+dfsg/ace/TLI.cpp:173:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (OPTVAL (opthdr), optval, optlen);
data/ace-6.5.12+dfsg/ace/TLI.cpp:227:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (optval, &opthdr[1], optlen);
data/ace-6.5.12+dfsg/ace/TLI.cpp:256:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (optval, OPTVAL (opthdr), optlen);
data/ace-6.5.12+dfsg/ace/TLI.h:57:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE open (const char device[],
data/ace-6.5.12+dfsg/ace/TLI_Acceptor.cpp:28:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE open (ACE_HANDLE fd, int size);
data/ace-6.5.12+dfsg/ace/TLI_Acceptor.cpp:194:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_TLI_Request_Queue::open (ACE_HANDLE f, int sz)
data/ace-6.5.12+dfsg/ace/TLI_Acceptor.cpp:307:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_TLI_Acceptor::open (const ACE_Addr &remote_sap,
data/ace-6.5.12+dfsg/ace/TLI_Acceptor.cpp:323:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ACE_TLI::open (dev,
data/ace-6.5.12+dfsg/ace/TLI_Acceptor.cpp:378:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          res = this->queue_->open (this->get_handle (),
data/ace-6.5.12+dfsg/ace/TLI_Acceptor.cpp:395:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (remote_sap,
data/ace-6.5.12+dfsg/ace/TLI_Acceptor.cpp:504:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy ((void *) &req->callp_->udata,
data/ace-6.5.12+dfsg/ace/TLI_Acceptor.cpp:508:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy ((void *) &req->callp_->opt,
data/ace-6.5.12+dfsg/ace/TLI_Acceptor.h:60:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE open (const ACE_Addr &remote_sap,
data/ace-6.5.12+dfsg/ace/TLI_Connector.cpp:57:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      && new_stream.open (device, flags, info) == ACE_INVALID_HANDLE)
data/ace-6.5.12+dfsg/ace/TLI_Connector.cpp:92:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy(localaddr->addr.buf,
data/ace-6.5.12+dfsg/ace/TLI_Connector.cpp:129:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (callptr->addr.buf,
data/ace-6.5.12+dfsg/ace/TLI_Connector.cpp:135:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy ((void *) &callptr->udata, (void *) udata, sizeof *udata);
data/ace-6.5.12+dfsg/ace/TLI_Connector.cpp:137:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy ((void *) &callptr->opt, (void *) opt, sizeof *opt);
data/ace-6.5.12+dfsg/ace/Task.cpp:40:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Task_Base::open (void *)
data/ace-6.5.12+dfsg/ace/Task.h:78:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/ace/Thread_Manager.h:463:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t size = 0);
data/ace-6.5.12+dfsg/ace/Timeprobe_T.cpp:159:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (temp,
data/ace-6.5.12+dfsg/ace/Timer_Heap_T.cpp:581:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (new_heap,
data/ace-6.5.12+dfsg/ace/Timer_Heap_T.cpp:605:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (new_timer_ids,
data/ace-6.5.12+dfsg/ace/TkReactor/TkReactor.cpp:31:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->notify_handler_->open (this, 0);
data/ace-6.5.12+dfsg/ace/Typed_SV_Message_Queue.cpp:41:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (external_id, create, perms) == -1)
data/ace-6.5.12+dfsg/ace/Typed_SV_Message_Queue.h:45:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (key_t external_id,
data/ace-6.5.12+dfsg/ace/UNIX_Addr.cpp:26:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (&this->unix_addr_, addr, len);
data/ace-6.5.12+dfsg/ace/UPIPE_Acceptor.cpp:41:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_UPIPE_Acceptor::open (const ACE_UPIPE_Addr &local_addr,
data/ace-6.5.12+dfsg/ace/UPIPE_Acceptor.cpp:45:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->ACE_SPIPE_Acceptor::open (local_addr, reuse_addr);
data/ace-6.5.12+dfsg/ace/UPIPE_Acceptor.cpp:63:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (local_addr, reuse_addr) == -1)
data/ace-6.5.12+dfsg/ace/UPIPE_Acceptor.h:47:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_UPIPE_Addr &local_sap,
data/ace-6.5.12+dfsg/ace/UPIPE_Stream.cpp:135:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            ACE_OS::memcpy ((void *) &buffer[bytes_read],
data/ace-6.5.12+dfsg/ace/UPIPE_Stream.cpp:146:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            ACE_OS::memcpy (&buffer[bytes_read],
data/ace-6.5.12+dfsg/ace/UTF8_Encoding_Converter.cpp:42:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (target, source, source_size);
data/ace-6.5.12+dfsg/ace/UUID.cpp:47:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy (&this->uuid_, &rhs.uuid_, BINARY_SIZE);
data/ace-6.5.12+dfsg/ace/UUID.cpp:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char thr_pid_buf [BUFSIZ];
data/ace-6.5.12+dfsg/ace/UUID.cpp:350:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy (node_id,
data/ace-6.5.12+dfsg/ace/UUID.cpp:370:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (uuid_state_.node.node_ID (),
data/ace-6.5.12+dfsg/ace/UUID.cpp:408:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf [BUFSIZ];
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.cpp:25:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WFMO_Reactor_Handler_Repository::open (size_t size)
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.cpp:1084:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (ACE_WFMO_Reactor::DEFAULT_SIZE, 0, sh, tq, 0, notify) == -1)
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.cpp:1119:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (size, 0, sh, tq, 0, notify) == -1)
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.cpp:1135:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WFMO_Reactor::open (size_t size,
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.cpp:1206:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->handler_rep_.open (size + 2) == -1)
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.cpp:1234:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->notify_handler_->open (this, this->timer_queue_) == -1)
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.cpp:2416:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WFMO_Reactor_Notify::open (ACE_Reactor_Impl *wfmo_reactor,
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.h:303:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (size_t size);
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.h:497:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (ACE_Reactor_Impl *wfmo_reactor,
data/ace-6.5.12+dfsg/ace/WFMO_Reactor.h:690:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (size_t size = ACE_WFMO_Reactor::DEFAULT_SIZE,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:139:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Operation::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:623:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Read_Stream::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:628:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_WIN32_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:1051:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Write_Stream::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:1056:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_WIN32_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:1453:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Read_File::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:1458:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_WIN32_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:1900:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Write_File::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:1905:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_WIN32_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:2217:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Accept::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:2222:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_WIN32_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:2401:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Connect::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:2417:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_WIN32_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:3099:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Transmit_File::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:3104:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_WIN32_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:3452:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Read_Dgram::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:3457:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_WIN32_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:3777:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_WIN32_Asynch_Write_Dgram::open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:3782:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_WIN32_Asynch_Operation::open (handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:160:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:353:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:531:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:710:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:916:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:1114:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:1242:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:1526:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:1715:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:1899:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_Handler::Proxy_Ptr &handler_proxy,
data/ace-6.5.12+dfsg/ace/XML_Utils/XercesString.h:13:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
using std::memcpy;
data/ace-6.5.12+dfsg/ace/XtReactor/XtReactor.cpp:33:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->notify_handler_->open (this, 0);
data/ace-6.5.12+dfsg/ace/config-mqx.h:257:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#ifdef fopen
data/ace-6.5.12+dfsg/ace/config-mqx.h:258:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#undef fopen
data/ace-6.5.12+dfsg/ace/config-mqx.h:259:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
inline FILE* fopen(const char* f, const char* m) {
data/ace-6.5.12+dfsg/ace/config-openvms.h:33:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#undef memcpy
data/ace-6.5.12+dfsg/ace/os_include/net/os_if.h:55:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    ifr_name[IFNAMSIZ];             /* if name, e.g. "en0" */
data/ace-6.5.12+dfsg/ace/os_include/netinet/os_in.h:76:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             sin_zero[8];  // zero this if you want to
data/ace-6.5.12+dfsg/ace/os_include/netinet/os_in.h:84:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char    sun_path[104];          /* path name (gag) */
data/ace-6.5.12+dfsg/ace/os_include/os_netdb.h:117:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   typedef char ACE_HOSTENT_DATA[sizeof(struct hostent_data)];
data/ace-6.5.12+dfsg/ace/os_include/os_netdb.h:118:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   typedef char ACE_SERVENT_DATA[sizeof(struct servent_data)];
data/ace-6.5.12+dfsg/ace/os_include/os_netdb.h:119:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   typedef char ACE_PROTOENT_DATA[sizeof(struct protoent_data)];
data/ace-6.5.12+dfsg/ace/os_include/os_netdb.h:130:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   typedef char ACE_HOSTENT_DATA[ACE_HOSTENT_DATA_SIZE];
data/ace-6.5.12+dfsg/ace/os_include/os_netdb.h:131:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   typedef char ACE_SERVENT_DATA[ACE_SERVENT_DATA_SIZE];
data/ace-6.5.12+dfsg/ace/os_include/os_netdb.h:132:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   typedef char ACE_PROTOENT_DATA[ACE_PROTOENT_DATA_SIZE];
data/ace-6.5.12+dfsg/ace/os_include/os_stdarg.h:33:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define va_copy(d, s) memcpy((void *)&(d),(void *)&(s),sizeof(va_list))
data/ace-6.5.12+dfsg/ace/os_include/os_stdlib.h:56:7:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  int mkstemp (char *);
data/ace-6.5.12+dfsg/ace/os_include/sys/os_socket.h:65:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char    sa_data[14];            /* actually longer; address value */
data/ace-6.5.12+dfsg/ace/os_include/sys/os_un.h:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  sun_path[108]; // path name.
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Concrete_Connection_Handlers.cpp:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Concrete_Connection_Handlers.cpp:581:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Thr_Consumer_Handler::open (void *)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Concrete_Connection_Handlers.cpp:713:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Thr_Supplier_Handler::open (void *)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Concrete_Connection_Handlers.h:100:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Concrete_Connection_Handlers.h:138:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Config_Files.cpp:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Config_Files.cpp:150:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    connection_config_file.open (argc > 1 ? argv[1] : "connection_config");
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Config_Files.cpp:181:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    consumer_config_file.open (argc > 2 ? argv[2] : "consumer_config");
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Config_Files.h:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host_[BUFSIZ];
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Connection_Handler.cpp:177:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Connection_Handler::open (void *)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Connection_Handler.h:50:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event.h:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[MAX_PAYLOAD_SIZE];
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event_Channel.cpp:376:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (this->consumer_acceptor_.open
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event_Channel.cpp:393:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (this->supplier_acceptor_.open
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event_Channel.cpp:560:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Event_Channel::open (void *)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Event_Channel.h:40:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/File_Parser.cpp:21:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
File_Parser<ENTRY>::open (const ACE_TCHAR filename[])
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/File_Parser.cpp:23:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->infile_ = ACE_OS::fopen (filename, ACE_TEXT ("r"));
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/File_Parser.cpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/File_Parser.h:55:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR filename[]);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.cpp:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.cpp:136:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->event_channel_.open ();
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.cpp:184:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (connection_file.open (Options::instance ()->connection_config_file ()) == -1)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.cpp:270:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (consumer_file.open (Options::instance ()->consumer_config_file ()) == -1)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:196:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    this->consumer_acceptor_port_ = ACE_OS::atoi (flag + 2);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:204:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    this->supplier_acceptor_port_ = ACE_OS::atoi (flag + 2);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:231:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    this->consumer_connector_port_ = ACE_OS::atoi (flag + 2);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:239:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    this->supplier_connector_port_ = ACE_OS::atoi (flag + 2);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:254:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->socket_queue_size_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:274:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->performance_window_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/gatewayd.cpp:45:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (ACE_Service_Config::open (argc, argv) == -1)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:38:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    this->timeout_ = ACE_OS::atoi (timeout);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:127:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    this->consumer_acceptor_port_ = ACE_OS::atoi (flag + 2);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:135:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    this->supplier_acceptor_port_ = ACE_OS::atoi (flag + 2);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:154:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    this->consumer_connector_port_ = ACE_OS::atoi (flag + 2);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:162:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    this->supplier_connector_port_ = ACE_OS::atoi (flag + 2);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:168:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->connection_id_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:178:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->max_queue_size_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:183:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->timeout_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:24:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Peer_Handler::open (void *a)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:32:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->inherited::open (a) == -1)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:678:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->inherited::open (this->addr_) == -1)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:754:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Peer_Connector::open (ACE_Reactor *, int)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:870:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (this->connector_.open () == -1)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.h:82:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.h:211:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Reactor * = 0, int = 0);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/peerd.cpp:41:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (ACE_Service_Config::open (argc, argv) == -1)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob.cpp:17:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Blob::open (const ACE_TCHAR *filename, const ACE_TCHAR *hostname , u_short port)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob.h:50:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *filename,
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:35:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Blob_Handler::open (void *)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mesg [MAX_HEADER_SIZE];
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf [MAX_HEADER_SIZE + 1];
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:309:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAX_HEADER_SIZE];
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:329:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int return_code = ACE_OS::atoi (ACE_OS::strtok_r (0, " \t", &lasts));
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.h:56:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Options.cpp:42:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Options.cpp:48:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->length_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Options.cpp:51:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->offset_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/blobby.cpp:52:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (blob.open (options->filename_,
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/blobby.cpp:80:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ACE_HANDLE h = ACE_OS::open (options->filename_, O_RDONLY);
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/blobby.cpp:88:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (blob.open (options->filename_, options->hostname_, options->port_) == -1)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/ID_Generator.cpp:22:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  ACE_OS::sprintf (id, "%014d%06d", t, sn);
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_client.cpp:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:49:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
HTTP_Handler::open (void *)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:67:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:171:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.h:37:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.h:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char request_[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.h:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename_[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.cpp:30:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
HTTP_Handler::open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.cpp:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.cpp:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.cpp:286:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Asynch_HTTP_Handler_Factory::open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.cpp:293:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  handler->open (handle, mb);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.h:60:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.h:220:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char month[4];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char weekday[10];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char percentcode[3];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char inalphabet[256], decoder[256];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.h:52:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *const months_[12];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.h:102:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *Reason[MAX_STATUS_CODE + 1];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:295:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      this->content_length_ = (clv ? ACE_OS::atoi (clv) : 0);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:582:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              ACE_NEW (this->cgi_env_, char *[count+1]);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:613:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN + 1];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:635:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char pw_buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.h:184:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *const static_header_strings_[NUM_HEADER_STRINGS];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.h:187:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *const static_method_strings_[NUM_METHOD_STRINGS];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[4 * BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:339:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char date_ptr [40];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:362:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            ACE_OS::sprintf (HTTP_HEADER+HTTP_HEADER_LENGTH,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:54:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:57:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->threads_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:97:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->backlog_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:188:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->acceptor_.open (ACE_INET_Addr (this->port_), 1,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:235:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      handler->open (stream.get_handle (), *mb);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:254:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->acceptor_.open (ACE_INET_Addr (this->port_), 1,
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:280:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (t->open () != 0)
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:314:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Thread_Per_Request_Task::open (void *)
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:339:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  handler->open (this->handle_, *mb);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.cpp:380:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_INET_Addr (this->port_),
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Server.h:122:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:91:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (handle.address (), initial_data, bytes_to_memcpy);
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:208:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ar.open (*this, this->handle_) == -1
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:230:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              if (ar.open (*this, this->handle_) == -1
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:276:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (handle->address (),
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:294:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (ar.open (*this, this->handle_) == -1
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:330:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (tf.open (*this, this->handle_) == -1
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:394:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (aw.open (*this, this->handle_) == -1
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:501:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE handle = ACE_OS::open (filename, O_RDONLY);
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_Pipeline.cpp:8:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_Pipeline::open (void *)
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_Pipeline.h:28:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/apps/JAWS/server/main.cpp:42:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (daemon.open (argc, argv, ACE_DEFAULT_LOGGER_KEY, 0) != 0)
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/benchd.cpp:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/benchd.cpp:213:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  OUTPUT_FILE = ACE_OS::open (OUTPUT_FILE_NAME, O_CREAT | O_WRONLY, 0644);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/connection.h:18:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sockbuf[66000];
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char request[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp:137:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = ACE_OS::fopen(argv[1],"r");
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp:143:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ACE_OS::open(argv[2], O_WRONLY | O_CREAT | O_TRUNC, 0644);
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_status.h:93:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *table_[SC_TABLE_SIZE];
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_http_request.cpp:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_url.cpp:185:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      this->port_ = ACE_OS::atoi (colon1);
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_url.cpp:205:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      this->port_ = ACE_OS::atoi (colon2);
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_url.cpp:229:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      this->port_ = ACE_OS::atoi (colon2);
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10.cpp:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char percentcode[3];
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN + 1];
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:87:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char pw_buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:100:19:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          ACE_OS::strcat (buf, ".www-docs");
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Manager_T.cpp:90:3:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
::open (ACE_Allocator *alloc,
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Manager_T.h:53:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Allocator *alloc = 0,
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Object.cpp:214:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_Cache_Object_Factory::open (ACE_Allocator *alloc)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Cache_Object.h:122:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Allocator *alloc = 0);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Concurrency.cpp:268:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->reaper_->open () == -1)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Concurrency.cpp:329:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->reaper_->open () == -1)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Hash_Bucket_T.cpp:311:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_Hash_Bucket_Manager<EXT_ID,INT_ID,EQ_FUNC>::open (ACE_Allocator *alloc)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Hash_Bucket_T.h:152:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Allocator *alloc = 0);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.cpp:17:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_IO_Acceptor::open (const ACE_INET_Addr &, int)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.cpp:23:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_IO_Acceptor::open (const ACE_HANDLE &)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.cpp:53:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_IO_Synch_Acceptor::open (const ACE_INET_Addr &local_sap, int backlog)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.cpp:55:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->acceptor_.open (local_sap, 1, PF_INET, backlog);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.cpp:59:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_IO_Synch_Acceptor::open (const ACE_HANDLE &socket)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.cpp:114:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_IO_Asynch_Acceptor::open (const ACE_INET_Addr &address, int backlog)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.cpp:120:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->acceptor_.open (address,
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.cpp:138:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_IO_Asynch_Acceptor::open (const ACE_HANDLE &socket)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.h:40:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_INET_Addr &address, int backlog = 20);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.h:43:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_HANDLE &socket);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.h:72:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_INET_Addr &local_sap, int backlog = 20);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.h:75:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_HANDLE &socket);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.h:103:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_INET_Addr &address, int backlog = 20);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Acceptor.h:106:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_HANDLE &socket);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Handler.cpp:315:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_Asynch_Handler::open (ACE_HANDLE h,
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Handler.cpp:321:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_Service_Handler::open (h, mb);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Handler.cpp:404:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              if (ar.open (*this, this->handler ()->handle ()) == -1
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Handler.h:175:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE h, ACE_Message_Block &mb);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:125:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (handle.address (), initial_data, bytes_to_memcpy);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:164:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:373:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ar.open (*(aioh->handler ()), aioh->handle ()) == -1
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:401:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (handle->address (),
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:419:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (ar.open (*(aioh->handler ()), aioh->handle ()) == -1
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:465:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (tf.open (*(aioh->handler ()), aioh->handle ()) == -1
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:515:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (tf.open (*(aioh->handler ()), aioh->handle ()) == -1
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:573:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (aw.open (*(aioh->handler ()), aioh->handle ()) == -1
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Parse_Headers.h:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header_buf_[MAX_HEADER_LENGTH];
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Pipeline.cpp:10:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_Pipeline::open (void *)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Pipeline.h:33:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Reaper.cpp:18:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_Reaper::open (void *)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Reaper.h:35:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:87:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->policy_.acceptor ()->open (inet_addr);
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:91:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_Server::open (JAWS_Pipeline_Handler *protocol,
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:156:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:169:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->nthreads_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:172:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->maxthreads_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.cpp:183:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->ratio_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Server.h:18:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (JAWS_Pipeline_Handler *ph, JAWS_Dispatch_Policy *dp = 0);
data/ace-6.5.12+dfsg/apps/JAWS2/main.cpp:41:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (server.open (&HTTP_Read) == -1)
data/ace-6.5.12+dfsg/apps/JAWS3/bench/average.cpp:7:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS3/bench/average.cpp:11:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      input = ACE_OS::atoi (buf);
data/ace-6.5.12+dfsg/apps/JAWS3/bench/mkfiles.cpp:25:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          median = ACE_OS::atoi (options.optarg);
data/ace-6.5.12+dfsg/apps/JAWS3/bench/mkfiles.cpp:28:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          maximum = ACE_OS::atoi (options.optarg);
data/ace-6.5.12+dfsg/apps/JAWS3/bench/mkfiles.cpp:31:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          number = ACE_OS::atoi (options.optarg);
data/ace-6.5.12+dfsg/apps/JAWS3/bench/mkfiles.cpp:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[1024];
data/ace-6.5.12+dfsg/apps/JAWS3/bench/mkfiles.cpp:62:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      ACE_OS::sprintf (filename, "file%011ld.html", i);
data/ace-6.5.12+dfsg/apps/JAWS3/bench/mkfiles.cpp:63:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *fp = ACE_OS::fopen (filename, "w+b");
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:21:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *)
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[8 * 1024];
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:201:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          number_of_requests = ACE_OS::atoi (options.optarg);
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:221:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = ACE_OS::fopen (filelist_name, "r+b");
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:234:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:235:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = ACE_OS::fopen (filelist_name, "r+b");
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:238:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static char rq[BUFSIZ];
data/ace-6.5.12+dfsg/apps/JAWS3/http/HTTP_Service_Handler.cpp:18:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_HTTP_Service_Handler::open (void *)
data/ace-6.5.12+dfsg/apps/JAWS3/http/HTTP_Service_Handler.cpp:46:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        p = (unsigned short) ACE_OS::atoi (opt.optarg);
data/ace-6.5.12+dfsg/apps/JAWS3/http/HTTP_Service_Handler.cpp:55:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (ACE_INET_Addr (p)) == -1)
data/ace-6.5.12+dfsg/apps/JAWS3/http/HTTP_Service_Handler.h:32:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Asynch_IO.cpp:29:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || asynch_write_stream.open (*jecaha, handle) == -1
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Asynch_IO.cpp:57:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || asynch_read_stream.open (*jecaha, handle) == -1
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Asynch_IO.cpp:97:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || asynch_transmit_file.open (*jecaha, handle) == -1
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Cached_Allocator_T.cpp:11:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (&next, next_indirect, sizeof (char *));
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Cached_Allocator_T.cpp:19:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (next_indirect, &next_pool, sizeof (char *));
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Reactive_IO.cpp:49:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  rs->open ();
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Reactive_IO.cpp:87:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  rr->open ();
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Reactive_IO.cpp:134:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  rt->open ();
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Reactive_IO.cpp:159:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
JAWS_IO_Reactive_Handler::open (void)
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Reactive_IO_Helpers.h:26:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (void);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/THYBRID_Concurrency.cpp:25:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    this->min_number_of_threads_ = ACE_OS::atoi (value);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/THYBRID_Concurrency.cpp:28:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      ACE_OS::atoi (JAWS_DEFAULT_MIN_THYBRID_THREADS);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/THYBRID_Concurrency.cpp:35:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    this->max_number_of_threads_ = ACE_OS::atoi (value);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/THYBRID_Concurrency.cpp:38:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      ACE_OS::atoi (JAWS_DEFAULT_MAX_THYBRID_THREADS);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/TPOOL_Concurrency.cpp:19:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    this->number_of_threads_ = ACE_OS::atoi (value);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/TPOOL_Concurrency.cpp:21:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    this->number_of_threads_ = ACE_OS::atoi (JAWS_DEFAULT_TPOOL_THREADS);
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/main.cpp:17:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_Service_Config::open (argc, argv) == -1
data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_Service_Handler.cpp:18:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
TeraSS_Service_Handler::open (void *)
data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_Service_Handler.cpp:46:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        p = (unsigned short) ACE_OS::atoi (opt.optarg);
data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_Service_Handler.cpp:55:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (ACE_INET_Addr (p)) == -1)
data/ace-6.5.12+dfsg/apps/JAWS3/small/SS_Service_Handler.h:33:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *);
data/ace-6.5.12+dfsg/apps/drwho/BS_Server.cpp:17:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  this->count_ = ACE_OS::atoi (packet);
data/ace-6.5.12+dfsg/apps/drwho/BS_Server.cpp:56:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char last_lookup[MAXHOSTNAMELEN];
data/ace-6.5.12+dfsg/apps/drwho/CM_Client.cpp:15:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
CM_Client::open (short port_number)
data/ace-6.5.12+dfsg/apps/drwho/CM_Client.h:38:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (short port_number);
data/ace-6.5.12+dfsg/apps/drwho/CM_Server.cpp:13:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
CM_Server::open (short port_number)
data/ace-6.5.12+dfsg/apps/drwho/CM_Server.h:30:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (short port_number);
data/ace-6.5.12+dfsg/apps/drwho/Comm_Manager.h:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char recv_packet_[UDP_PACKET_SIZE];
data/ace-6.5.12+dfsg/apps/drwho/Comm_Manager.h:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char send_packet_[UDP_PACKET_SIZE];
data/ace-6.5.12+dfsg/apps/drwho/Comm_Manager.h:34:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (short port_number) = 0;
data/ace-6.5.12+dfsg/apps/drwho/File_Manager.cpp:75:26:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  ACE_HANDLE f = ACE_OS::mkstemp (filename);
data/ace-6.5.12+dfsg/apps/drwho/File_Manager.cpp:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char directory[MAXPATHLEN];
data/ace-6.5.12+dfsg/apps/drwho/Multicast_Manager.cpp:89:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&host_addr,
data/ace-6.5.12+dfsg/apps/drwho/Multicast_Manager.cpp:92:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&Multicast_Manager::current_ptr->host_addr,
data/ace-6.5.12+dfsg/apps/drwho/Multicast_Manager.cpp:127:44:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return hp == 0 ? 0 : (hostent *) ACE_OS::memcpy (&host_entry, hp, sizeof *hp);
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:129:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          Options::port_number = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/drwho/Options.cpp:144:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          Options::max_server_timeout = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/apps/drwho/PMC_Flo.cpp:34:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  ACE_OS::sprintf (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMC_Ruser.cpp:109:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  current_node->set_inactive_count (ACE_OS::atoi (cp));
data/ace-6.5.12+dfsg/apps/drwho/PMC_Ruser.cpp:110:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  current_node->set_active_count (ACE_OS::atoi (cp = ACE_OS::strchr (cp, ' ') + 1));
data/ace-6.5.12+dfsg/apps/drwho/PMS_All.cpp:28:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  ACE_OS::sprintf (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMS_Flo.cpp:26:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  ACE_OS::sprintf (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMS_Ruser.cpp:29:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  ACE_OS::sprintf (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PMS_Ruser.cpp:117:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      ACE_OS::sprintf (buf_ptr,
data/ace-6.5.12+dfsg/apps/drwho/PM_Client.cpp:122:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  current_node->set_inactive_count (ACE_OS::atoi (cp));
data/ace-6.5.12+dfsg/apps/drwho/PM_Client.cpp:123:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  current_node->set_active_count (ACE_OS::atoi (cp = ACE_OS::strchr (cp, ' ') + 1));
data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.cpp:33:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->rwho_dir.open (this->rwho_dir_name);
data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.cpp:80:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        ACE_OS::open (dir_ptr->d_name, O_RDONLY);
data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.h:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char original_pathname[MAXPATHLEN + 1];
data/ace-6.5.12+dfsg/apps/drwho/SMR_Client.cpp:11:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (CM_Client::open (port_number) < 0)
data/ace-6.5.12+dfsg/apps/drwho/SMR_Server.cpp:7:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (CM_Server::open (port_number) < 0)
data/ace-6.5.12+dfsg/apps/gperf/src/Bool_Array.cpp:51:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Bool_Array::open (u_long s)
data/ace-6.5.12+dfsg/apps/gperf/src/Bool_Array.h:49:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (u_long);
data/ace-6.5.12+dfsg/apps/gperf/src/Gen_Perf.cpp:235:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Gen_Perf::open (void)
data/ace-6.5.12+dfsg/apps/gperf/src/Gen_Perf.cpp:308:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->char_search.open (max_hash_value + 1) == -1)
data/ace-6.5.12+dfsg/apps/gperf/src/Gen_Perf.cpp:421:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open () == -1)
data/ace-6.5.12+dfsg/apps/gperf/src/Gen_Perf.h:49:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void);
data/ace-6.5.12+dfsg/apps/gperf/src/Options.cpp:254:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_LOG_MSG->open (argv[0]) == -1)
data/ace-6.5.12+dfsg/apps/gperf/src/Options.cpp:327:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            iterations_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/gperf/src/Options.cpp:453:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            initial_asso_value_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/gperf/src/Options.cpp:471:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            jump_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/gperf/src/Options.cpp:630:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            size_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/gperf/src/Options.cpp:641:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            total_switches_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/apps/gperf/src/Options.h:177:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char key_positions_[MAX_KEY_POS];
data/ace-6.5.12+dfsg/apps/gperf/tests/test.cpp:18:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAX_LEN];
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempfilename_[MAXPATHLEN];
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:176:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char emsg [100];
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:193:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            ACE_OS::sprintf (emsg,"invalid symbol \'%c\' in char_values",*ptr);
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:203:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          ACE_OS::sprintf (emsg,"max of %d char_values exceeded.\nIncrease ACE_Codeset_Registry::max_charsets_ to at least %d and rebuild mkcsregdb",max_charsets_,entry_.num_sets_);
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:241:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      ACE_OS::strcpy (tempfilename_, "csdbXXXXXX");
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:243:27:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  ACE_HANDLE fd = ACE_OS::mkstemp (tempfilename_);
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:310:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fname[200];
data/ace-6.5.12+dfsg/apps/soreduce/Library.cpp:44:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  mpcfile_.open(fname.c_str());
data/ace-6.5.12+dfsg/apps/soreduce/Library.cpp:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char abspath[1000];
data/ace-6.5.12+dfsg/apps/soreduce/SO_Group.cpp:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[max_line_length];
data/ace-6.5.12+dfsg/apps/soreduce/Sig_List.cpp:44:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy (narray,array_,capacity_ * sizeof(Signature*));
data/ace-6.5.12+dfsg/apps/soreduce/Sig_List.cpp:58:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy (narray,array_,capacity_ * sizeof(Signature*));
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_[CMDLINE_LEN];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmdline_[CMDLINE_LEN];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *argv_[ARGV_SIZE];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[MAX_RECV], *p;
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:166:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char err[1024];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:204:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char retvalmsg[64];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:205:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf (retvalmsg, "%d\n", status);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:214:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char retvalmsg[64];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:215:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (retvalmsg, "%d\n", status);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:233:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (secs_s == 0 || (secs = atoi (secs_s)) <= 0)
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:282:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char abspath[1024];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:342:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[256];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:390:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char libspec[1024];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:579:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char errmsg[errmsgsize];
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/test.cpp:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[80];
data/ace-6.5.12+dfsg/examples/ASX/CCM_App/CCM_App.cpp:18:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/ASX/CCM_App/CCM_App.cpp:29:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Test_Task::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/CCM_App/SC_Server.cpp:24:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/ASX/CCM_App/SC_Server.cpp:64:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (loggerd.open (argc,
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Consumer_Router.cpp:19:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Consumer_Router::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Consumer_Router.h:49:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *a = 0);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Event_Analyzer.cpp:9:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Event_Analyzer::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Event_Analyzer.h:24:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *a = 0);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp:108:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp:121:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->consumer_port (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp:127:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->high_water_mark (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp:130:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->iterations (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp:133:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->low_water_mark (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp:136:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->initial_queue_length (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp:139:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->message_size (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp:145:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->supplier_port (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Options.cpp:156:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->thr_count (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Peer_Router.cpp:91:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (endpoint) == -1)
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Peer_Router.cpp:97:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (this->peer_map_.open () == -1)
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Peer_Router.cpp:211:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Peer_Handler::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Peer_Router.h:32:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Supplier_Router.cpp:52:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Supplier_Router::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Supplier_Router.h:51:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *a = 0);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/event_server.cpp:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_buffer [BUFSIZ];
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Transceiver/transceiver.cpp:37:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_number_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Transceiver/transceiver.cpp:140:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Event_Transceiver::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Transceiver/transceiver.cpp:171:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Transceiver/transceiver.cpp:191:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Transceiver/transceiver.cpp:209:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_Service_Config::open (argv[0]) == -1
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Transceiver/transceiver.h:24:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/buffer_stream.cpp:37:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/buffer_stream.cpp:93:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Common_Task::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/buffer_stream.cpp:234:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.cpp:14:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Consumer_Handler::open (void *a)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.cpp:18:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->Peer_Handler<CONSUMER_ROUTER, CONSUMER_KEY>::open (a);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.cpp:37:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Consumer_Router::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.h:32:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.h:42:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *a = 0);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Event_Analyzer.cpp:10:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Event_Analyzer::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Event_Analyzer.h:21:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *a = 0);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:97:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:120:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->high_water_mark (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:123:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->iterations (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:126:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->low_water_mark (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:129:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->initial_queue_length (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:132:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->message_size (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Options.cpp:152:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->thr_count (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Peer_Router.cpp:42:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (addr, ACE_Reactor::instance ()) == -1)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Peer_Router.cpp:118:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Peer_Handler<ROUTER, KEY>::open (void *a)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Peer_Router.cpp:256:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || this->peer_map_.open () == -1)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Peer_Router.h:48:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.cpp:14:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Supplier_Handler::open (void *a)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.cpp:18:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return this->Peer_Handler<SUPPLIER_ROUTER, SUPPLIER_KEY>::open (a);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.cpp:57:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Supplier_Router::open (void *)
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.h:35:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.h:45:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *a = 0);
data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/BPR_Drivers_T.cpp:208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/Thread_Bounded_Packet_Relay.cpp:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char read_buf [BUFSIZ];
data/ace-6.5.12+dfsg/examples/ConfigViewer/MainFrame.cpp:32:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pHeapConfig->open();
data/ace-6.5.12+dfsg/examples/ConfigViewer/MainFrame.cpp:131:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pHeapConfig->open(Dlg.GetFilename());
data/ace-6.5.12+dfsg/examples/ConfigViewer/MainFrame.cpp:139:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pHeapConfig->open();
data/ace-6.5.12+dfsg/examples/ConfigViewer/MainFrame.cpp:152:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pHeapConfig->open(Dlg.GetFilename());
data/ace-6.5.12+dfsg/examples/ConfigViewer/ValueDlg.cpp:60:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  return ACE_OS::atoi(m_Value);
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp:28:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Svc_Handler::open (void *)
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp:33:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ar_.open (*this,
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp:100:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (ACE_SPIPE_Addr (rendezvous_)) == -1)
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp:122:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp:136:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          n_threads_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.h:30:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.cpp:25:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Peer_Handler::open (void *)
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.cpp:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.cpp:202:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.cpp:216:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          iterations_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.h:28:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/examples/Connection/misc/Connection_Handler.cpp:24:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Connection_Handler::open (void *)
data/ace-6.5.12+dfsg/examples/Connection/misc/Connection_Handler.cpp:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Connection/misc/Connection_Handler.cpp:187:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short port = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/examples/Connection/misc/Connection_Handler.cpp:205:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (peer_acceptor.open (ACE_INET_Addr (port),
data/ace-6.5.12+dfsg/examples/Connection/misc/Connection_Handler.h:12:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/Connection/misc/test_upipe.cpp:39:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (this->thr_strategy_.open (this->thr_mgr_, THR_DETACHED | THR_NEW_LWP) == -1)
data/ace-6.5.12+dfsg/examples/Connection/misc/test_upipe.cpp:41:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      else if (this->open (local_addr, this->reactor_,
data/ace-6.5.12+dfsg/examples/Connection/misc/test_upipe.h:21:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *)
data/ace-6.5.12+dfsg/examples/Connection/misc/test_upipe.h:31:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Connection/misc/test_upipe.h:54:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *)
data/ace-6.5.12+dfsg/examples/Connection/misc/test_upipe.h:63:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-acceptor.cpp:27:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Svc_Handler<PEER_STREAM>::open (void *)
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-acceptor.cpp:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-acceptor.cpp:101:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                          ? ACE_OS::atoi (argv[2])
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-acceptor.cpp:117:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->inherited::open (this->server_addr_,
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-acceptor.h:23:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.cpp:17:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Peer_Handler<PEER_STREAM>::open (void *)
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.cpp:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.cpp:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.cpp:226:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->inherited::open (ACE_Reactor::instance ());
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.cpp:232:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                          ? ACE_OS::atoi (argv[2])
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.h:27:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/examples/DLL/test_dll.cpp:21:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int retval = dll.open (ACE_DLL_PREFIX ACE_TEXT("DLL_Today"));
data/ace-6.5.12+dfsg/examples/DLL/test_dll.cpp:54:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  retval = dll.open (ACE_DLL_PREFIX ACE_TEXT ("DLL_Newsweek"));
data/ace-6.5.12+dfsg/examples/IOStream/client/iostream_client.cpp:16:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short server_port = argc > 2 ? ACE_OS::atoi (argv[2]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/examples/IOStream/server/iostream_server.cpp:17:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Handler::open (void *)
data/ace-6.5.12+dfsg/examples/IOStream/server/iostream_server.cpp:106:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ACE_INET_Addr addr (argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT);
data/ace-6.5.12+dfsg/examples/IOStream/server/iostream_server.cpp:108:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (addr) == -1)
data/ace-6.5.12+dfsg/examples/IOStream/server/iostream_server.h:35:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-client.cpp:24:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int rate = ACE_OS::atoi( argv[ 1 ]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-client.cpp:26:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int pdu_size = ACE_OS::atoi( argv[ 2 ]) * 1024;
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-client.cpp:28:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int session = ACE_OS::atoi( argv[ 3 ]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-client.cpp:43:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                      ? ACE_OS::atoi( argv[ i*2 + 5 ]) : ACE_ATM_Addr::DEFAULT_SELECTOR );
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-client.cpp:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-client.cpp:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname[ MAXNAMELEN ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-client.cpp:67:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (atm_stream.open () == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-server.cpp:29:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned char selector = ( argc == 2 ) ? ACE_OS::atoi( argv[ 1 ]) : ACE_ATM_Addr::DEFAULT_SELECTOR;
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-server.cpp:41:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE ret = peer_acceptor.open (addr, 5, params);
data/ace-6.5.12+dfsg/examples/IPC_SAP/ATM_SAP/CPP-server.cpp:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-Msg-client.cpp:17:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-Msg-server.cpp:18:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-server.cpp:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-test.cpp:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *argv[2];
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-test.cpp:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-test.cpp:52:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ACE_OS::open (input_filename, O_RDONLY);
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-test.cpp:74:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inclient.cpp:24:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    ACE_HTONS (argc > 2 ? ACE_OS::atoi (argv[2]) : ACE_DEFAULT_SERVER_PORT);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inclient.cpp:25:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int sockbufsize = argc > 3 ? ACE_OS::atoi (argv[3]) : 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inclient.cpp:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inclient.cpp:57:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (&saddr.sin_addr, hp->h_addr, hp->h_length);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inserver.cpp:21:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    ACE_HTONS (argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inserver.cpp:22:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int sockbufsize = argc > 2 ? ACE_OS::atoi (argv[2]) : 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inserver.cpp:63:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:69:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy ((void *) this->message_buf_,
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:109:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf,
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:134:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:137:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:140:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:149:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->threads_ = (size_t) ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:152:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->sleep_time_.set (0, ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:417:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:68:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:174:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:177:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->reply_message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:202:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Handler::open (void *)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:452:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->twoway_acceptor_.open (twoway_server_addr, 1) == -1
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:453:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || this->oneway_acceptor_.open (oneway_server_addr, 1) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver-fancy.cpp:494:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (handler->open () == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver.cpp:295:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (twoway_acceptor.open (twoway_server_addr, 1) == -1
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver.cpp:296:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || oneway_acceptor.open (oneway_server_addr, 1) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inserver.cpp:387:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    port = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-memclient.cpp:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf [MAXPATHLEN];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-memclient.cpp:40:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-memserver.cpp:22:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (server_addr, 1) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-memserver.cpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-memserver.cpp:65:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    port = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-unclient.cpp:16:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-unserver.cpp:48:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-unserver.cpp:97:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (server_addr) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/FD-unclient.cpp:27:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE handle = ACE_OS::open (file_name, O_RDONLY);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/FD-unclient.cpp:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/FD-unserver.cpp:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/FD-unserver.cpp:38:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  ACE_OS::sprintf (buf, "%d", static_cast<int> (ACE_OS::getpid ()));
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/NPClient.cpp:24:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  size = argc > 1 ? ACE_OS::atoi (argv[1]) : DEFAULT_SIZE;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/NPClient.cpp:25:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  iterations = argc > 2 ? ACE_OS::atoi (argv[2]) : DEFAULT_COUNT;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/NPClient.cpp:45:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (buf, "hello");
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/NPServer.cpp:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/NPServer.cpp:26:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_SPIPE_Addr (rendezvous)) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/consumer_msg.cpp:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/consumer_msg.cpp:33:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (addr) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/consumer_read.cpp:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/consumer_read.cpp:32:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (ACE_SPIPE_Addr (rendezvous)) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/producer_msg.cpp:23:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int size = argc > 1 ? ACE_OS::atoi (argv[1]) : DEFAULT_SIZE;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/producer_msg.cpp:24:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int iterations = argc > 2 ? ACE_OS::atoi (argv[2]) : DEFAULT_COUNT;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/producer_read.cpp:20:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  size = argc > 1 ? ACE_OS::atoi (argv[1]) : DEFAULT_SIZE;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/producer_read.cpp:21:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  iterations = argc > 2 ? ACE_OS::atoi (argv[2]) : DEFAULT_COUNT;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/server.cpp:38:39:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE s_handle = peer_acceptor.open (addr);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/server.cpp:58:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:59:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy ((void *) this->message_buf_,
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:91:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf,
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:116:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:119:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:122:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:133:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->sleep_time_.set (0, ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:357:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.h:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char quit_string_[QUIT_STRING_SIZE + 1];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:63:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy ((void *) this->message_buf_,
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:103:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf,
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:128:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:131:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:134:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:145:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->threads_ = (size_t) ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:148:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->sleep_time_.set (0, ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:413:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.h:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char quit_string_[QUIT_STRING_SIZE + 1];
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:68:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:181:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:184:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->reply_message_len_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:210:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Handler::open (void *)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:469:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->twoway_acceptor_.open (twoway_server_addr, 1) == -1
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:470:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || this->oneway_acceptor_.open (oneway_server_addr, 1) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-fancy.cpp:514:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (handler->open () == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-simple.cpp:263:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (twoway_acceptor.open (twoway_server_addr, 1) == -1
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-simple.cpp:264:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || oneway_acceptor.open (oneway_server_addr, 1) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server-simple.cpp:358:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    port = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server.cpp:298:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (twoway_acceptor.open (twoway_server_addr, 1) == -1
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server.cpp:299:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || oneway_acceptor.open (oneway_server_addr, 1) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-server.cpp:422:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    port = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-client.cpp:29:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        selector = ACE_OS::atoi (optarg);
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-client.cpp:43:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int rate = (argc == 3) ? ACE_OS::atoi (argv[2]) :
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-client.cpp:44:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    (argc == 5) ? ACE_OS::atoi (argv[4]) : 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-client.cpp:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-client.cpp:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname[MAXNAMELEN];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-client.cpp:63:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (cli_stream.open (ACE_XTI_ATM_DEVICE, O_RDWR, 0) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-server.cpp:23:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        selector = ACE_OS::atoi (optarg);
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-server.cpp:44:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (addr,
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-server.cpp:66:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-client.cpp:17:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short r_port = argc > 2 ? ACE_OS::atoi (argv[2]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-client.cpp:18:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int timeout = argc > 3 ? ACE_OS::atoi (argv[3]) : ACE_DEFAULT_TIMEOUT;
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-client.cpp:19:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short l_port = argc > 4 ? ACE_OS::atoi (argv[4]) : ACE_DEFAULT_LOCAL_PORT;
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-client.cpp:21:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-server.cpp:14:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short port = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-server.cpp:15:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ACE_Time_Value timeout (argc > 2 ? ACE_OS::atoi (argv[2]) : ACE_DEFAULT_TIMEOUT);
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-server.cpp:25:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (addr, 1) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-server.cpp:41:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-client.cpp:20:70:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned short port = argc < 4 ? ACE_DEFAULT_SERVER_PORT : ACE_OS::atoi (argv[3]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-client.cpp:22:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXLINE];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-server.cpp:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char recvline[MAXLINE];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-server.cpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sendline[MAXLINE];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-server.cpp:60:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  employee_id = ACE_OS::atoi (recvline);
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-server.cpp:89:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short port = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/ftp-client.cpp:23:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short port = argc < 4 ? ACE_DEFAULT_SERVER_PORT : ACE_OS::atoi (argv[3]);
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/ftp-client.cpp:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/ftp-client.cpp:33:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = ACE_OS::open (filename, O_RDONLY)) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/ftp-server.cpp:17:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/ftp-server.cpp:45:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short port = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/ftp-server.cpp:50:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (server.open (ACE_INET_Addr (port), 1) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex1.cpp:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char conbuf[30];  // Buffer to receive response.
data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex1.cpp:132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s_buf[42];
data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex1.cpp:144:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (s_buf,
data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex2.cpp:150:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size = argc > 1 ? ACE_OS::atoi (argv[1]) : 32;
data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex2.cpp:151:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  iterations = argc > 2 ? ACE_OS::atoi (argv[2]) : 16;
data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex3.cpp:130:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size = argc > 1 ? ACE_OS::atoi (argv[1]) : 32;
data/ace-6.5.12+dfsg/examples/IPC_SAP/UPIPE_SAP/ex3.cpp:131:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  iterations = argc > 2 ? ACE_OS::atoi (argv[2]) : 16;
data/ace-6.5.12+dfsg/examples/Log_Msg/test_log_msg.cpp:47:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (ACE_LOG_MSG->open (argv[0],
data/ace-6.5.12+dfsg/examples/Log_Msg/test_log_msg.cpp:64:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (ACE_LOG_MSG->open (argv[0]) == -1)
data/ace-6.5.12+dfsg/examples/Log_Msg/test_log_msg.cpp:196:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char *l_argv[2];
data/ace-6.5.12+dfsg/examples/Log_Msg/test_ostream.cpp:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Logger/Acceptor-server/server_loggerd.cpp:50:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Logger/Acceptor-server/server_loggerd.cpp:191:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Logging_Handler::open (void *)
data/ace-6.5.12+dfsg/examples/Logger/Acceptor-server/server_loggerd.cpp:234:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open
data/ace-6.5.12+dfsg/examples/Logger/Acceptor-server/server_loggerd.h:38:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/Logger/Acceptor-server/server_loggerd.h:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char peer_name_[MAXHOSTNAMELEN + 1];
data/ace-6.5.12+dfsg/examples/Logger/client/logging_app.cpp:22:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short logger_port  = argc > 2 ? ACE_OS::atoi (argv[2]) : LOGGER_PORT;
data/ace-6.5.12+dfsg/examples/Logger/client/logging_app.cpp:23:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int max_iterations = argc > 3 ? ACE_OS::atoi (argv[3]) : MAX_ITERATIONS;
data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Acceptor.cpp:13:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Logging_Acceptor::open (const ACE_INET_Addr &addr)
data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Acceptor.cpp:16:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->peer_acceptor_.open (addr, 1) == -1)
data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Acceptor.cpp:76:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || svc_handler->open () == -1)
data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Acceptor.h:40:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_INET_Addr &a);
data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Handler.cpp:150:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Logging_Handler::open (void)
data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Handler.h:42:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void);
data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Handler.h:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host_name_[MAXHOSTNAMELEN + 1];
data/ace-6.5.12+dfsg/examples/Logger/simple-server/server_loggerd.cpp:48:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        addr.set (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/Logger/simple-server/server_loggerd.cpp:54:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor->open (addr) == -1)
data/ace-6.5.12+dfsg/examples/Map_Manager/test_hash_map_manager.cpp:22:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int total = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/IO_Test.cpp:103:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/IO_Test.cpp:134:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/IO_Test.cpp:224:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy (dst, src, size);
data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/test_io.cpp:67:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      iteration_count = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/test_io.cpp:171:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ACE_OS::fopen (input_filename, ACE_TEXT ("r"));
data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/test_io.cpp:173:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ACE_OS::fopen (output_filename, ACE_TEXT ("w+"));
data/ace-6.5.12+dfsg/examples/Mem_Map/file-reverse/file-reverse.cpp:40:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Misc/test_profile_timer.cpp:15:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int iterations = argc > 1 ? ACE_OS::atoi (argv[1]) : DEFAULT_ITERATIONS;
data/ace-6.5.12+dfsg/examples/Misc/test_read_buffer.cpp:12:42:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE handle = argc > 1 ? ACE_OS::open (argv[1], O_RDONLY) : ACE_STDIN;
data/ace-6.5.12+dfsg/examples/Misc/test_read_buffer.cpp:13:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int term = argc > 2 ? ACE_OS::atoi (argv[2]) : EOF;
data/ace-6.5.12+dfsg/examples/Misc/test_read_buffer.cpp:14:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int search = argc > 3 ? ACE_OS::atoi (argv[3]) : '\n';
data/ace-6.5.12+dfsg/examples/Misc/test_read_buffer.cpp:15:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int replace = argc > 4 ? ACE_OS::atoi (argv[4]) : '\0';
data/ace-6.5.12+dfsg/examples/Misc/test_trace.cpp:85:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const size_t MAX_DEPTH = argc == 1 ? 10 : ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/Misc/test_trace.cpp:90:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    ACE_Trace::set_nesting_indent (ACE_OS::atoi (argv[2]));
data/ace-6.5.12+dfsg/examples/Misc/test_trace.cpp:104:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_threads = argc > 3 ? ACE_OS::atoi (argv[3]) : 4;
data/ace-6.5.12+dfsg/examples/Misc/test_trace.cpp:115:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int MAX_ITERATIONS = argc > 3 ? ACE_OS::atoi (argv[3]) : 10;
data/ace-6.5.12+dfsg/examples/Monitor/Group/group.cpp:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char * str_array[5] = {0};
data/ace-6.5.12+dfsg/examples/Monitor/Memory_Usage/memory_usage.cpp:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char * str_array[5] = {0};
data/ace-6.5.12+dfsg/examples/Monitor/Message_Queue_Size/message_queue_size.cpp:27:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[nibbles + 1];
data/ace-6.5.12+dfsg/examples/Monitor/Message_Queue_Size/message_queue_size.cpp:28:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    ACE_OS::sprintf (buf, "%p", this->addr_);
data/ace-6.5.12+dfsg/examples/NT_Service/main.cpp:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char progname[128];
data/ace-6.5.12+dfsg/examples/NT_Service/main.cpp:64:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (progname,
data/ace-6.5.12+dfsg/examples/NT_Service/main.cpp:102:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      opt_startup = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/NT_Service/main.cpp:117:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      opt_startup = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/NT_Service/main.cpp:227:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ACE_LOG_MSG->open(argv[0],
data/ace-6.5.12+dfsg/examples/Naming/test_multiple_contexts.cpp:61:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  i = ns_ptr->open (ACE_Naming_Context::NODE_LOCAL);
data/ace-6.5.12+dfsg/examples/Naming/test_multiple_contexts.cpp:73:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  i = ns_ptr1->open (ACE_Naming_Context::NODE_LOCAL);
data/ace-6.5.12+dfsg/examples/Naming/test_non_existent.cpp:37:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  i = ns_ptr->open (ACE_Naming_Context::NODE_LOCAL);
data/ace-6.5.12+dfsg/examples/Naming/test_open.cpp:32:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = ns.open (ACE_Naming_Context::NET_LOCAL);
data/ace-6.5.12+dfsg/examples/Naming/test_open.cpp:40:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char key[128];
data/ace-6.5.12+dfsg/examples/Naming/test_open.cpp:41:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char val[32];
data/ace-6.5.12+dfsg/examples/Naming/test_open.cpp:42:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char type[2];
data/ace-6.5.12+dfsg/examples/Naming/test_open.cpp:51:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          ACE_OS::sprintf (key,
data/ace-6.5.12+dfsg/examples/Naming/test_open.cpp:55:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          ACE_OS::sprintf (val,
data/ace-6.5.12+dfsg/examples/Naming/test_writers.cpp:31:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  i = ns_ptr->open (ACE_Naming_Context::NODE_LOCAL);
data/ace-6.5.12+dfsg/examples/Naming/test_writers.cpp:39:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char key[128];
data/ace-6.5.12+dfsg/examples/Naming/test_writers.cpp:40:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char val[32];
data/ace-6.5.12+dfsg/examples/Naming/test_writers.cpp:41:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char type[2];
data/ace-6.5.12+dfsg/examples/Naming/test_writers.cpp:50:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          ACE_OS::sprintf (key,
data/ace-6.5.12+dfsg/examples/Naming/test_writers.cpp:54:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          ACE_OS::sprintf (val,
data/ace-6.5.12+dfsg/examples/OS/Process/imore.cpp:108:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (rfifo.open (rendezvous) == -1 || wfifo.open (rendezvous) == -1)
data/ace-6.5.12+dfsg/examples/OS/Process/imore.cpp:108:46:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (rfifo.open (rendezvous) == -1 || wfifo.open (rendezvous) == -1)
data/ace-6.5.12+dfsg/examples/OS/Process/imore.cpp:148:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (pipe.open () == -1)
data/ace-6.5.12+dfsg/examples/OS/Process/imore.cpp:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/examples/OS/Process/imore.cpp:215:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE infile = ACE_OS::open (fname, O_RDONLY);
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:118:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE infile = ACE_OS::open (print_file, O_RDONLY);
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:423:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (environment + (ACE_OS::strlen (environment) + 1),
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:514:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_LOG_MSG->open (argv[0]) == -1)
data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/QoS_Util.cpp:62:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->source_port_ = ACE_OS::atoi (get_opts.opt_arg ());
data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/Receiver_QoS_Event_Handler.cpp:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/receiver.cpp:142:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (qos_session->open (mult_addr,
data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/receiver.cpp:187:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char achInBuf [BUFSIZ];
data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/sender.cpp:147:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (qos_session->open (mult_addr,
data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/sender.cpp:191:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char achInBuf [BUFSIZ];
data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/QoS_Util.cpp:62:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->source_port_ = ACE_OS::atoi (get_opts.opt_arg ());
data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/Receiver_QoS_Event_Handler.cpp:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/receiver.cpp:142:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (qos_session->open (mult_addr,
data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/receiver.cpp:187:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char achInBuf [BUFSIZ];
data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/sender.cpp:147:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (qos_session->open (mult_addr,
data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/sender.cpp:191:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char achInBuf [BUFSIZ];
data/ace-6.5.12+dfsg/examples/QOS/Diffserv/diffserv_test.cpp:107:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy(buf, "Hello");
data/ace-6.5.12+dfsg/examples/QOS/Diffserv/diffserv_test.cpp:110:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ACE_INET_Addr raddr(ACE_OS::atoi(argv[2]), argv[1]);
data/ace-6.5.12+dfsg/examples/QOS/Diffserv/diffserv_test.cpp:112:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  sock.open( raddr, ACE_Addr::sap_any, PF_INET, 0, 1);
data/ace-6.5.12+dfsg/examples/QOS/Diffserv/server.cpp:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/QOS/Diffserv/server.cpp:153:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  port1 = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/examples/QOS/Simple/QoS_Util.cpp:62:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->source_port_ = ACE_OS::atoi (get_opts.opt_arg ());
data/ace-6.5.12+dfsg/examples/QOS/Simple/Receiver_QoS_Event_Handler.cpp:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/QOS/Simple/receiver.cpp:143:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (qos_session->open (mult_addr,
data/ace-6.5.12+dfsg/examples/QOS/Simple/receiver.cpp:188:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char achInBuf [BUFSIZ];
data/ace-6.5.12+dfsg/examples/QOS/Simple/sender.cpp:147:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (qos_session->open (mult_addr,
data/ace-6.5.12+dfsg/examples/QOS/Simple/sender.cpp:191:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char achInBuf [BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/CODgram.cpp:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/CODgram.cpp:143:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/CODgram.cpp:144:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (buf,
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/CODgram.cpp:197:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  port1 = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/CODgram.cpp:199:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const u_short port2 = argc > 3 ? ACE_OS::atoi (argv[3]) : port1 + 1;
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/Dgram.cpp:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/Dgram.cpp:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/Dgram.cpp:153:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (buf, "Data to transmit");
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/Dgram.cpp:206:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  port1 = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/Dgram.cpp:208:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const u_short port2 = argc > 3 ? ACE_OS::atoi (argv[3]) : port1 + 1;
data/ace-6.5.12+dfsg/examples/Reactor/FIFO/server.cpp:30:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->fifo_reader_.open (ACE_DEFAULT_RENDEZVOUS) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/FIFO/server.cpp:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Misc/notification.cpp:199:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Misc/notification.cpp:348:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/notification.cpp:358:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int delay = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/notification.cpp:359:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int interval = ACE_OS::atoi (argv[2]);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/notification.cpp:360:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size_t n_threads = ACE_OS::atoi (argv[3]);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/notification.cpp:361:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size_t max_iterations = argc > 4 ? ACE_OS::atoi (argv[4]) : MAX_ITERATIONS;
data/ace-6.5.12+dfsg/examples/Reactor/Misc/pingpong.cpp:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf_[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Misc/pingpong.cpp:258:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_demuxing.cpp:55:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->handle_ = ACE_OS::open (ACE_DEV_NULL, O_WRONLY);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_demuxing.cpp:231:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_demuxing.cpp:361:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      timeout = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_early_timeouts.cpp:58:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = dummy_pipe.open ();
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_reactors.cpp:25:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_reactors.cpp:68:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Test_Task::open (void *args)
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_reactors.cpp:171:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      tt1[i].open (react1);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_reactors.cpp:172:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      tt2[i].open (react2);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_signals_1.cpp:65:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    period.set (ACE_OS::atoi (argv[1]), 0);
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/Log_Wrapper.cpp:28:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Log_Wrapper::open (const int port, const char *mcast_addr)
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/Log_Wrapper.cpp:39:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy ((char *) &this->log_msg_.host,
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/Log_Wrapper.h:35:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const int port, const char* mcast_addr);
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp:30:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp:41:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        max_message_size = ACE_OS::atoi (getopt.opt_arg ()) * BUFSIZ;
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp:44:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iterations = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp:69:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (log.open (UDP_PORT, MCAST_ADDR) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/server.cpp:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf_[4 * BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/server.cpp:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname_[MAXHOSTNAMELEN];
data/ace-6.5.12+dfsg/examples/Reactor/Ntalker/ntalker.cpp:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/Aio_Platform_Test_C.cpp:32:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mb1 [BUFSIZ + 1];
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/Aio_Platform_Test_C.cpp:33:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mb2 [BUFSIZ + 1];
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/post_completions.cpp:145:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *proactor)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/post_completions.cpp:224:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  task1.open (&proactor1);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/post_completions.cpp:225:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  task2.open (&proactor2);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/simple_test_proactor.cpp:50:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/simple_test_proactor.cpp:98:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Simple_Tester::open (void)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/simple_test_proactor.cpp:103:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->input_file_ = ACE_OS::open (file,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/simple_test_proactor.cpp:109:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->dump_file_ = ACE_OS::open (dump_file,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/simple_test_proactor.cpp:116:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->rf_.open (*this, this->input_file_) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/simple_test_proactor.cpp:120:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->wf_.open (*this, this->dump_file_) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/simple_test_proactor.cpp:253:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (Simple_Tester.open () == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb.cpp:85:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->out_fd_ = open ("test_aio.log", O_RDWR | O_CREAT | O_TRUNC, 0666);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb_ace.cpp:90:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->out_fd_ = ACE_OS::open ("test_aio.log",
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiosig.cpp:33:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mb1 [BUFSIZ + 1];
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiosig.cpp:34:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mb2 [BUFSIZ + 1];
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiosig.cpp:227:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file_handle = open ("test_aiosig.cpp", O_RDONLY);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiosig_ace.cpp:305:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file_handle = ACE_OS::open ("test_aiosig_ace.cpp",
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.cpp:76:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Receiver::open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.cpp:87:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->rs_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.cpp:188:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.cpp:191:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        read_size = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.cpp:214:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_INET_Addr (port),
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.h:26:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_end_event_loop.cpp:50:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *timed_event_loop)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_end_event_loop.cpp:124:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (task1.open (0) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_end_event_loop.cpp:130:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (task2.open ((void *)&task2) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:76:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Receiver::open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:91:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->dump_file_ = ACE_OS::open (dump_file,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:103:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->wf_.open (*this,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:113:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->rs_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:284:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *host,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:373:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Sender::open (const ACE_TCHAR *host,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:380:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ACE_OS::open (file, GENERIC_READ | FILE_FLAG_OVERLAPPED);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:401:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ws_.open (*this) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:408:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->rf_.open (*this, this->input_file_) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:430:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ACE_OS::open (file, GENERIC_READ | FILE_FLAG_SEQUENTIAL_SCAN);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:438:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->tf_.open (*this) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:627:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:661:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if (acceptor.open (ACE_INET_Addr (port),
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:667:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (sender.open (host, port) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.h:20:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:118:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:187:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void Receiver::open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:196:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ws_.open (*this, this->handle_ ) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:203:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (this->rs_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:372:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *host, u_short port);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:439:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int Sender::open (const ACE_TCHAR *host, u_short port)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:456:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ws_.open (*this) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:463:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->rs_.open (*this) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:647:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nThreads = ACE_OS::atoi (get_opt.opt_arg ()) ;
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:650:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:653:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        duplex = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:706:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      Rc = acceptor.open (ACE_INET_Addr (port),0,1);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:711:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      Rc = sender.open (host, port);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:194:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:258:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Receiver::open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:266:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ws_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:270:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (this->rs_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:430:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *host, u_short port);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:495:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int Sender::open (const ACE_TCHAR *host, u_short port)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:511:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ws_.open (*this) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:518:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->rs_.open (*this) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:694:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        duplex = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:700:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:703:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:706:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        senders = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:711:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        max_aio_operations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:773:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (acceptor.open (ACE_INET_Addr (port),0,1) == 0)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:782:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (send_list[i]->open (host, port) == 0)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp:87:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->sock_dgram_.open (localAddr) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp:93:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->rd_.open (*this,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp:227:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *host, u_short port);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp:260:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Sender::open (const ACE_TCHAR *host,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp:265:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->sock_dgram_.open (ACE_INET_Addr::sap_any) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp:271:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->wd_.open (*this,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp:382:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp:410:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (sender.open (host, port) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/AcceptHandler.cpp:27:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int AcceptHandler::open(void) {
data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/AcceptHandler.cpp:34:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (mAcceptor.open(addr, 1) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/AcceptHandler.h:48:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int open(void);
data/ace-6.5.12+dfsg/examples/Reactor/TP_Reactor/server.cpp:49:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (acceptHandler->open() == -1) {
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Directory_Changes.cpp:85:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE file = ACE_OS::open (temp_file, _O_CREAT | _O_EXCL);
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Handle_Close.cpp:273:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = pipe1.open ();
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Handle_Close.cpp:276:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = pipe2.open ();
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Multithreading.cpp:60:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        concurrent_threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Multithreading.cpp:63:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Multithreading.cpp:66:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        number_of_handles = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Multithreading.cpp:69:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        interval = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Multithreading.cpp:72:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        number_of_handles_to_signal = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Network_Events.cpp:72:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char message[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:164:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void * =0);
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:240:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:295:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          port_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:310:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Peer_Handler::open (void *)
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:328:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((acceptor.open (local_addr) == -1) ||
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:335:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = this->rd_stream_.open (*this);
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:339:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = this->wr_stream_.open (*this);
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:455:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
STDIN_Handler::open (void *)
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:565:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_handler.open () == -1)
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:575:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (stdin_handler->open () == -1)
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/broadcast_client_test.cpp:36:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        broadcast_port_number = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_dgram_client_test.cpp:76:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (sc.open (ACE_UNIX_Addr (rendezvous_codgram),
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_dgram_client_test.cpp:81:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE handle = ACE_OS::open (file_name, O_RDONLY);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_dgram_client_test.cpp:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[ACE_MAX_USERID];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_fifo_client_test.cpp:69:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (fifo.open (rendezvous_fifo,
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_pipe_client_test.cpp:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_pipe_client_test.cpp:75:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE fd1 = ACE_OS::open (file_name, O_RDONLY);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_stream_client_test.cpp:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_stream_client_test.cpp:70:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = ACE_OS::open (file_name,
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_dgram_client_test.cpp:48:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          port_number = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_service_directory_test.cpp:41:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      port_number = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_service_directory_test.cpp:55:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_service_directory_test.cpp:59:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[BUFSIZ] = "help\n";
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_service_directory_test.cpp:75:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    ACE_OS::strcpy (buf, "reconfigure\n");
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_stream_client_test.cpp:52:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port_number = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_stream_client_test.cpp:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_stream_client_test.cpp:70:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (dc.open (sa, ACE_Addr::sap_any) == -1)
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_thr_stream_client_test.cpp:50:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port_number = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_thr_stream_client_test.cpp:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Broadcast.h:30:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_INET_Addr &r, int async = 0);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_CODgram.h:30:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_UNIX_Addr &suad, int async = 0);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Dgram.h:30:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_UNIX_Addr &suad, int async = 0);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_FIFO.h:29:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_TCHAR *rendezvous_fifo);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Pipe.cpp:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Pipe.h:32:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_UNIX_Addr &suap, int async = 0);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_SPIPE.h:30:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_SPIPE_Addr &rendezvous_spipe);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Stream.h:31:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_UNIX_Addr &suas, int async = 0);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Stream.h:39:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char login[ACE_MAX_USERID];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_R_Dgram.h:28:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_INET_Addr &r, int async = 0);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_R_Stream.h:30:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_INET_Addr &sia, int async = 0);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_R_Stream.h:38:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char login[ACE_MAX_USERID];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:73:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        local_addr.set (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:76:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:83:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->thr_strategy_.open (&this->thr_mgr_,
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:90:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (this->open (local_addr,
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:126:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
CLI_Stream<PR_ST_2>::open (void *)
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char login_name[ACE_MAX_USERID];
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.h:51:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/server_test.cpp:13:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_Service_Config::open (argc,
data/ace-6.5.12+dfsg/examples/Service_Configurator/Misc/Timer_Service.cpp:33:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      interval = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/Service_Configurator/Misc/Timer_Service.cpp:43:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      this->max_timeouts_ = ACE_OS::atoi (argv[2]);
data/ace-6.5.12+dfsg/examples/Service_Configurator/Misc/main.cpp:62:42:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int const result = ACE_Service_Config::open (args.argc (),
data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.cpp:127:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (this->slave_name_, "slave");
data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.cpp:136:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.cpp:165:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->max_msg_size_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.cpp:171:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->iteration_count_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.cpp:181:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->spawn_count_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.h:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char program_name_[MAXPATHLEN];
data/ace-6.5.12+dfsg/examples/Shared_Malloc/Options.h:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char slave_name_[MAXPATHLEN];
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_malloc.cpp:122:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char iterations[20];
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_malloc.cpp:123:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char msg_size[20];
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_malloc.cpp:125:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          ACE_OS::sprintf (iterations, "%lu",
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_malloc.cpp:128:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          ACE_OS::sprintf (msg_size, "%lu",
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char option[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:121:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                  ACE_OS::atoi (buf2));
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_position_independent_malloc.cpp:130:80:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          base_addr = reinterpret_cast<void *> (static_cast<intptr_t> (ACE_OS::atoi (get_opt.opt_arg ())));
data/ace-6.5.12+dfsg/examples/Shared_Memory/test_MM.cpp:47:15:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  if (ACE_OS::mkstemp (shm_key) == 0
data/ace-6.5.12+dfsg/examples/Synch/proc_sema.cpp:78:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          iteration = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Synch/proc_sema.cpp:81:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          exit_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/test.h:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  username_[9];
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/test.h:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  mtext_[MSGSZ];
data/ace-6.5.12+dfsg/examples/Threads/TSS_Task.h:29:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *arg);
data/ace-6.5.12+dfsg/examples/Threads/auto_event.cpp:81:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  work_time = argc == 2 ? ACE_OS::atoi (argv[1]) : 5;
data/ace-6.5.12+dfsg/examples/Threads/barrier1.cpp:56:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_threads = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_THREADS;
data/ace-6.5.12+dfsg/examples/Threads/barrier1.cpp:57:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_iterations = argc > 2 ? ACE_OS::atoi (argv[2]) : DEFAULT_ITERATIONS;
data/ace-6.5.12+dfsg/examples/Threads/barrier2.cpp:54:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *) { return 0; }
data/ace-6.5.12+dfsg/examples/Threads/barrier2.cpp:288:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_threads = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_THREADS;
data/ace-6.5.12+dfsg/examples/Threads/cancel.cpp:35:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  daemon.open (argv[0]);
data/ace-6.5.12+dfsg/examples/Threads/cancel.cpp:37:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_threads = argc > 1 ? ACE_OS::atoi (argv[1]) : DEFAULT_THREADS;
data/ace-6.5.12+dfsg/examples/Threads/cancel.cpp:39:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    argc > 2 ? ACE_OS::atoi (argv[2]) : DEFAULT_ITERATIONS;
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:61:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:197:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Scheduler::open (void *)
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:314:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  andres->open ();
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:316:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  peter->open ();
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:318:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  helmut->open ();
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:322:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  matias->open ();
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:57:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:195:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Scheduler::open (void *)
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:388:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          worker_a->open ();
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:389:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          worker_b->open ();
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:390:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          worker_c->open ();
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:456:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  worker_a->open ();
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:491:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  worker_a->open ();
data/ace-6.5.12+dfsg/examples/Threads/manual_event.cpp:87:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_threads = argc == 2 ? ACE_OS::atoi (argv[1]) : 5;
data/ace-6.5.12+dfsg/examples/Threads/process_manager.cpp:131:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Threads/process_manager.cpp:134:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        exit_code = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Threads/process_manager.cpp:169:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  daemon.open (argv[0]);
data/ace-6.5.12+dfsg/examples/Threads/process_manager.cpp:239:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_Process_Manager::instance ()->open (ACE_Process_Manager::DEFAULT_SIZE,
data/ace-6.5.12+dfsg/examples/Threads/process_mutex.cpp:27:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int iterations =  argc > 2 ? ACE_OS::atoi (argv[2]) : 100;
data/ace-6.5.12+dfsg/examples/Threads/process_semaphore.cpp:25:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int iterations =  argc > 2 ? ACE_OS::atoi (argv[2]) : 100;
data/ace-6.5.12+dfsg/examples/Threads/reader_writer.cpp:62:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_readers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Threads/reader_writer.cpp:65:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_writers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Threads/reader_writer.cpp:68:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Threads/reader_writer.cpp:71:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_loops = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Threads/reader_writer.cpp:161:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Threads/recursive_mutex.cpp:42:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Threads/recursive_mutex.cpp:45:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Threads/task_five.cpp:40:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void * = 0);
data/ace-6.5.12+dfsg/examples/Threads/task_five.cpp:56:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Test_Task::open (void *)
data/ace-6.5.12+dfsg/examples/Threads/task_five.cpp:119:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    task_array[i].open ();
data/ace-6.5.12+dfsg/examples/Threads/task_five.cpp:163:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size_t stack_size = argc > 1 ? ACE_OS::atoi (argv[1]) : default_stack_size;
data/ace-6.5.12+dfsg/examples/Threads/task_five.cpp:164:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int n_tasks = argc > 2 ? ACE_OS::atoi (argv[2]) : DEFAULT_TASKS;
data/ace-6.5.12+dfsg/examples/Threads/task_five.cpp:165:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_int iterations = argc > 3 ? ACE_OS::atoi (argv[3]) : DEFAULT_ITERATIONS;
data/ace-6.5.12+dfsg/examples/Threads/task_four.cpp:70:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = NULL);
data/ace-6.5.12+dfsg/examples/Threads/task_four.cpp:110:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Worker_Task::open (void *)
data/ace-6.5.12+dfsg/examples/Threads/task_four.cpp:198:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (worker_task[task]->open () == -1)
data/ace-6.5.12+dfsg/examples/Threads/task_four.cpp:260:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size_t n_tasks = argc > 1 ? ACE_OS::atoi (argv[1]) : DEFAULT_TASKS;
data/ace-6.5.12+dfsg/examples/Threads/task_four.cpp:261:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size_t n_threads = argc > 2 ? ACE_OS::atoi (argv[2]) : ACE_DEFAULT_THREADS;
data/ace-6.5.12+dfsg/examples/Threads/task_four.cpp:262:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size_t n_iterations = argc > 3 ? ACE_OS::atoi (argv[3]) : DEFAULT_ITERATIONS;
data/ace-6.5.12+dfsg/examples/Threads/task_one.cpp:80:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_threads = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_THREADS;
data/ace-6.5.12+dfsg/examples/Threads/task_one.cpp:81:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_iterations = argc > 2 ? ACE_OS::atoi (argv[2]) : DEFAULT_ITERATIONS;
data/ace-6.5.12+dfsg/examples/Threads/task_three.cpp:40:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/examples/Threads/task_three.cpp:80:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Test_Task::open (void *args)
data/ace-6.5.12+dfsg/examples/Threads/task_three.cpp:192:33:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((out_stream = ACE_OS::fopen ("test_task_three.out", "w")) == 0)
data/ace-6.5.12+dfsg/examples/Threads/task_three.cpp:216:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      t1[index].open (reactor1);
data/ace-6.5.12+dfsg/examples/Threads/task_three.cpp:217:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      t2[index].open (reactor2);
data/ace-6.5.12+dfsg/examples/Threads/task_two.cpp:34:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/examples/Threads/task_two.cpp:47:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Task_Test::open (void *)
data/ace-6.5.12+dfsg/examples/Threads/task_two.cpp:91:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  n_threads = argc > 1 ? ACE_OS::atoi (argv[1]) : default_threads;
data/ace-6.5.12+dfsg/examples/Threads/task_two.cpp:92:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_iterations = argc > 2 ? ACE_OS::atoi (argv[2]) : default_iterations;
data/ace-6.5.12+dfsg/examples/Threads/task_two.cpp:110:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          task_array[j]->open ();
data/ace-6.5.12+dfsg/examples/Threads/thread_manager.cpp:55:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  daemon.open (argv[0]);
data/ace-6.5.12+dfsg/examples/Threads/thread_manager.cpp:61:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_threads = argc > 1 ? ACE_OS::atoi (argv[1]) : DEFAULT_THREADS;
data/ace-6.5.12+dfsg/examples/Threads/thread_manager.cpp:63:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    argc > 2 ? ACE_OS::atoi (argv[2]) : DEFAULT_ITERATIONS;
data/ace-6.5.12+dfsg/examples/Threads/thread_pool.cpp:175:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          ACE_OS::sprintf (mb->rd_ptr (),
data/ace-6.5.12+dfsg/examples/Threads/thread_pool.cpp:238:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n_threads = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_THREADS;
data/ace-6.5.12+dfsg/examples/Threads/thread_pool.cpp:239:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  n_iterations = argc > 2 ? ACE_OS::atoi (argv[2]) : n_iterations;
data/ace-6.5.12+dfsg/examples/Threads/thread_specific.cpp:189:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int threads = argc > 1 ? ACE_OS::atoi (argv[1]) : 4;
data/ace-6.5.12+dfsg/examples/Threads/thread_specific.cpp:190:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  intptr_t count = argc > 2 ? ACE_OS::atoi (argv[2]) : 10000;
data/ace-6.5.12+dfsg/examples/Threads/token.cpp:66:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  My_Task tasks (argc > 1 ? ACE_OS::atoi (argv[1]) : 4);
data/ace-6.5.12+dfsg/examples/Threads/tss1.cpp:54:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/examples/Threads/tss1.cpp:79:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Tester<ACE_SYNCH_USE>::open (void *)
data/ace-6.5.12+dfsg/examples/Threads/tss1.cpp:114:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  tester.open ();
data/ace-6.5.12+dfsg/examples/Threads/tss2.cpp:104:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Test_Task::open (void *arg)
data/ace-6.5.12+dfsg/examples/Threads/tss2.cpp:115:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num_tasks = argc > 1 ? ACE_OS::atoi (argv[1]) : MAX_TASKS;
data/ace-6.5.12+dfsg/examples/Threads/tss2.cpp:133:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          task_arr[j]->open (task_arr[j]);
data/ace-6.5.12+dfsg/examples/Threads/wfmo.cpp:27:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/examples/Threads/wfmo.cpp:40:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
WFMO_Test::open (void *arg)
data/ace-6.5.12+dfsg/examples/Threads/wfmo.cpp:94:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    thread_count = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/examples/Threads/wfmo.cpp:96:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  wfmo_test.open ((void *) thread_count);
data/ace-6.5.12+dfsg/examples/Timer_Queue/Driver.cpp:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/examples/Web_Crawler/Mem_Map_Stream.cpp:137:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Mem_Map_Stream::open (STRAT_CONNECTOR *connector,
data/ace-6.5.12+dfsg/examples/Web_Crawler/Mem_Map_Stream.cpp:160:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->mem_map_.open (file.get_path_name (),
data/ace-6.5.12+dfsg/examples/Web_Crawler/Mem_Map_Stream.cpp:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ + 1];
data/ace-6.5.12+dfsg/examples/Web_Crawler/Mem_Map_Stream.h:64:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (STRAT_CONNECTOR *connector,
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:16:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:51:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->handle_limit_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:57:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->timeout_.sec (ACE_OS::atoi (getopt.opt_arg ()));
data/ace-6.5.12+dfsg/examples/Web_Crawler/Options.cpp:83:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        this->port_no_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:119:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      u_short port = (u_short) ACE_OS::atoi (port_number + 1); // Skip over ':'
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor.cpp:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line_buf[BUFSIZ + 1];
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor.cpp:83:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          url_status_ptr->status (ACE_OS::atoi (status.c_str ()));
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor.cpp:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host_name_buf[BUFSIZ + 1];
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor.cpp:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[BUFSIZ + 1];
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor.cpp:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char url_string[BUFSIZ + 1];
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor.cpp:302:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (url.stream ().open (this->strat_connector_,
data/ace-6.5.12+dfsg/examples/Web_Crawler/Web_Crawler.cpp:18:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Web_Crawler::open (int argc, ACE_TCHAR *argv[])
data/ace-6.5.12+dfsg/examples/Web_Crawler/Web_Crawler.h:45:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int argc, ACE_TCHAR *argv[]);
data/ace-6.5.12+dfsg/examples/Web_Crawler/main.cpp:36:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (crawler.open (argc, argv) == -1)
data/ace-6.5.12+dfsg/netsvcs/clients/Logger/direct_logging.cpp:19:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short logger_port  = argc > 1 ? ACE_OS::atoi (argv[1]) : LOGGER_PORT;
data/ace-6.5.12+dfsg/netsvcs/clients/Logger/direct_logging.cpp:76:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (0, ACE_Log_Msg::STDERR, 0);
data/ace-6.5.12+dfsg/netsvcs/clients/Logger/indirect_logging.cpp:15:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int iterations  = argc < 2 ? 10 : ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/netsvcs/clients/Logger/indirect_logging.cpp:21:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_LOG_MSG->open (prog_name, ACE_Log_Msg::LOGGER, logger_key) == -1)
data/ace-6.5.12+dfsg/netsvcs/clients/Logger/indirect_logging.cpp:25:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (ACE_LOG_MSG->open (prog_name, ACE_Log_Msg::STDERR | verbose) == -1)
data/ace-6.5.12+dfsg/netsvcs/clients/Logger/indirect_logging.cpp:52:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (0, ACE_Log_Msg::STDERR, 0);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:34:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Client_Test::open (void)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char option[BUFSIZ];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[BUFSIZ];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[BUFSIZ];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf3[BUFSIZ];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[1024];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:285:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return NAMING_CONTEXT ()->open (ACE_Naming_Context::PROC_LOCAL);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:295:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return NAMING_CONTEXT ()->open (ACE_Naming_Context::NODE_LOCAL);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.cpp:309:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return NAMING_CONTEXT ()->open (ACE_Naming_Context::NET_LOCAL);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/Client_Test.h:14:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void);
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/main.cpp:35:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (daemon.open (new_args.argc (),
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Client/main.cpp:60:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (test_body.open () == -1)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:30:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (ns_context_->open (ACE_Naming_Context::PROC_LOCAL) == -1)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:44:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (this->ns_context_->open (ACE_Naming_Context::NET_LOCAL) == -1)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char option[BUFSIZ];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[BUFSIZ];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:106:31:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      this->infile_ = ACE_OS::fopen(filename_, ACE_TEXT("r"));
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:217:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ns_context_->open (ACE_Naming_Context::PROC_LOCAL) == -1)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:244:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ns_context_->open (ACE_Naming_Context::NODE_LOCAL) == -1)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:275:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ns_context_->open (ACE_Naming_Context::NET_LOCAL) == -1)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.h:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename_[MAXPATHLEN + 1];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.h:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dump_filename_[MAXPATHLEN + 1];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/createfile.cpp:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/createfile.cpp:13:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((infile = ACE_OS::fopen (argv[1], "r")) == 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/createfile.cpp:16:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((outfile = ACE_OS::fopen (argv[2], "w")) == 0)
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/collection.cpp:86:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0], ACE_Log_Msg::STDERR); // | ACE_Log_Msg::VERBOSE);
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/collection.cpp:99:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          server_port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/collection.cpp:106:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/rw_locks.cpp:73:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0], ACE_Log_Msg::STDERR); // | ACE_Log_Msg::VERBOSE);
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/rw_locks.cpp:85:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          server_port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/rw_locks.cpp:88:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/rw_locks.cpp:91:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          reads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/collection/rw_locks.cpp:103:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/deadlock/deadlock_detection_test.cpp:162:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/deadlock/deadlock_detection_test.cpp:181:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          server_port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/deadlock/deadlock_detection_test.cpp:185:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:48:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int argc, char *argv[]);
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:102:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0], ACE_Log_Msg::STDERR);
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:115:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        server_port_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:144:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
STDIN_Token::open (int argc, char *argv[])
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tid[BUFSIZ];
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char token[BUFSIZ];
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type[16];
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operation[16];
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/manual/manual.cpp:352:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return st.open (argc, argv);
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/mutex/test_mutex.cpp:60:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0]);
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/mutex/test_mutex.cpp:69:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          spawn_count = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/mutex/test_mutex.cpp:76:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          server_port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/mutex/test_mutex.cpp:80:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/rw_lock/rw_locks.cpp:140:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (argv[0], ACE_Log_Msg::STDERR); // | ACE_Log_Msg::VERBOSE);
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/rw_lock/rw_locks.cpp:153:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          server_port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/rw_lock/rw_locks.cpp:157:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/rw_lock/rw_locks.cpp:163:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          reads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/clients/Tokens/rw_lock/rw_locks.cpp:172:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.cpp:45:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Client_Logging_Handler::open (void *)
data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.cpp:543:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_LOG_MSG->open (ACE_TEXT ("Client Logging Service")) == -1)
data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.cpp:557:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (LOGGING_ADDR (this->logger_key_)) == -1)
data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.cpp:659:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->server_port_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.h:61:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.cpp:22:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (ACE_TEXT ("Name Service"));
data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.cpp:31:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->naming_context()->open( this->naming_context()->name_options()->context() ) == -1)
data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.cpp:55:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (this->service_addr_,
data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.cpp:137:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Name_Handler::open (void * v)
data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.cpp:142:57:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_Svc_Handler<ACE_SOCK_STREAM, ACE_NULL_SYNCH>::open (0) == -1)
data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.h:66:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler_T.cpp:326:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (this->service_addr_,
data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler_T.cpp:364:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (ACE_TEXT ("Logging Service"), ACE_LOG_MSG->flags ());
data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler_T.cpp:373:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          service_port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler_T.cpp:414:51:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Server_Logging_Handler<LOG_MESSAGE_RECEIVER>::open (void *)
data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler_T.cpp:441:55:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_Thr_Server_Logging_Handler<LOG_MESSAGE_RECEIVER>::open (void *)
data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler_T.h:173:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void* = 0);
data/ace-6.5.12+dfsg/netsvcs/lib/Server_Logging_Handler_T.h:202:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Clerk_Handler.cpp:91:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_TS_Clerk_Handler::open (void *)
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Clerk_Handler.cpp:590:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->timeout_ = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Clerk_Handler.h:97:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Server_Handler.cpp:15:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (ACE_TEXT ("Time Service"));
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Server_Handler.cpp:24:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          service_port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Server_Handler.cpp:47:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (this->service_addr_, ACE_Reactor::instance (),
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Server_Handler.cpp:95:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ACE_TS_Server_Handler::open (void *)
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Server_Handler.cpp:114:57:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_Svc_Handler<ACE_SOCK_STREAM, ACE_NULL_SYNCH>::open (0) == -1)
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Server_Handler.h:44:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/netsvcs/lib/Token_Handler.cpp:15:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (ACE_TEXT ("Token Service"));
data/ace-6.5.12+dfsg/netsvcs/lib/Token_Handler.cpp:24:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          svc_port = static_cast<u_short> (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/netsvcs/lib/Token_Handler.cpp:48:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (this->service_addr_, ACE_Reactor::instance (),
data/ace-6.5.12+dfsg/netsvcs/lib/Token_Handler.cpp:540:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->open (m.name (), m.ignore_deadlock_, m.debug_);
data/ace-6.5.12+dfsg/netsvcs/lib/Token_Handler.cpp:584:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->open (r.name (), r.ignore_deadlock_, r.debug_);
data/ace-6.5.12+dfsg/netsvcs/lib/Token_Handler.cpp:629:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->open (w.name (), w.ignore_deadlock_, w.debug_);
data/ace-6.5.12+dfsg/netsvcs/servers/main.cpp:23:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_Service_Config::open (argc, argv, ACE_DEFAULT_LOGGER_KEY, 1, 0, 1) == -1)
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Channel.cpp:255:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf,this->leftovers_.rd_ptr(), result);
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Channel.cpp:358:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf,this->leftovers_.rd_ptr(), result);
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Channel.cpp:388:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf,this->leftovers_.rd_ptr(), result);
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Channel.cpp:425:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              ACE_OS::memcpy (iov[i].iov_base,this->leftovers_.rd_ptr(), n);
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Channel.cpp:432:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              iov2[ndx].iov_base = (char *)iov[i].iov_base + n;
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Channel.cpp:466:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (io_vec->iov_base,
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Environment.cpp:101:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    heap->open();
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Environment.cpp:103:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (heap->open (persistent_file) != 0)
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.cpp:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char remote_host[ACE_MAX_FULLY_QUALIFIED_NAME_LEN + 1];
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.cpp:98:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char datalenstr[20];
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Outside_Squid_Filter.cpp:169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char datalenstr[20];
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Stream.cpp:176:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        msg->copy ((const char *)iov[i].iov_base,iov[i].iov_len);
data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_ClientRequestHandler.cpp:519:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if (acceptor.open (data_addr) == 0 &&
data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_ClientRequestHandler.cpp:669:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ip_buf[128];
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_Session.cpp:151:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            new_connection->open (); // mark stream handler as connected
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Request.cpp:66:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[16];
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Status.cpp:90:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        Code istat = (Code)ACE_OS::atoi (status.c_str ());
data/ace-6.5.12+dfsg/protocols/ace/INet/HeaderBase.cpp:43:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[32];
data/ace-6.5.12+dfsg/protocols/ace/INet/INet_Log.cpp:41:43:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE* output_stream = ACE_OS::fopen (filename.c_str (), ACE_TEXT ("a"));
data/ace-6.5.12+dfsg/protocols/ace/INet/INet_Log.cpp:53:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                output_stream->open (ACE_TEXT_ALWAYS_CHAR (filename.c_str ()),
data/ace-6.5.12+dfsg/protocols/ace/INet/StreamHandler.cpp:51:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int StreamHandler<ACE_PEER_STREAM, ACE_SYNCH_USE>::open (void * /*p*/)
data/ace-6.5.12+dfsg/protocols/ace/INet/StreamHandler.cpp:77:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[MAX_INPUT_SIZE];
data/ace-6.5.12+dfsg/protocols/ace/INet/StreamHandler.h:57:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              virtual int open (void * = 0);
data/ace-6.5.12+dfsg/protocols/ace/INet/URLBase.cpp:145:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    URLStream URL_Base::open () const
data/ace-6.5.12+dfsg/protocols/ace/INet/URLBase.cpp:157:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    URLStream URL_Base::open (ClientRequestHandler& rh) const
data/ace-6.5.12+dfsg/protocols/ace/INet/URLBase.h:98:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              virtual URLStream open () const;
data/ace-6.5.12+dfsg/protocols/ace/INet/URLBase.h:100:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              virtual URLStream open (ClientRequestHandler& rh) const;
data/ace-6.5.12+dfsg/protocols/ace/RMCast/Protocol.h:579:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy (buf_, buf, size_);
data/ace-6.5.12+dfsg/protocols/ace/RMCast/Protocol.h:608:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy (buf_, d.buf_, size_);
data/ace-6.5.12+dfsg/protocols/ace/RMCast/Reassemble.cpp:56:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (new_data->buf () + new_data->size (),
data/ace-6.5.12+dfsg/protocols/ace/RMCast/Socket.cpp:223:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (buf, d->buf (), r);
data/ace-6.5.12+dfsg/protocols/ace/RMCast/Socket.cpp:281:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          signal_pipe_.open ();
data/ace-6.5.12+dfsg/protocols/ace/TMCast/Group.cpp:249:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[Protocol::MAX_MESSAGE_SIZE];
data/ace-6.5.12+dfsg/protocols/ace/TMCast/Group.cpp:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id_[Protocol::MEMBER_ID_LENGTH];
data/ace-6.5.12+dfsg/protocols/ace/TMCast/Group.cpp:431:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            ACE_OS::memcpy (msg, data->payload (), data->size ());
data/ace-6.5.12+dfsg/protocols/ace/TMCast/LinkListener.hpp:26:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&header_, header, sizeof (Protocol::MessageHeader));
data/ace-6.5.12+dfsg/protocols/ace/TMCast/LinkListener.hpp:27:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (payload_, payload, size_);
data/ace-6.5.12+dfsg/protocols/ace/TMCast/LinkListener.hpp:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char payload_[Protocol::MAX_MESSAGE_SIZE];
data/ace-6.5.12+dfsg/protocols/ace/TMCast/LinkListener.hpp:101:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[Protocol::MAX_MESSAGE_SIZE];
data/ace-6.5.12+dfsg/protocols/ace/TMCast/Protocol.hpp:14:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char id[MEMBER_ID_LENGTH];
data/ace-6.5.12+dfsg/protocols/ace/TMCast/TransactionController.hpp:25:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (payload_, msg, size_);
data/ace-6.5.12+dfsg/protocols/ace/TMCast/TransactionController.hpp:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char payload_[Protocol::MAX_PAYLOAD_SIZE];
data/ace-6.5.12+dfsg/protocols/ace/TMCast/TransactionController.hpp:56:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (payload_, msg, size_);
data/ace-6.5.12+dfsg/protocols/ace/TMCast/TransactionController.hpp:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char payload_[Protocol::MAX_PAYLOAD_SIZE];
data/ace-6.5.12+dfsg/protocols/ace/TMCast/TransactionController.hpp:188:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          ACE_OS::memcpy (payload, send_->payload (), size);
data/ace-6.5.12+dfsg/protocols/examples/INet/FTP_Simple_exec.cpp:83:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[80] = {0};
data/ace-6.5.12+dfsg/protocols/examples/INet/FTP_Simple_exec.cpp:178:44:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ACE::INet::URLStream urlin = ftp_url.open (my_rh);
data/ace-6.5.12+dfsg/protocols/examples/INet/HTTP_Simple_exec.cpp:67:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          proxy_port = (u_short)ACE_OS::atoi (ACE_TEXT_ALWAYS_CHAR (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/protocols/examples/INet/HTTP_Simple_exec.cpp:234:45:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ACE::INet::URLStream urlin = http_url.open (my_rh);
data/ace-6.5.12+dfsg/protocols/examples/TMCast/Member/member.cpp:37:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      for (char buffer[256];;)
data/ace-6.5.12+dfsg/protocols/examples/TMCast/Member/member.cpp:46:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[256];
data/ace-6.5.12+dfsg/protocols/examples/TMCast/Member/member.cpp:60:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        ACE_OS::sprintf (buffer, "message # %lu", i);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/client.cpp:29:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        remote_port = static_cast<unsigned>(ACE_OS::atoi (get_opts.opt_arg()));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/client.cpp:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1000];
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/client.cpp:110:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      ACE_OS::sprintf (buffer,"Do you hear me? %d",i);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/server.cpp:38:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = static_cast<unsigned>(ACE_OS::atoi (get_opts.opt_arg()));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/server.cpp:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1000];
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/server.cpp:243:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *f = ACE_OS::fopen (notifier_file,ACE_TEXT("w+"));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:79:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (program, ACE_Log_Msg::OSTREAM | ACE_Log_Msg::VERBOSE_LITE); \
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:93:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (program, ACE_Log_Msg::OSTREAM | ACE_Log_Msg::VERBOSE_LITE); \
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:101:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_LOG_MSG->open (program, ACE_Log_Msg::OSTREAM | ACE_Log_Msg::VERBOSE_LITE); \
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:123:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd_init_log = ACE_OS::open (temp, \
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:226:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE fd = ACE_OS::open (temp,
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:248:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->output_file_->open (ACE_TEXT_ALWAYS_CHAR (temp),
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/test_config.h:258:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->output_file_ = ACE_OS::fopen (temp, fmode);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/client.cpp:28:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        remote_port = static_cast<unsigned>(ACE_OS::atoi (get_opts.opt_arg()));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/client.cpp:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[Send_Size];
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/server.cpp:33:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = static_cast<unsigned>(ACE_OS::atoi (get_opts.opt_arg()));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/server.cpp:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[5000];
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/server.cpp:75:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *f = ACE_OS::fopen (notifier_file,ACE_TEXT("w+"));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/server.cpp:146:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  ACE_OS::strcpy (buffer,"I hear you !");
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Recv_Tests/client.cpp:54:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        remote_port = static_cast<unsigned>(ACE_OS::atoi (get_opts.opt_arg()));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Recv_Tests/server.cpp:64:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = static_cast<unsigned>(ACE_OS::atoi (get_opts.opt_arg()));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Recv_Tests/server.cpp:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname[BUFSIZ];
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Recv_Tests/server.cpp:104:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (addr) == -1
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Recv_Tests/server.cpp:116:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *f = ACE_OS::fopen (notifier_file,ACE_TEXT("w+"));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/client.cpp:31:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        remote_port = static_cast<unsigned>(ACE_OS::atoi (get_opts.opt_arg()));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/client.cpp:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1000];
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/client.cpp:109:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      ACE_OS::sprintf (buffer, "Do you hear me? %d", i);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/server.cpp:33:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = static_cast<unsigned>(ACE_OS::atoi (get_opts.opt_arg()));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/server.cpp:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1000];
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/server.cpp:74:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *f = ACE_OS::fopen (notifier_file,ACE_TEXT("w+"));
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/server.cpp:149:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      ACE_OS::sprintf (buffer,"I hear you %d",i);
data/ace-6.5.12+dfsg/protocols/tests/INet/MT_Get/Main.cpp:66:45:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ACE::INet::URLStream urlin = http_url.open (rh);
data/ace-6.5.12+dfsg/protocols/tests/INet/MT_Get/Main.cpp:200:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      http_url.open (rh);
data/ace-6.5.12+dfsg/tests/ARGV_Test.cpp:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *argv[20];
data/ace-6.5.12+dfsg/tests/ARGV_Test.cpp:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *save_argv[20];
data/ace-6.5.12+dfsg/tests/ARGV_Test.cpp:77:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (save_argv, argv, sizeof (argv));
data/ace-6.5.12+dfsg/tests/ARGV_Test.cpp:121:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (save_argv, argv, sizeof (argv));
data/ace-6.5.12+dfsg/tests/Auto_Event_Test.cpp:126:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_workers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Auto_Event_Test.cpp:129:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Based_Pointer_Test.cpp:100:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int retval = dll.open (dll_file.c_str (),
data/ace-6.5.12+dfsg/tests/Based_Pointer_Test.cpp:334:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    size_t size= (char *) pool_base[ 0 ] - (char *) pool_base[ 1 ];
data/ace-6.5.12+dfsg/tests/Based_Pointer_Test.cpp:334:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    size_t size= (char *) pool_base[ 0 ] - (char *) pool_base[ 1 ];
data/ace-6.5.12+dfsg/tests/Based_Pointer_Test.cpp:335:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    size_t tmpsize= (char *) pool_base[ 1 ] - (char *) pool_base[ 2 ];
data/ace-6.5.12+dfsg/tests/Based_Pointer_Test.cpp:335:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    size_t tmpsize= (char *) pool_base[ 1 ] - (char *) pool_base[ 2 ];
data/ace-6.5.12+dfsg/tests/Bound_Ptr_Test.cpp:272:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Scheduler::open (void *)
data/ace-6.5.12+dfsg/tests/Bound_Ptr_Test.cpp:449:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (scheduler->open () == -1)
data/ace-6.5.12+dfsg/tests/Bound_Ptr_Test.h:55:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/tests/Buffer_Stream_Test.cpp:48:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Buffer_Stream_Test.cpp:91:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Common_Task::open (void *)
data/ace-6.5.12+dfsg/tests/Buffer_Stream_Test.cpp:128:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char d[2];
data/ace-6.5.12+dfsg/tests/Bug_1576_Regression_Test.cpp:24:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = dll.open (dll_name);
data/ace-6.5.12+dfsg/tests/Bug_1890_Regression_Test.cpp:37:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int open(ACE_Reactor * reactor);
data/ace-6.5.12+dfsg/tests/Bug_1890_Regression_Test.cpp:71:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int open(ACE_Reactor * reactor);
data/ace-6.5.12+dfsg/tests/Bug_1890_Regression_Test.cpp:112:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == timer->open (&reactor))
data/ace-6.5.12+dfsg/tests/Bug_1890_Regression_Test.cpp:142:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Handler::open (ACE_Reactor * r)
data/ace-6.5.12+dfsg/tests/Bug_1890_Regression_Test.cpp:144:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == the_pipe_.open (handles_))
data/ace-6.5.12+dfsg/tests/Bug_1890_Regression_Test.cpp:194:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Timer::open (ACE_Reactor * r)
data/ace-6.5.12+dfsg/tests/Bug_1890_Regression_Test.cpp:201:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (-1 == handler_[i].open (r))
data/ace-6.5.12+dfsg/tests/Bug_2497_Regression_Test.cpp:41:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      this->open( ACE_TEXT("Test module"),
data/ace-6.5.12+dfsg/tests/Bug_2540_Regression_Test.cpp:37:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int open(ACE_Reactor * reactor);
data/ace-6.5.12+dfsg/tests/Bug_2540_Regression_Test.cpp:75:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int open(ACE_Reactor * reactor);
data/ace-6.5.12+dfsg/tests/Bug_2540_Regression_Test.cpp:120:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == timer->open (&reactor))
data/ace-6.5.12+dfsg/tests/Bug_2540_Regression_Test.cpp:149:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int Handler::open(ACE_Reactor * r)
data/ace-6.5.12+dfsg/tests/Bug_2540_Regression_Test.cpp:151:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if(-1 == the_pipe_.open(handles_))
data/ace-6.5.12+dfsg/tests/Bug_2540_Regression_Test.cpp:209:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int Timer::open(ACE_Reactor * r)
data/ace-6.5.12+dfsg/tests/Bug_2540_Regression_Test.cpp:216:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (-1 == handler_[i].open(r))
data/ace-6.5.12+dfsg/tests/Bug_2609_Regression_Test.cpp:48:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void* pv)
data/ace-6.5.12+dfsg/tests/Bug_2609_Regression_Test.cpp:55:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return super::open (pv);
data/ace-6.5.12+dfsg/tests/Bug_2609_Regression_Test.cpp:115:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &)))
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:69:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (0 != this->other_pipe_.open () || 0 != this->pipe_.open())
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:69:58:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (0 != this->other_pipe_.open () || 0 != this->pipe_.open())
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:46:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void* factory);
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:71:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void* factory);
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:97:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ClientSvcHandler::open (void* factory)
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:103:57:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_Svc_Handler<ACE_SOCK_STREAM, ACE_NULL_SYNCH>::open (factory) == 0)
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ACE_DEFAULT_MAX_SOCKET_BUFSIZ];
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:217:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ServerSvcHandler::open (void* factory)
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:222:60:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACE_Svc_Handler<ACE_SOCK_STREAM, ACE_NULL_SYNCH>::open (factory);
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:231:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[ACE_DEFAULT_MAX_SOCKET_BUFSIZ];
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:342:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &), &reactor) == -1
data/ace-6.5.12+dfsg/tests/Bug_2975_Regression_Test.cpp:43:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ret = ACE_Service_Config::open(args.argc(), args.argv(),
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:93:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&capi_init, &temp, sizeof (temp));
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&capi_fini, &temp, sizeof (temp));
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:109:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&capi_dosomething, &temp, sizeof (temp));
data/ace-6.5.12+dfsg/tests/Bug_3319_Regression_Test.cpp:22:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int ret = ACE_Service_Config::open(args.argc(), args.argv(),
data/ace-6.5.12+dfsg/tests/Bug_3334_Regression_Test.cpp:32:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((status = ACE_Service_Config::open (3,
data/ace-6.5.12+dfsg/tests/Bug_3432_Regression_Test.cpp:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lBuffer[128];
data/ace-6.5.12+dfsg/tests/Bug_3532_Regression_Test.cpp:18:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Buffer[10];
data/ace-6.5.12+dfsg/tests/Bug_3532_Regression_Test.cpp:23:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* pFile = ACE_OS::fopen(ACE_TEXT("OneByteFile"), ACE_TEXT("wb"));
data/ace-6.5.12+dfsg/tests/Bug_3532_Regression_Test.cpp:29:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    pFile = ACE_OS::fopen(ACE_TEXT("OneByteFile"), ACE_TEXT("rb"));
data/ace-6.5.12+dfsg/tests/Bug_3878_Regression_Test.cpp:69:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy (&msgId, mb->rd_ptr (), sizeof(int));
data/ace-6.5.12+dfsg/tests/Bug_3878_Regression_Test.cpp:199:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf [65];
data/ace-6.5.12+dfsg/tests/Bug_3878_Regression_Test.cpp:256:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (mb->wr_ptr (), &i, sizeof(int));
data/ace-6.5.12+dfsg/tests/Bug_3912_Regression_Test.cpp:64:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  status = ACE_Service_Config::open (argc,
data/ace-6.5.12+dfsg/tests/Bug_3943_Regression_Test.cpp:223:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    virtual int open (void *);
data/ace-6.5.12+dfsg/tests/Bug_3943_Regression_Test.cpp:307:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Svc_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/Bug_3943_Regression_Test.cpp:791:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFFER_SIZE+1];
data/ace-6.5.12+dfsg/tests/Bug_3943_Regression_Test.cpp:795:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expectedBuffer[EXPECTED_BUFFER_SIZE];
data/ace-6.5.12+dfsg/tests/Bug_3943_Regression_Test.cpp:1113:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &)) == -1
data/ace-6.5.12+dfsg/tests/Bug_4189_Regression_Test.cpp:31:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (sock1.open(ACE_INET_Addr(UDP_PORT),PF_INET,0,1) != 0)
data/ace-6.5.12+dfsg/tests/CDR_Array_Test.cpp:289:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char digits[16] = {
data/ace-6.5.12+dfsg/tests/CDR_Array_Test.cpp:555:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                static char rs[32 + 1];
data/ace-6.5.12+dfsg/tests/CDR_Array_Test.cpp:616:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static char rs[32 + 1];
data/ace-6.5.12+dfsg/tests/CDR_Array_Test.cpp:617:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static char cs[32 + 1];
data/ace-6.5.12+dfsg/tests/CDR_Array_Test.cpp:930:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              int v = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/CDR_Fixed_Test.cpp:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[Fixed::MAX_STRING_SIZE];                                  \
data/ace-6.5.12+dfsg/tests/CDR_Test.cpp:869:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            n = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/CDR_Test.cpp:872:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nloops = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cache_Map_Manager_Test.cpp:493:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cache_Map_Manager_Test.cpp:496:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        no_of_lookups = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cache_Map_Manager_Test.cpp:499:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        randomize_lookups = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cache_Map_Manager_Test.cpp:502:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        purge_percent = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:54:52:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Accept_Strategy<SVC_HANDLER, ACE_PEER_ACCEPTOR_2>::open (const ACE_PEER_ACCEPTOR_ADDR &local_addr,
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:57:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = ACCEPT_STRATEGY_BASE::open (local_addr, restart);
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:70:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ACCEPT_STRATEGY_BASE::open (local_addr, restart);
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:139:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Client_Svc_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:166:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Server_Svc_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:268:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    listen_one_time_acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &),
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:303:46:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (listen_multiple_times_acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &),
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:391:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        listen_once = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:394:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:398:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        purge_percentage = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.cpp:414:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        keep_handles_available = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.h:33:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *v = 0);
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.h:42:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *v = 0);
data/ace-6.5.12+dfsg/tests/Cached_Accept_Conn_Test.h:113:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_PEER_ACCEPTOR_ADDR &local_addr,
data/ace-6.5.12+dfsg/tests/Cached_Allocator_Test.cpp:73:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char MEMBLOCK[8];
data/ace-6.5.12+dfsg/tests/Cached_Allocator_Test.cpp:143:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    loops = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/tests/Cached_Allocator_Test.cpp:216:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (ptr1, str1, chunk_size);
data/ace-6.5.12+dfsg/tests/Cached_Allocator_Test.cpp:221:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (ptr3, str3, chunk_size);
data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.cpp:108:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Svc_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.cpp:253:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (0 != listen_one_time_acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &)))
data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.cpp:284:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &)) == -1)
data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.cpp:367:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        listen_once = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.cpp:370:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.cpp:374:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        purge_percentage = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.cpp:390:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        keep_handles_available = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Cached_Conn_Test.h:25:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *v = 0);
data/ace-6.5.12+dfsg/tests/Capabilities_Test.cpp:72:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE fd = ACE_OS::open (config,
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:344:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((status = cf.open ()) != 0)
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:570:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (heap_config.open () != 0)
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:575:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (heap_config.open () == 0)
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:612:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (pers_config.open (ACE_TEXT ("test.reg")))
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:617:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (pers_config.open (ACE_TEXT ("test.reg")) == 0)
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:631:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (pers_config.open () == 0)
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:780:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((heap1.open ()) != 0)
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:787:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if ((heap2.open ()) != 0)
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1191:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  rc = original.open ();
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1221:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  rc = fromFile.open ();
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1371:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  rc = original.open ();
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1401:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  rc = fromFile.open ();
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1510:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  IntegerValue = ACE_OS::atoi (pszString);
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:113:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Svc_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:624:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char *[n_servers],
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:726:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_clients = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:729:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_client_iterations = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:732:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_servers = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Conn_Test.cpp:742:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &)) == -1
data/ace-6.5.12+dfsg/tests/Conn_Test.h:42:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/tests/DLL_Test.cpp:70:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int retval = dll.open (dll_file.c_str());
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Echo_Test.cpp:44:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Echo_Test.cpp:94:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Client::open (void *)
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Echo_Test.cpp:166:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Echo_Test.cpp:246:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Echo_Test.cpp:512:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (client.open (&reactor, flags) != 0)
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Echo_Test.cpp:530:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (server.open (addr, &reactor, flags) != 0)
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Test.cpp:50:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Test.cpp:96:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Client::open (void *)
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Test.cpp:117:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[BUFSIZ] = { 0 };
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Test.cpp:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ+1] = { 0 };    // Insure a trailing nul
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Test.cpp:507:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (server.open (addr, &reactor, flags) != 0)
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Test.cpp:562:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (client.open (&reactor, flags) != 0)
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:66:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int status = sds.open (test_dir, selector, comparator);
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:111:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  status = ds.open (test_dir);
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:163:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (dir.open (TestDir.c_str ()) == -1)
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:221:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (dir.open (ACE_TEXT (".")) == -1)
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:44:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (fifo.open (fifo_path) == -1)
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:57:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char big[big_size];
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:196:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == read_side.open (fifo_path,
data/ace-6.5.12+dfsg/tests/FlReactor_Test.cpp:134:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/tests/FlReactor_Test.cpp:165:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Connection_Handler::open (void*)
data/ace-6.5.12+dfsg/tests/FlReactor_Test.cpp:177:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static char msg[256];
data/ace-6.5.12+dfsg/tests/FlReactor_Test.cpp:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/FlReactor_Test.cpp:247:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (address, &r) == -1)
data/ace-6.5.12+dfsg/tests/FlReactor_Test.cpp:260:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[2 * bufsiz];
data/ace-6.5.12+dfsg/tests/Framework_Component_Test.cpp:65:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_Service_Config::open (ACE_TEXT ("Framework_Component_Test"),
data/ace-6.5.12+dfsg/tests/Future_Set_Test.cpp:62:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/tests/Future_Set_Test.cpp:255:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Prime_Scheduler::open (void *)
data/ace-6.5.12+dfsg/tests/Future_Set_Test.cpp:387:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = andres->open ();
data/ace-6.5.12+dfsg/tests/Future_Set_Test.cpp:392:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = peter->open ();
data/ace-6.5.12+dfsg/tests/Future_Set_Test.cpp:397:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = helmut->open ();
data/ace-6.5.12+dfsg/tests/Future_Set_Test.cpp:405:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = matias->open ();
data/ace-6.5.12+dfsg/tests/Future_Test.cpp:68:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/tests/Future_Test.cpp:261:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Prime_Scheduler::open (void *)
data/ace-6.5.12+dfsg/tests/Future_Test.cpp:387:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = andres->open ();
data/ace-6.5.12+dfsg/tests/Future_Test.cpp:392:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = peter->open ();
data/ace-6.5.12+dfsg/tests/Future_Test.cpp:397:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = helmut->open ();
data/ace-6.5.12+dfsg/tests/Future_Test.cpp:405:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = matias->open ();
data/ace-6.5.12+dfsg/tests/Handle_Set_Test.cpp:204:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    ? ACE_OS::atoi (argv[1])
data/ace-6.5.12+dfsg/tests/Handle_Set_Test.cpp:208:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    ? ACE_OS::atoi (argv[2])
data/ace-6.5.12+dfsg/tests/Handle_Set_Test.cpp:212:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    ? ACE_OS::atoi (argv[3])
data/ace-6.5.12+dfsg/tests/Hash_Map_Bucket_Iterator_Test.cpp:35:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        table_size = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Hash_Map_Bucket_Iterator_Test.cpp:38:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Hash_Map_Manager_Test.cpp:111:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  status = hash.open (chunks, &table_alloc_small, &entry_alloc);
data/ace-6.5.12+dfsg/tests/Hash_Map_Manager_Test.cpp:129:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  status = hash.open (chunks, &table_alloc, &entry_alloc);
data/ace-6.5.12+dfsg/tests/High_Res_Timer_Test.cpp:117:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          iterations = ACE_OS::atoi (getoptarg.opt_arg ());
data/ace-6.5.12+dfsg/tests/INET_Addr_Test.cpp:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[256];
data/ace-6.5.12+dfsg/tests/INET_Addr_Test.cpp:308:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostaddr[1024];
data/ace-6.5.12+dfsg/tests/INET_Addr_Test.cpp:431:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char local_host_name[1024];
data/ace-6.5.12+dfsg/tests/IOStream_Test.cpp:339:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/IOStream_Test.cpp:411:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &)) == -1)
data/ace-6.5.12+dfsg/tests/Log_Msg_Backend_Test.cpp:28:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (const ACE_TCHAR *logger_key);
data/ace-6.5.12+dfsg/tests/Log_Msg_Backend_Test.cpp:50:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Backend::open (const ACE_TCHAR *)
data/ace-6.5.12+dfsg/tests/Log_Msg_Backend_Test.cpp:116:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == ACE_LOG_MSG->open (ACE_TEXT ("Log_Msg_Backend_Test"), flags))
data/ace-6.5.12+dfsg/tests/Log_Msg_Test.cpp:209:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_LOG_MSG->open (program) == -1)
data/ace-6.5.12+dfsg/tests/Log_Msg_Test.cpp:229:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_OS::open (badname,
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:149:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      stream = ACE_OS::fopen (backup_ct, ACE_TEXT ("r"));
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:329:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          interval_time = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:338:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          max_size_files = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Logging_Strategy_Test.cpp:349:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          max_num_files = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:83:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Echo_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:260:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (server_addr,
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:344:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (server_addr,
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:469:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              iport = ACE_OS::atoi (opts.opt_arg ());
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.h:40:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/tests/MM_Shared_Memory_Test.cpp:83:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = shm_child.open (shm_key);
data/ace-6.5.12+dfsg/tests/MM_Shared_Memory_Test.cpp:108:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = shm_parent.open (shm_key, SHMSZ);
data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp:66:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *);
data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp:81:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Svc_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp:143:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    this->base_connector_.open (&this->reactor_,
data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp:286:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_select_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp:289:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_tp_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp:292:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_wfmo_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp:295:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_dev_poll_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp:298:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          number_of_threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_NonBlocking_Connect_Test.cpp:301:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          debug = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reactor_Timer_Test.cpp:157:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->pipe_.open () == -1)
data/ace-6.5.12+dfsg/tests/MT_Reactor_Upcall_Test.cpp:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[BUFSIZ];
data/ace-6.5.12+dfsg/tests/MT_Reactor_Upcall_Test.cpp:85:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = this->pipe_.open ();
data/ace-6.5.12+dfsg/tests/MT_Reactor_Upcall_Test.cpp:288:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reactor_Upcall_Test.cpp:292:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reactor_Upcall_Test.cpp:296:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reactor_Upcall_Test.cpp:300:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:146:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void);
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:157:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Pipe::open (void)
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:167:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_Addr::sap_any) == -1
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:463:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[message_size + 1];
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:588:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        pipe.open ();
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1336:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_select_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1339:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_tp_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1342:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_wfmo_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1345:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_dev_poll_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1348:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          number_of_connections = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1351:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          close_timeout = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1354:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          make_invocations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1357:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          run_event_loop_thread = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1360:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          run_purger_thread = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1363:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          run_receiver_thread = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1366:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          nested_upcalls = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Event_Handler_Test.cpp:1369:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          debug = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Notify_Test.cpp:322:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_select_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Notify_Test.cpp:325:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_tp_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Notify_Test.cpp:328:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_wfmo_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Notify_Test.cpp:331:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_dev_poll_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Notify_Test.cpp:334:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_empty_notify = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Notify_Test.cpp:337:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_simple_notify = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Notify_Test.cpp:340:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_reference_counted_notify = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_Reference_Counted_Notify_Test.cpp:343:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          debug = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/MT_SOCK_Test.cpp:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1];
data/ace-6.5.12+dfsg/tests/MT_SOCK_Test.cpp:176:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/MT_SOCK_Test.cpp:315:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (ACE_Addr::sap_any, 0, PF_UNSPEC, BACKLOG) == -1
data/ace-6.5.12+dfsg/tests/Malloc_Test.cpp:261:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *small_buf[1024];
data/ace-6.5.12+dfsg/tests/Manual_Event_Test.cpp:60:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_workers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Map_Manager_Test.cpp:916:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    table_size = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/tests/Map_Manager_Test.cpp:919:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    iterations = ACE_OS::atoi (argv[2]);
data/ace-6.5.12+dfsg/tests/Map_Manager_Test.cpp:922:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    test_iterators = ACE_OS::atoi (argv[3]);
data/ace-6.5.12+dfsg/tests/Map_Test.cpp:57:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&original_keys[i][0],
data/ace-6.5.12+dfsg/tests/Map_Test.cpp:99:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy (&original_value,
data/ace-6.5.12+dfsg/tests/Map_Test.cpp:138:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        ACE_OS::memcpy (&original_value,
data/ace-6.5.12+dfsg/tests/Map_Test.cpp:268:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    functionality_tests = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/tests/Map_Test.cpp:271:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    table_size = ACE_OS::atoi (argv[2]);
data/ace-6.5.12+dfsg/tests/Map_Test.cpp:274:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    iterations = ACE_OS::atoi (argv[3]);
data/ace-6.5.12+dfsg/tests/Map_Test.h:59:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&key[original_size],
data/ace-6.5.12+dfsg/tests/Map_Test.h:81:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ACE_OS::memcpy (&value,
data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test.cpp:41:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    this->open (addr);
data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test.cpp:52:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
My_Accept_Handler::open (ACE_INET_Addr &addr)
data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test.cpp:55:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->peer_acceptor_.open (addr, 1) == -1)
data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test.h:33:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_INET_Addr &addr);
data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test_IPV6.cpp:35:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    this->open (addr);
data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test_IPV6.cpp:46:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
My_Accept_Handler::open (ACE_INET_Addr &addr)
data/ace-6.5.12+dfsg/tests/Max_Default_Port_Test_IPV6.cpp:49:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->peer_acceptor_.open (addr, 1) == -1)
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:71:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  mmap_4_open.open (filename, O_RDWR | O_CREAT | O_TRUNC, ACE_DEFAULT_FILE_PERMS);
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:74:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE file_handle = ACE_OS::open (filename,
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:186:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  mmap_4_open.open(temp_file1,
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:191:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE temp_file_handle = ACE_OS::open (temp_file1,
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:222:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  mmap_4_open.open(temp_file2,
data/ace-6.5.12+dfsg/tests/Mem_Map_Test.cpp:227:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  temp_file_handle = ACE_OS::open (temp_file2,
data/ace-6.5.12+dfsg/tests/Memcpy_Test.cpp:41:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    default: return ACE_OS::memcpy (dest, src, n);
data/ace-6.5.12+dfsg/tests/Memcpy_Test.cpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[16];
data/ace-6.5.12+dfsg/tests/Memcpy_Test.cpp:54:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    case 1:  ACE_OS::memcpy ((void*)buffer, (void*)" THIS IS A TEST", size); break;
data/ace-6.5.12+dfsg/tests/Message_Block_Large_Copy_Test.cpp:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char block[MSG_BLOCK_SIZE];
data/ace-6.5.12+dfsg/tests/Message_Block_Test.cpp:135:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          int current_count = ACE_OS::atoi ((ACE_TCHAR *)(mb->rd_ptr ()));
data/ace-6.5.12+dfsg/tests/Message_Block_Test.cpp:188:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              if (count != ACE_OS::atoi ((ACE_TCHAR *)(dup->rd_ptr ())))
data/ace-6.5.12+dfsg/tests/Message_Block_Test.cpp:193:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                            ACE_OS::atoi ((ACE_TCHAR *)(dup->rd_ptr ())),
data/ace-6.5.12+dfsg/tests/Message_Queue_Test.cpp:336:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      ACE_Message_Block ((char *) buffer[i],
data/ace-6.5.12+dfsg/tests/Message_Queue_Test.cpp:907:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          max_messages = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/tests/Message_Queue_Test_Ex.cpp:728:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          max_messages = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/tests/Missing_Svc_Conf_Test.cpp:34:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE h = ACE_OS::open (ACE_DEFAULT_SVC_CONF,O_RDONLY);
data/ace-6.5.12+dfsg/tests/Missing_Svc_Conf_Test.cpp:45:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = ACE_Service_Config::open(argc, argv);
data/ace-6.5.12+dfsg/tests/Missing_Svc_Conf_Test.cpp:67:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = ACE_Service_Config::open(argc, argv);
data/ace-6.5.12+dfsg/tests/Monotonic_Manual_Event_Test.cpp:78:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_workers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:110:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int argc, ACE_TCHAR *argv[]);
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:157:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
MCT_Config::open (int argc, ACE_TCHAR *argv[])
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:253:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:257:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int n = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:324:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->ttl_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:327:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->wait_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:562:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:583:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:659:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:679:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
MCT_Task::open (void *)
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:771:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:883:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  retval = config.open (argc, argv);
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:918:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      retval += task->open ();
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:117:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (int argc, ACE_TCHAR *argv[]);
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:166:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
MCT_Config::open (int argc, ACE_TCHAR *argv[])
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:263:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->iterations_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:267:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int n = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:334:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->ttl_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:337:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          this->wait_ = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:549:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:574:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:595:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:663:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:682:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
MCT_Task::open (void *)
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:767:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:946:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  retval = config.open (argc, argv);
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:985:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      retval += task->open ();
data/ace-6.5.12+dfsg/tests/Multihomed_INET_Addr_Test.cpp:66:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ACE_OS::memcpy (&secondary_addr32[i], &addrv4, sizeof (primary_addr32));
data/ace-6.5.12+dfsg/tests/NDDS_Timer_Test.cpp:122:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          iterations = ACE_OS::atoi (getoptarg.opt_arg ());
data/ace-6.5.12+dfsg/tests/Naming_Test.cpp:28:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char name[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Naming_Test.cpp:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char value[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Naming_Test.cpp:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char type[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Naming_Test.cpp:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_val[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Naming_Test.cpp:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_type[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Naming_Test.cpp:272:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ns_context->open (ACE_Naming_Context::PROC_LOCAL, 1) == -1)
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:125:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Echo_Handler::open (ACE_Reactor * const    reactor,
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:180:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ping_socket ().open (local_addr) == -1)
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:199:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Echo_Handler::open (ACE_Reactor * const reactor,
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:283:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ping_socket ().open (local_addr) == -1)
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:553:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Stop_Handler::open (void)
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:764:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Repeats_Handler::open (Echo_Handler * check_handler,
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:869:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ping_points_ips [MAX_NUMBER_OF_PING_POINTS][16];
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:871:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char local_ip_to_bind [16];
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:992:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          repeats_seconds_timer = ACE_OS::atoi (get_opt.optarg);
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:996:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          wait_echo_reply_timer = ACE_OS::atoi (get_opt.optarg);
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:1068:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (stop_handler->open () == -1)
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:1096:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (ping_handler->open (main_reactor,
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:1134:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (ping_handler->open (main_reactor,
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:1167:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (repeats_handler->open (ping_handler,
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.h:61:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Reactor * const    reactor,
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.h:86:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Reactor * const    reactor,
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.h:178:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void);
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.h:231:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (Echo_Handler *check_handler,
data/ace-6.5.12+dfsg/tests/New_Fail_Test.cpp:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *blocks[MAX_ALLOCS_IN_TEST];
data/ace-6.5.12+dfsg/tests/NonBlocking_Conn_Test.cpp:54:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Svc_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/NonBlocking_Conn_Test.cpp:266:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_select_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/NonBlocking_Conn_Test.cpp:269:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_tp_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/NonBlocking_Conn_Test.cpp:272:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_wfmo_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/NonBlocking_Conn_Test.h:45:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *);
data/ace-6.5.12+dfsg/tests/Notify_Performance_Test.cpp:180:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_nthreads = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Notify_Performance_Test.cpp:183:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_nloops = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:89:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = ACE_OS::fopen (old_file, ACE_TEXT ("w+"));
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:99:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = ACE_OS::fopen (new_file, ACE_TEXT ("w+"));
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:273:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char itoa1[33];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:311:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t itow1[33];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:348:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t strcpy2[27];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:362:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t strcat2[27] = ACE_TEXT_WIDE ("abcdefghijkl");
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:377:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t strncat2[27] = ACE_TEXT_WIDE ("abcdefghijkl");
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:534:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t strncpy2[27];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:590:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2*BUFFER_SIZE];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:665:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:806:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strsncpy2[36];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:876:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t strsncpy2[36];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:955:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t str_w[10];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:956:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str_n[10];
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:1453:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Pipe_Test.cpp:60:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Pipe_Test.cpp:76:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = pipe.open ();
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:78:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Read_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:147:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Write_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:246:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_nchildren = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:249:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_nloops = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:252:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        max_retries = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:255:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_max_duration = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.cpp:300:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &)) == -1
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.h:48:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/tests/Priority_Reactor_Test.h:70:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/tests/Priority_Task_Test.cpp:46:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *);
data/ace-6.5.12+dfsg/tests/Priority_Task_Test.cpp:67:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Priority_Task::open (void *arg)
data/ace-6.5.12+dfsg/tests/Priority_Task_Test.cpp:214:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (tasks[i].open ((void *) &p) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_File_Test.cpp:159:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (writer_.open(*this) != 0 || reader_.open(*this) != 0)
data/ace-6.5.12+dfsg/tests/Proactor_File_Test.cpp:159:45:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (writer_.open(*this) != 0 || reader_.open(*this) != 0)
data/ace-6.5.12+dfsg/tests/Proactor_File_Test.cpp:331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char payload[FILE_FRAME_SIZE];
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:282:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:324:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  void open (void);
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:415:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Receiver::open (ACE_HANDLE handle, ACE_Message_Block &)
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:420:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->rs_.open (*this, this->socket_handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:427:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        Receiver::writer_->open ();
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:696:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Writer::open (void)
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:699:66:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_INVALID_HANDLE == (this->output_file_handle_ = ACE_OS::open (output_file,
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:708:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (this->wf_.open (*this, this->output_file_handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:926:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:1094:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Sender::open (ACE_HANDLE handle, ACE_Message_Block &)
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:1100:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                               ACE_OS::open (input_file,
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:1128:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (this->ws_[ODD].open (*this, this->socket_handle_[ODD]) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:1134:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          else if (this->ws_[EVEN].open (*this, this->socket_handle_[EVEN]) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:1140:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          else if (this->rf_.open (*this, this->input_file_handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:1353:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:1394:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (-1 == acceptor.open (addr, 0, 1))
data/ace-6.5.12+dfsg/tests/Proactor_Scatter_Gather_Test.cpp:1403:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (-1 == connector.open (1, ACE_Proactor::instance ()))
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:746:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Server::open (ACE_HANDLE handle, ACE_Message_Block &)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:761:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (this->ws_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:765:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    else if (this->rs_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1103:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (1, 0, 1) != 0)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1234:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Client::open (ACE_HANDLE handle, ACE_Message_Block &)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1250:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (this->ws_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1256:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    else if (this->rs_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1815:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        xfer_limit = static_cast<size_t> (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1823:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        loglevel = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1826:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        duplex = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1832:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1835:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1838:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        clients = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1843:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        max_aio_operations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1890:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (acceptor.open (addr, 0, 1) == 0)
data/ace-6.5.12+dfsg/tests/Proactor_Test.h:41:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/tests/Proactor_Test.h:88:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:747:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Server::open (ACE_HANDLE handle, ACE_Message_Block &)
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:762:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (this->ws_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:766:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    else if (this->rs_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1104:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open (1, 0, 1) != 0)
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char my_name[256];
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char peer_name[256];
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1275:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Client::open (ACE_HANDLE handle, ACE_Message_Block &)
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1291:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (this->ws_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1297:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    else if (this->rs_.open (*this, this->handle_) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1859:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        xfer_limit = static_cast<size_t> (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1867:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        loglevel = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1870:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        duplex = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1876:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1879:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1882:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        clients = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1887:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        max_aio_operations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1935:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (acceptor.open (addr, 0, 1) == 0)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:786:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->sock_.open (recv_addr) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:790:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (this->rd_.open (*this, this->sock_.get_handle ()) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:842:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              if (sock.open (client_addr) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:1019:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (this->ws_.open (*this, this->handle ()) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:1023:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    else if (this->rs_.open (*this, this->handle ()) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:1345:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (sock.open (addr) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:1380:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (sock.open (server, me) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:1488:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (this->ws_.open (*this, handle) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:1493:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    else if (this->rs_.open (*this, handle) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:2081:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        xfer_limit = static_cast<size_t> (ACE_OS::atoi (get_opt.opt_arg ()));
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:2089:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        loglevel = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:2092:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        duplex = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:2098:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:2101:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        threads = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:2104:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        clients = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:2109:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        max_aio_operations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Process_Env_Test.cpp:27:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[2] = { 'A', '\0' };
data/ace-6.5.12+dfsg/tests/Process_Env_Test.cpp:29:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char value[varsize];
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:179:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void*)
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[10];
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[10];
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:298:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            process_id = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:313:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int const secs = ACE_OS::atoi (argv[get_opt.opt_ind ()]);
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:555:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  task1.open (0);
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:556:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  task2.open (0);
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:557:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  task3.open (0);
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:582:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  mgr.open (ACE_Process_Manager::DEFAULT_SIZE,
data/ace-6.5.12+dfsg/tests/Process_Manual_Event_Test.cpp:57:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Process_Mutex_Test.cpp:90:39:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE checker_handle = ACE_OS::open (mutex_check, O_CREAT | O_EXCL);
data/ace-6.5.12+dfsg/tests/Process_Semaphore_Test.cpp:59:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:201:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->file_lock_.open (this->filename_,
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:303:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:362:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:448:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Counting_Service::open (void *)
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:490:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:575:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      size_t count = ACE_OS::atoi (ACE_OS::strrchr (ACE_TEXT_CHAR_TO_TCHAR (buf),
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:647:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_sap_any_cast (const ACE_INET_Addr &),
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.h:47:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *v);
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAXPATHLEN + 1];
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:76:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (entr.open (ACE_TEXT_CHAR_TO_TCHAR(proc_self_fd)) == -1)
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:131:36:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  ACE_HANDLE file_handle = ACE_OS::mkstemp (tempfile);
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:213:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          handle_inherit = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp:125:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int  open (const ACE_INET_Addr &local,
data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp:166:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp:243:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int  DgramHandler::open (const ACE_INET_Addr &local,
data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp:248:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (0 > peer_.open (local,
data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp:293:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == socket.open (ACE_INET_Addr (static_cast< u_short > (0),
data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp:433:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int TCPConnectionHandler::open (void * )
data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp:435:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = inherited::open ();
data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp:626:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (-1 == DgramHandlers_[ i ]->open (
data/ace-6.5.12+dfsg/tests/QtReactor_Test.cpp:650:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == acceptor_->open (addr, reactor_, 1))
data/ace-6.5.12+dfsg/tests/RW_Process_Mutex_Test.cpp:148:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      child_nr = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/RW_Process_Mutex_Test.cpp:154:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      reporting_port = (u_short)ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/RW_Process_Mutex_Test.cpp:220:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (sock.open (ACE_Addr::sap_any, PF_INET) == -1)
data/ace-6.5.12+dfsg/tests/RW_Process_Mutex_Test.cpp:333:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (sock.open (ACE_Addr::sap_any, PF_INET) == -1)
data/ace-6.5.12+dfsg/tests/RW_Process_Mutex_Test.cpp:444:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (sock.open (ACE_Addr::sap_any, PF_INET) == -1)
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test.cpp:63:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (0 != this->pipe_.open ())
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test.cpp:137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test_Dev_Poll.cpp:65:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (0 != this->pipe_.open ())
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test_Dev_Poll.cpp:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Reactor_Exceptions_Test.cpp:128:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  u_short port = argc > 1 ? ACE_OS::atoi (argv[1]) : ACE_DEFAULT_SERVER_PORT;
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:282:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (local_addr, &r) == -1
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:337:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_nconnections = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:340:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_secs = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:343:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_reactor_threads = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reactor_Notify_Test.cpp:43:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Reactor_Notify_Test.cpp:57:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Quiet_Notify_Tester::open (void *)
data/ace-6.5.12+dfsg/tests/Reactor_Notify_Test.cpp:94:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (t.open () == -1)
data/ace-6.5.12+dfsg/tests/Reactor_Notify_Test.cpp:120:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Reactor_Notify_Test.cpp:186:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Supplier_Task::open (void *)
data/ace-6.5.12+dfsg/tests/Reactor_Notify_Test.cpp:191:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = this->pipe_.open ();
data/ace-6.5.12+dfsg/tests/Reactor_Notify_Test.cpp:380:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = task.open ();
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:56:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Read_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:143:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Write_Handler::open (void *)
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:322:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_nconnections = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:325:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opt_nloops = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.cpp:355:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (local_addr) == -1
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.h:38:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/tests/Reactor_Performance_Test.h:57:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/tests/Reactor_Registration_Test.cpp:52:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (0 != this->pipe_.open ())
data/ace-6.5.12+dfsg/tests/Reactor_Registration_Test.cpp:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[message_size + 1];
data/ace-6.5.12+dfsg/tests/Reactor_Remove_Resume_Test.cpp:423:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (the_pipe.open () != 0
data/ace-6.5.12+dfsg/tests/Reactor_Remove_Resume_Test_Dev_Poll.cpp:427:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (the_pipe.open () != 0
data/ace-6.5.12+dfsg/tests/Reactors_Test.cpp:41:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/tests/Reactors_Test.cpp:87:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Test_Task::open (void *args)
data/ace-6.5.12+dfsg/tests/Reactors_Test.cpp:215:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      tt1[i].open (ACE_Reactor::instance ());
data/ace-6.5.12+dfsg/tests/Reactors_Test.cpp:216:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      tt2[i].open (&reactor);
data/ace-6.5.12+dfsg/tests/Reader_Writer_Test.cpp:78:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_readers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reader_Writer_Test.cpp:81:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_writers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reader_Writer_Test.cpp:84:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Recursive_Condition_Bug_Test.cpp:75:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0)
data/ace-6.5.12+dfsg/tests/Recursive_Condition_Bug_Test.cpp:142:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (0 != task.open ())
data/ace-6.5.12+dfsg/tests/Recursive_Mutex_Test.cpp:357:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_threads = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/tests/Refcounted_Auto_Ptr_Test.cpp:78:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *args = 0);
data/ace-6.5.12+dfsg/tests/Refcounted_Auto_Ptr_Test.cpp:207:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Scheduler::open (void *)
data/ace-6.5.12+dfsg/tests/Refcounted_Auto_Ptr_Test.cpp:491:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (scheduler->open () == -1)
data/ace-6.5.12+dfsg/tests/Refcounted_Event_Handler_Test_DevPoll.cpp:69:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (0 != this->pipe_.open ())
data/ace-6.5.12+dfsg/tests/Refcounted_Event_Handler_Test_DevPoll.cpp:140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:73:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->pipe_.open () != 0)
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[message_size + 1];
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:504:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == this->pipe_.open ())
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:526:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[message_size + 1];
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:795:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == this->pipe_.open ())
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:827:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[message_size + 1];
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:973:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_select_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:976:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_tp_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:979:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_wfmo_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:982:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_dev_poll_reactor = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:985:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_simple_event_handler = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:988:60:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_reference_counted_event_handler_1 = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:991:60:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_reference_counted_event_handler_2 = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:994:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_closed_in_upcall_event_handler = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:997:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_io = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:1000:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_timers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:1003:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_find = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Reference_Counted_Event_Handler_Test.cpp:1006:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          debug = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SOCK_Acceptor_Test.cpp:32:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (listen_addr,
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp:42:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char dgram_buffer[BUFSIZ];
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp:69:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (socket.open (ACE_Addr::sap_any) != -1)
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp:99:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char    dgram_buffer[BUFSIZ];
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp:101:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (socket.open (ACE_INET_Addr (dgram_port)) != -1)
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp:170:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (socket.open (ACE_Addr::sap_any) != -1)
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp:239:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        dgrams_no = ACE_OS::atoi (opts.opt_arg ());
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp:242:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        dgram_recv_timeout.msec (ACE_OS::atoi (opts.opt_arg ()));
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp:245:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        dgram_port = ACE_OS::atoi (opts.opt_arg ());
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Test.cpp:61:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (cli_dgram.open (ACE_Addr::sap_any, server_addr.get_type ()) == -1)
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Test.cpp:286:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (server_dgram.open (server_addr, proto) == -1)
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:118:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ip_slash_mask[32];
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char net_dev_name[16];
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            buf_[256];
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:212:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_Reactor *const reactor,
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:330:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip_buff_[32];
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:333:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char if_buff_[16];
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:336:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char recv_buff_[1024];
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:362:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Secondary_Ipaddr_Handler::open (ACE_Reactor *const reactor,
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:381:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->socket ().open (this->address_,
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:650:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip_buff[32];
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:665:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int num = ACE_OS::atoi (to_search);
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:680:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      mask_len = ACE_OS::atoi (slash + 1);
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:700:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (RTA_DATA(rta), data, data_length);
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:823:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (sec_ip_handler.open (ACE_Reactor::instance (),
data/ace-6.5.12+dfsg/tests/SOCK_SEQPACK_SCTP_Test.cpp:266:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (-1 == AcceptorSocket.open (ServerAddr, 1))
data/ace-6.5.12+dfsg/tests/SOCK_Send_Recv_Test.cpp:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[Test3_Send_Size];
data/ace-6.5.12+dfsg/tests/SOCK_Send_Recv_Test.cpp:384:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (ACE_Addr::sap_any) == -1
data/ace-6.5.12+dfsg/tests/SOCK_Send_Recv_Test_IPV6.cpp:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[Test3_Send_Size];
data/ace-6.5.12+dfsg/tests/SOCK_Send_Recv_Test_IPV6.cpp:325:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (ACE_Addr::sap_any, 0, AF_INET6) == -1
data/ace-6.5.12+dfsg/tests/SOCK_Test.cpp:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1];
data/ace-6.5.12+dfsg/tests/SOCK_Test.cpp:113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/SOCK_Test.cpp:192:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (ACE_Addr::sap_any) == -1
data/ace-6.5.12+dfsg/tests/SOCK_Test_IPv6.cpp:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1];
data/ace-6.5.12+dfsg/tests/SOCK_Test_IPv6.cpp:111:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/SOCK_Test_IPv6.cpp:220:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (ACE_Addr::sap_any, 0, AF_INET6) == -1
data/ace-6.5.12+dfsg/tests/SPIPE_Test.cpp:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/SPIPE_Test.cpp:109:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_SPIPE_Addr (rendezvous)) == -1)
data/ace-6.5.12+dfsg/tests/SPIPE_Test.cpp:131:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_SPIPE_Addr (rendezvous),
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:248:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE h, ACE_Message_Block&);
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:303:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Server_Service_Handler::open (ACE_HANDLE h, ACE_Message_Block&)
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:307:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ssl_stream_.open (*this, h, 0, this->proactor ()) != 0)
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:479:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (mb->wr_ptr (), DATA, DATA_SIZE);
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:687:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual void open (ACE_HANDLE h, ACE_Message_Block&);
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:754:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Client_Service_Handler::open (ACE_HANDLE h, ACE_Message_Block&)
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:758:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->ssl_stream_.open (*this, h, 0, this->proactor ()) != 0)
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:940:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ACE_OS::memcpy (mb->wr_ptr (), DATA, DATA_SIZE);
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:1165:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ret = ACCEPTOR->open (
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:1183:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ret = CONNECTOR->open (0, CLIENT_PROACTOR, 1);
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:57:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_HANDLE);
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:79:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (ACE_HANDLE);
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:95:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (const ACE_INET_Addr &listen_addr);
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:183:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          num_threads = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:186:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          req_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:189:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_conn_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:192:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_req_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:230:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Client_Handler::open (ACE_HANDLE handle)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:234:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->stream_.open (*this, handle) == -1)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:322:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Server_Handler::open (ACE_HANDLE handle)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:326:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->stream_.open (*this, handle) == -1)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:401:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Server_Acceptor::open (const ACE_INET_Addr &listen_addr)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:403:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->acceptor_.open (listen_addr) == -1)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:428:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (new_handler->open (new_stream.get_handle ()) != 0)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:486:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (new_handler->open (stream.get_handle ()) != 0)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:514:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (accept_addr) == -1)
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:88:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          svr_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:91:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:94:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          req_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:97:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_conn_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:100:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_req_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:306:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (accept_addr) == -1)
data/ace-6.5.12+dfsg/tests/SV_Shared_Memory_Test.cpp:50:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char SHMDATA[SHMSZ] = "abcdefghijklmnopqrstuvwxyz";
data/ace-6.5.12+dfsg/tests/SV_Shared_Memory_Test.cpp:91:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = mutex.open (SEM_KEY_1,
data/ace-6.5.12+dfsg/tests/SV_Shared_Memory_Test.cpp:99:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = synch.open (SEM_KEY_2,
data/ace-6.5.12+dfsg/tests/SV_Shared_Memory_Test.cpp:159:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int result = parent_mutex->open (SEM_KEY_1,
data/ace-6.5.12+dfsg/tests/SV_Shared_Memory_Test.cpp:166:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  result = parent_synch->open (SEM_KEY_2,
data/ace-6.5.12+dfsg/tests/Semaphore_Test.cpp:131:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_release_count = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Semaphore_Test.cpp:134:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_workers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Semaphore_Test.cpp:137:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Sendfile_Test.cpp:95:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || (in_fd = ACE_OS::open (test_file, O_CREAT | O_RDWR | O_TRUNC,
data/ace-6.5.12+dfsg/tests/Sendfile_Test.cpp:274:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (peer_acceptor.open (ACE_Addr::sap_any) == -1
data/ace-6.5.12+dfsg/tests/Service_Config_Stream_DLL.cpp:8:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Test_Task::open (void *)
data/ace-6.5.12+dfsg/tests/Service_Config_Stream_DLL.h:24:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *);
data/ace-6.5.12+dfsg/tests/Service_Config_Stream_Test.cpp:35:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *)
data/ace-6.5.12+dfsg/tests/Service_Config_Stream_Test.cpp:116:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((status = ACE_Service_Config::open (5,
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:249:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (daemon.open (new_argv.argc (), new_argv.argv ()) == -1 &&
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:258:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ACE_Time_Value tv (argc > 1 ? ACE_OS::atoi (argv[1]) : 2);
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:325:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (daemon.open (new_argv.argc (), new_argv.argv ()) == -1)
data/ace-6.5.12+dfsg/tests/Service_Config_Test.cpp:337:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ACE_Time_Value tv (argc > 1 ? ACE_OS::atoi (argv[1]) : 2);
data/ace-6.5.12+dfsg/tests/Signal_Test.cpp:406:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      n_iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Signal_Test.cpp:412:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      parent_pid = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Signal_Test.cpp:415:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      test_number = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Singleton_Restart_Test.cpp:10:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_LOG_MSG->open (program, ACE_Log_Msg::OSTREAM |
data/ace-6.5.12+dfsg/tests/Svc_Handler_Test.cpp:80:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      max_buffer_size = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/tests/Svc_Handler_Test.cpp:82:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      iterations = ACE_OS::atoi (argv[2]);
data/ace-6.5.12+dfsg/tests/Svc_Handler_Test.cpp:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ACE_MAXLOGMSGLEN + 1];
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:342:49:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_Acceptor<Receiver,ACE_SOCK_ACCEPTOR>::open (addr,
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:417:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Receiver::open (void *)
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:703:49:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_Connector<Sender,ACE_SOCK_CONNECTOR>::open (ACE_Reactor::instance (),
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:795:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int Sender::open (void *)
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1075:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          seconds = ACE_OS::atoi (get_opt.opt_arg());
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1085:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          loglevel = ACE_OS::atoi (get_opt.opt_arg());
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1088:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          duplex = ACE_OS::atoi (get_opt.opt_arg());
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1094:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          port = ACE_OS::atoi (get_opt.opt_arg());
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1097:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          threads = ACE_OS::atoi (get_opt.opt_arg());
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:1100:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          senders = ACE_OS::atoi (get_opt.opt_arg());
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.h:52:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * pVoid);
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.h:132:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * pVoid);
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.h:151:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char send_buf_ [1024];
data/ace-6.5.12+dfsg/tests/Task_Ex_Test.cpp:43:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void*);
data/ace-6.5.12+dfsg/tests/Task_Ex_Test.cpp:51:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int Consumer::open (void*)
data/ace-6.5.12+dfsg/tests/Task_Ex_Test.cpp:132:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if(c.open (0)==-1)
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:122:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ACE_HANDLE fd = ACE_OS::open (temp,
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:140:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->output_file_->open (ACE_TEXT_ALWAYS_CHAR (temp),
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:150:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->output_file_ = ACE_OS::fopen (temp, fmode);
data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp:26:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp:105:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Cancel_Check::open (void *)
data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp:135:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp:196:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Stack_Size_Check::open (void *)
data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp:226:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  status = size_checker.open(0);
data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp:252:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (check1.open(0) == 0)
data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp:258:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      check2.open (0);
data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp:263:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      check3.open (0);
data/ace-6.5.12+dfsg/tests/Thread_Attrs_Test.cpp:268:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      check4.open (0);
data/ace-6.5.12+dfsg/tests/Thread_Creation_Threshold_Test.cpp:83:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Thread_Creation_Threshold_Test.cpp:131:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open () == -1)
data/ace-6.5.12+dfsg/tests/Thread_Creation_Threshold_Test.cpp:161:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Thread_Pool::open (void *)
data/ace-6.5.12+dfsg/tests/Thread_Manager_Test.cpp:109:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char thr_id[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Thread_Manager_Test.cpp:123:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char thr_id[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:95:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          svr_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:98:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:101:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          req_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:104:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_conn_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:107:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_req_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:134:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Request_Handler::open (void *arg)
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:138:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ACE_Svc_Handler<ACE_SOCK_STREAM, ACE_MT_SYNCH>::open (arg);
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:356:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (accept_addr) == -1)
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.h:41:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:97:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          svr_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:100:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_thrno = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:103:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          req_delay = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:106:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_conn_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:109:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          cli_req_no = ACE_OS::atoi (getopt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:308:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (accept_addr) == -1)
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:76:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void * = 0);
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:177:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Thread_Pool::open (void *)
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:200:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open () == -1)
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:292:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (this->open () == -1)
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:498:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          heap = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:501:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          list = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:504:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          hash = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:507:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          wheel = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:510:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          hashheap = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:513:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_cancellation = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:516:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_expire = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:519:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_one_upcall = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:522:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          test_simple = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Reference_Counting_Test.cpp:525:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          debug = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Timer_Queue_Test.cpp:614:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    max_iterations = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char new_string[80];
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char new_string[80];
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char new_string[80];
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:183:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *)
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:266:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_INET_Addr ((u_short) SERV_TCP_PORT),
data/ace-6.5.12+dfsg/tests/Token_Strategy_Test.cpp:39:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int open (void *a = 0);
data/ace-6.5.12+dfsg/tests/Token_Strategy_Test.cpp:112:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
Token_Strategy_Test::open (void *)
data/ace-6.5.12+dfsg/tests/Token_Strategy_Test.cpp:209:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return test.open () == 0 ? 0 : 1;
data/ace-6.5.12+dfsg/tests/Token_Strategy_Test.cpp:228:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (argc > 1) threads = ACE_OS::atoi (argv[1]);
data/ace-6.5.12+dfsg/tests/Token_Strategy_Test.cpp:229:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (argc > 2) invocations = ACE_OS::atoi (argv[2]);
data/ace-6.5.12+dfsg/tests/UPIPE_SAP_Test.cpp:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char conbuf[BUFSIZ];  // Buffer to receive response.
data/ace-6.5.12+dfsg/tests/UPIPE_SAP_Test.cpp:115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s_buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ybuf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:128:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((logfp = fopen ("log/UnloadLibACE.log", "w")) != 0)
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:147:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[BUFSIZ];
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:150:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat (buf, "/lib/");
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:157:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat (buf, "lib");
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:161:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat (buf, "ACE");
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:164:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat (buf, ".sl");
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:166:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat (buf, ".dylib");
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:168:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat (buf, ".so");
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:260:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((logfp = fopen ("log/UnloadLibACE.log", "w")) != 0)
data/ace-6.5.12+dfsg/tests/Upgradable_RW_Test.cpp:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char search_string[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/Upgradable_RW_Test.cpp:120:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_entries = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Upgradable_RW_Test.cpp:126:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_readers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Upgradable_RW_Test.cpp:129:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_writers = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Upgradable_RW_Test.cpp:132:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        n_iterations = ACE_OS::atoi (get_opt.opt_arg ());
data/ace-6.5.12+dfsg/tests/Upgradable_RW_Test.cpp:315:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char entry[MAX_STRING_SIZE];
data/ace-6.5.12+dfsg/tests/WFMO_Reactor_Test.cpp:45:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    this->pipe_.open ();
data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp:128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char new_string[80];
data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char new_string[80];
data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char new_string[80];
data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp:174:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *)
data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp:285:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_INET_Addr ((u_short) SERV_TCP_PORT),
data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp:131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char new_string[80];
data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char new_string[80];
data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char new_string[80];
data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp:177:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  virtual int open (void *)
data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp:288:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (acceptor.open (ACE_INET_Addr ((u_short) SERV_TCP_PORT),
data/ace-6.5.12+dfsg/tests/test_config.h:105:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (ACE_LOG_MSG->open (program, ACE_TEST_LOG_MSG_FLAGS) != 0) \
data/ace-6.5.12+dfsg/tests/test_config.h:143:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd_init_log = ACE_OS::open (temp, \
data/ace-6.5.12+dfsg/ACEXML/common/CharStream.h:58:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual int read (ACEXML_Char *str, size_t len) = 0;
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp:152:35:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ch = static_cast<char> (ACE_OS::fgetc (this->infile_));
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp:157:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACEXML_FileCharStream::read (ACEXML_Char *str,
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp:174:30:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ch = (ACEXML_Char) ACE_OS::fgetc (this->infile_);
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp:188:54:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ACEXML_Char ch = static_cast<ACEXML_Char> (ACE_OS::fgetc (this->infile_));
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp:200:34:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ch = (ACEXML_Char) ACE_OS::fgetc (this->infile_);
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.cpp:234:46:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ACEXML_Char ch = (ACEXML_Char) ACE_OS::fgetc (this->infile_);
data/ace-6.5.12+dfsg/ACEXML/common/FileCharStream.h:67:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual int read (ACEXML_Char *str,
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp:279:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t commandsize = ACE_OS::strlen (path)
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp:280:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       + ACE_OS::strlen (this->url_addr_->get_host_name ())
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp:409:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACEXML_HttpCharStream::read (ACEXML_Char *str,
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.cpp:418:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (str, ACE_TEXT_CHAR_TO_TCHAR (temp), len);
data/ace-6.5.12+dfsg/ACEXML/common/HttpCharStream.h:62:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual int read (ACEXML_Char *str, size_t len);
data/ace-6.5.12+dfsg/ACEXML/common/NamespaceSupport.cpp:205:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qlen = static_cast<int> (ACE_OS::strlen (qName));
data/ace-6.5.12+dfsg/ACEXML/common/StrCharStream.cpp:31:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      this->end_ = this->start_ + ACE_OS::strlen (this->start_);
data/ace-6.5.12+dfsg/ACEXML/common/StrCharStream.cpp:98:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACEXML_StrCharStream::read (ACEXML_Char *str, size_t len)
data/ace-6.5.12+dfsg/ACEXML/common/StrCharStream.cpp:105:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (str, this->ptr_, len);
data/ace-6.5.12+dfsg/ACEXML/common/StrCharStream.h:66:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual int read (ACEXML_Char *str, size_t len);
data/ace-6.5.12+dfsg/ACEXML/common/Transcode.cpp:264:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t src_len = ACE_OS::strlen (src) + 1;
data/ace-6.5.12+dfsg/ACEXML/common/URL_Addr.cpp:81:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t http_len = ACE_OS::strlen (http);
data/ace-6.5.12+dfsg/ACEXML/common/URL_Addr.cpp:97:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (host_name, s + http_len, host_len);
data/ace-6.5.12+dfsg/ACEXML/common/XML_Codecs.cpp:16:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (input);
data/ace-6.5.12+dfsg/ACEXML/common/XML_Codecs.cpp:56:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (input);
data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.cpp:156:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACEXML_ZipCharStream::read (ACEXML_Char *str, size_t len)
data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.h:28:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#ifdef read
data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.h:29:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef read
data/ace-6.5.12+dfsg/ACEXML/common/ZipCharStream.h:69:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual int read (ACEXML_Char *str, size_t len);
data/ace-6.5.12+dfsg/ACEXML/parser/parser/Parser.cpp:688:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = pos + ACE_OS::strlen (systemId) + 1;
data/ace-6.5.12+dfsg/ACEXML/parser/parser/Parser.cpp:690:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (normalized_uri, baseURI, pos);
data/ace-6.5.12+dfsg/ACEXML/tests/ContentHandler_Test.cpp:54:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const expected_len = ACE_OS::strlen (expect);
data/ace-6.5.12+dfsg/ACEXML/tests/Transcoder_Test.cpp:58:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_HEX_DUMP ((LM_DEBUG, decoded, ACE_OS::strlen (decoded) + 1));
data/ace-6.5.12+dfsg/ace/ACE.cpp:295:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ACE_OS::strlen (old_name)
data/ace-6.5.12+dfsg/ace/ACE.cpp:296:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        + ACE_OS::strlen (ACE_TEXT (".exe"))
data/ace-6.5.12+dfsg/ace/ACE.cpp:341:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE::hash_pjw (str, ACE_OS::strlen (str));
data/ace-6.5.12+dfsg/ace/ACE.cpp:372:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE::hash_pjw (str, ACE_OS::strlen (str));
data/ace-6.5.12+dfsg/ace/ACE.cpp:2737:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  ACE_OS::umask (0); // clear our file mode creation mask.
data/ace-6.5.12+dfsg/ace/ACE.cpp:3335:106:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        static_cast<char*> (ACE_Allocator::instance ()->malloc (sizeof (char) * (ACE_OS::strlen (s) + 1))),
data/ace-6.5.12+dfsg/ace/ACE.cpp:3339:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  char [ACE_OS::strlen (s) + 1],
data/ace-6.5.12+dfsg/ace/ACE.cpp:3353:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const n = ACE_OS::strlen (s) + 1;
data/ace-6.5.12+dfsg/ace/ARGV.cpp:93:111:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          static_cast<char*> (ACE_Allocator::instance()->malloc(sizeof (CHAR_TYPE) * (ACE_OS::strlen (buf) + 1))));
data/ace-6.5.12+dfsg/ace/ARGV.cpp:96:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           CHAR_TYPE[ACE_OS::strlen (buf) + 1]);
data/ace-6.5.12+dfsg/ace/ARGV.cpp:183:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buf_len += ACE_OS::strlen (first_buf);
data/ace-6.5.12+dfsg/ace/ARGV.cpp:193:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buf_len += ACE_OS::strlen (second_buf);
data/ace-6.5.12+dfsg/ace/ARGV.cpp:246:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->length_ += ACE_OS::strlen (next_arg);
data/ace-6.5.12+dfsg/ace/ARGV.cpp:385:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len = ACE_OS::strlen (arg->arg_);
data/ace-6.5.12+dfsg/ace/ARGV.cpp:397:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = ACE_OS::strlen (arg->arg_);
data/ace-6.5.12+dfsg/ace/ATM_Addr.cpp:386:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t total_len = ACE_OS::strlen (buffer) + sizeof ('\0');
data/ace-6.5.12+dfsg/ace/ATM_Stream.cpp:75:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (index = 0; index < ACE_OS::strlen (buffer); ++index)
data/ace-6.5.12+dfsg/ace/ATM_Stream.cpp:89:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (index = 0; index < ACE_OS::strlen (line); ++index)
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:185:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:849:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/Acceptor.cpp:1212:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/Arg_Shifter.cpp:136:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t flag_length = ACE_OS::strlen (flag);
data/ace-6.5.12+dfsg/ace/Arg_Shifter.cpp:142:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t arg_length = ACE_OS::strlen (arg);
data/ace-6.5.12+dfsg/ace/Array_Map.cpp:242:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          && std::equal (lhs.begin (),
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:185:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_Asynch_Read_Stream::read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:196:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return this->implementation_->read (message_block,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:421:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_Asynch_Read_File::read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/Asynch_IO.cpp:434:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return this->implementation_->read (message_block,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:339:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/Asynch_IO.h:634:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/Asynch_IO_Impl.h:157:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/Asynch_IO_Impl.h:288:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/Asynch_IO_Impl.h:314:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/CDR_Base.cpp:1585:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
bool ACE_CDR::Fixed::equal (const ACE_CDR::Fixed &rhs) const
data/ace-6.5.12+dfsg/ace/CDR_Base.h:372:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
         bool equal (const Fixed &rhs) const;
data/ace-6.5.12+dfsg/ace/CDR_Stream.cpp:1555:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (const_cast<char *&> (x), "");
data/ace-6.5.12+dfsg/ace/CE_Screen_Output.cpp:36:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        verbose_msg[ ACE_OS::strlen(verbose_msg) - 1 ] = 0;  // CE does not like '\n' by itself.
data/ace-6.5.12+dfsg/ace/Capabilities.cpp:236:24:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((ch = ACE_OS::fgetc (fp)) != EOF && ch != ACE_TEXT ('\n'))
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1002:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  ACE_TCHAR[ACE_OS::strlen (path) + 1],
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1289:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (file_name) >= MAXNAMELEN + MAXPATHLEN)
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1412:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_TCHAR* pers_name = (ACE_TCHAR *) allocator_->malloc ((ACE_OS::strlen (sub_section) + 1) * sizeof (ACE_TCHAR));
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1822:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 (ACE_TCHAR *) allocator_->malloc ((ACE_OS::strlen (t_name) + 1) * sizeof (ACE_TCHAR));
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1875:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 (ACE_TCHAR *) allocator_->malloc ((ACE_OS::strlen (t_name) + 1) * sizeof (ACE_TCHAR));
data/ace-6.5.12+dfsg/ace/Configuration.cpp:1930:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 (ACE_TCHAR *) allocator_->malloc ((ACE_OS::strlen (t_name) + 1) * sizeof (ACE_TCHAR));
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:182:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              size_t string_length = ACE_OS::strlen (end + 4);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:306:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t count = ACE_OS::strlen (string);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:533:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (ACE_OS::strlen (name) == 0)          // No name; just an '='
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:541:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t value_len = ACE_OS::strlen (value);
data/ace-6.5.12+dfsg/ace/Configuration_Import_Export.cpp:733:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (cp = src + ACE_OS::strlen (src) - 1;
data/ace-6.5.12+dfsg/ace/Connector.cpp:782:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/Dirent.h:70:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ACE_DIRENT *read (void);
data/ace-6.5.12+dfsg/ace/Dirent.h:77:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (struct ACE_DIRENT *entry,
data/ace-6.5.12+dfsg/ace/ETCL/ETCL_Interpreter.cpp:109:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    input_string + ACE_OS::strlen (Lex_String_Input::string_);
data/ace-6.5.12+dfsg/ace/ETCL/ETCL_l.cpp:569:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          (c = ACE_OS::getc( yyin )) != EOF && c != '\n'; ++n ) \
data/ace-6.5.12+dfsg/ace/ETCL/ETCL_y.cpp:1132:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size += ACE_OS::strlen(yytname[x]) + 15, count++;
data/ace-6.5.12+dfsg/ace/ETCL/ETCL_y.cpp:1147:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            ACE_OS::strcat(msg, "'");
data/ace-6.5.12+dfsg/ace/FILE_Addr.cpp:57:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      static_cast<int> (ACE_OS::strlen (this->filename_) + 1));
data/ace-6.5.12+dfsg/ace/FILE_Addr.cpp:81:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            static_cast<int> (ACE_OS::strlen (filename) + 1));
data/ace-6.5.12+dfsg/ace/Filecache.cpp:193:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
ACE_Filecache_Hash::equal (const ACE_TCHAR *const &id1,
data/ace-6.5.12+dfsg/ace/Get_Opt.cpp:267:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (len == ACE_OS::strlen(p->name_))
data/ace-6.5.12+dfsg/ace/Hash_Map_Manager_T.cpp:329:46:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  while (temp != &this->table_[loc] && this->equal (temp->ext_id_, ext_id) == 0)
data/ace-6.5.12+dfsg/ace/Hash_Map_Manager_T.h:434:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  int equal (const EXT_ID &id1, const EXT_ID &id2);
data/ace-6.5.12+dfsg/ace/Hash_Map_Manager_T.h:1154:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  int equal (const EXT_ID &id1, const EXT_ID &id2);
data/ace-6.5.12+dfsg/ace/Hash_Multi_Map_Manager_T.cpp:387:46:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  while (temp != &this->table_[loc] && this->equal (temp->ext_id_, ext_id) == 0)
data/ace-6.5.12+dfsg/ace/Hash_Multi_Map_Manager_T.h:432:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  int equal (const EXT_ID &id1, const EXT_ID &id2);
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:461:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (str));
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:464:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:504:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (str));
data/ace-6.5.12+dfsg/ace/High_Res_Timer.cpp:507:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:49:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (hoststr)
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:1061:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((ACE_OS::strlen (ch)+ACE_OS::strlen (scope_buf)) < (size_t)size)
data/ace-6.5.12+dfsg/ace/INET_Addr.cpp:1061:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((ACE_OS::strlen (ch)+ACE_OS::strlen (scope_buf)) < (size_t)size)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:125:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (filename) >= maxpathnamelen)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:134:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nameDsc.dsc$w_length = ACE_OS::strlen (filename);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:141:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  symbolDsc.dsc$w_length = ACE_OS::strlen (symbol);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:164:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (filename) + ACE_OS::strlen (ACE_DLL_PREFIX) >= maxpathnamelen)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:164:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (filename) + ACE_OS::strlen (ACE_DLL_PREFIX) >= maxpathnamelen)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:173:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nameDsc.dsc$w_length = ACE_OS::strlen (pathname);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:215:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (filename) + 1
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:280:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (searchfilename)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:281:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      + ACE_OS::strlen (ACE_DLL_PREFIX)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:282:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      + (has_suffix ? 0 : ACE_OS::strlen (dll_suffix))
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:290:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const len_searchfilename = ACE_OS::strlen (searchfilename);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:301:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (ACE_OS::strlen (searchpathname) > 0)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:303:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (ACE_OS::strlen (searchfilename)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:304:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              + ACE_OS::strlen (searchpathname) >= maxpathnamelen)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:399:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  ACE_OS::malloc ((ACE_OS::strlen (ld_path) + 2)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:451:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  else if (ACE_OS::strlen (path_entry)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:453:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           + ACE_OS::strlen (searchfilename)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:544:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (entry_point)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:558:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (entry_point)
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:630:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (tmpdir);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:724:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          next_start = tok_loc + ACE_OS::strlen (token);
data/ace-6.5.12+dfsg/ace/Lib_Find.cpp:758:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          next_start = tok_loc + ACE_OS::strlen (token);
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:146:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t type_len = ACE_OS::strlen (type) + 1;
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:333:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (ns_internal.type ());
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:424:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (dir);
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:425:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += ACE_OS::strlen (ACE_DIRECTORY_SEPARATOR_STR);
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:426:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += ACE_OS::strlen (database) + 1;
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:450:11:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  ACE_OS::strncat (lock_name_for_local_name_space,
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:452:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   length -  ACE_OS::strlen (lock_name_for_local_name_space));
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:453:11:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  ACE_OS::strncat (lock_name_for_local_name_space,
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:455:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   length -  ACE_OS::strlen (lock_name_for_local_name_space));
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:456:11:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  ACE_OS::strncat (lock_name_for_local_name_space,
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:458:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   length -  ACE_OS::strlen (lock_name_for_local_name_space));
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:464:11:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  ACE_OS::strncat (lock_name_for_backing_store,
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:466:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   length -  ACE_OS::strlen (lock_name_for_backing_store));
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:467:11:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  ACE_OS::strncat (lock_name_for_backing_store,
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:469:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   length -  ACE_OS::strlen (lock_name_for_backing_store));
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:470:11:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  ACE_OS::strncat (lock_name_for_backing_store,
data/ace-6.5.12+dfsg/ace/Local_Name_Space_T.cpp:472:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   length - ACE_OS::strlen (ACE_TEXT ("backing_store_")));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1204:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  fp += ACE_OS::strlen (fp);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1225:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (bspace > ACE_OS::strlen (abort_str))
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1226:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    bspace -= ACE_OS::strlen (abort_str);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1678:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        bspace > (1 + ACE_OS::strlen (bp)))
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1680:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        bspace -= (ACE_OS::strlen (bp) + 1);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1681:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        bp += ACE_OS::strlen (bp);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1807:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    this_len = ACE_OS::strlen (tid_buf);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:1808:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                    ACE_OS::strncpy (bp, ACE_TEXT_CHAR_TO_TCHAR (tid_buf),
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2310:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        this->copy_trunc (msg, ACE_OS::strlen (msg));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2316:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          const size_t len = ACE_OS::strlen (this->bp_);
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2336:19:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
          ACE_OS::strcpy (this->fmt_out_, "%");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2343:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->copy_trunc (this->format_, ACE_OS::strlen (this->format_));
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2386:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "d");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2404:17:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        ACE_OS::strcpy (this->fp_, "s");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2422:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              (ACE_OS::strlen (pri) < 4) ? '?' : pri[3];
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2427:21:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            ACE_OS::strcpy (this->fp_, "s");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2437:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "s");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2446:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "s");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2455:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "d");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2463:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "u");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2472:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "s");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2496:17:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        ACE_OS::strcpy (this->fp_, "s");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2515:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "f");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2526:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "s");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2545:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "d");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2549:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "u");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2556:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "S");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2558:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "s");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2565:15:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      ACE_OS::strcpy (this->fp_, "p");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2571:17:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        ACE_OS::strcpy (this->fp_, "d");
data/ace-6.5.12+dfsg/ace/Log_Msg.cpp:2964:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    text_sz = ACE_OS::strlen (text);
data/ace-6.5.12+dfsg/ace/Log_Msg_NT_Event_Log.cpp:37:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    static_cast<DWORD> ((ACE_OS::strlen (msg_file) + 1) * sizeof (ACE_TCHAR));
data/ace-6.5.12+dfsg/ace/Log_Msg_NT_Event_Log.cpp:48:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t reg_key_length = ACE_OS::strlen(reg_key);
data/ace-6.5.12+dfsg/ace/Log_Msg_NT_Event_Log.cpp:49:11:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  ACE_OS::strncat (reg_key,
data/ace-6.5.12+dfsg/ace/Log_Record.cpp:125:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const newlen = ACE_OS::strlen (data) + 1;  // Will need room for '\0'
data/ace-6.5.12+dfsg/ace/Log_Record.cpp:198:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = sizeof (*this) + (sizeof (ACE_TCHAR) * ((ACE_OS::strlen (this->msg_data_) + 1)));
data/ace-6.5.12+dfsg/ace/Log_Record.cpp:320:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                static_cast<int> (ACE_OS::strlen (verbose_msg));
data/ace-6.5.12+dfsg/ace/Logging_Strategy.cpp:486:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (ACE_OS::strlen (this->filename_) + digits <= MAXPATHLEN)
data/ace-6.5.12+dfsg/ace/MEM_Acceptor.cpp:215:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_UINT16 buf_len = static_cast<ACE_UINT16> ((ACE_OS::strlen (buf) + 1) *
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:124:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_MT_MEM_IO::Simple_Queue::read ()
data/ace-6.5.12+dfsg/ace/MEM_IO.cpp:289:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    buf = this->recv_channel_.queue_.read ();
data/ace-6.5.12+dfsg/ace/MEM_IO.h:95:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ACE_MEM_SAP_Node *read (void);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:89:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    current_fs_name_len_ = strlen (current_fs_name_);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:168:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
MQX_Filesystem::read (int fd, unsigned char *buffer, size_t size)
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:235:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((current_fs_name_len_ + strlen (curdirtmp) + 1) > size)
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.cpp:531:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return MQX_Filesystem::inst ().read (handle, buffer, size);
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.h:22:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# undef read
data/ace-6.5.12+dfsg/ace/MQX_Filesystem.h:85:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t read (int fd, unsigned char *buffer, size_t size);
data/ace-6.5.12+dfsg/ace/Malloc_T.cpp:879:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             ACE_OS::strlen (name) + 1),
data/ace-6.5.12+dfsg/ace/Map_Manager.cpp:374:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      if (this->equal (this->search_structure_[i].ext_id_,
data/ace-6.5.12+dfsg/ace/Map_Manager.h:360:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  int equal (const EXT_ID &id1, const EXT_ID &id2);
data/ace-6.5.12+dfsg/ace/Message_Block.cpp:106:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t buflen = ACE_OS::strlen (buf) + 1;
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:47:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        (char *) this->allocator ()->malloc (ACE_OS::strlen(name)+1),
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:49:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ACE_OS::strlen(name)+1);
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:50:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_OS::memcpy (name_tmp, name, ACE_OS::strlen (name)+1);
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:74:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        (char *) alloc->malloc(ACE_OS::strlen(name)+1),
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:76:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ACE_OS::strlen(name)+1);
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:77:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_OS::memcpy (name_tmp, name, ACE_OS::strlen (name)+1);
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:121:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        (char *) this->allocator ()->malloc (ACE_OS::strlen(name)+1),
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:123:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ACE_OS::strlen(name)+1);
data/ace-6.5.12+dfsg/ace/Metrics_Cache_T.cpp:124:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_OS::memcpy (name_tmp, name, ACE_OS::strlen (name)+1);
data/ace-6.5.12+dfsg/ace/Monitor_Control/BSD_Network_Interface_Monitor.cpp:91:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy (ifdr.ifr_name, ifa->ifa_name, IFNAMSIZ-1);
data/ace-6.5.12+dfsg/ace/Monitor_Control/BSD_Network_Interface_Monitor.cpp:93:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy (ifdr.ifdr_name, ifa->ifa_name, sizeof (ifdr));
data/ace-6.5.12+dfsg/ace/Monitor_Control/CPU_Load_Monitor.cpp:194:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                            ACE_OS::strlen ("cpu_stat"));
data/ace-6.5.12+dfsg/ace/Monitor_Control/Windows_Multi_Instance_Monitor.cpp:57:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          path += ACE_OS::strlen (path) + 1;
data/ace-6.5.12+dfsg/ace/Naming_Context.cpp:49:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:2576:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (str, name, N - M);
data/ace-6.5.12+dfsg/ace/OS_NS_Thread.cpp:4945:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length   = ACE_OS::strlen (string);
data/ace-6.5.12+dfsg/ace/OS_NS_arpa_inet.cpp:38:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        dot = host_name + ACE_OS::strlen (host_name);
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:79:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const lastchar = ACE_OS::strlen (filename);
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:93:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  ACE_TCHAR[lastchar + ACE_OS::strlen (extra) + 1],
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:146:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            ACE_OS::malloc ((ACE_OS::strlen (d->fdata_.cFileName) + 1)
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:232:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ((ACE_OS::strlen (dp->d_name) + 1) * sizeof (ACE_TCHAR));
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:248:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      newdp->d_name = (ACE_TCHAR*) ACE_Allocator::instance()->malloc ((ACE_OS::strlen (dp->d_name) + 1) * sizeof (ACE_TCHAR));
data/ace-6.5.12+dfsg/ace/OS_NS_dirent.cpp:250:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      newdp->d_name = (ACE_TCHAR*) ACE_OS::malloc ((ACE_OS::strlen (dp->d_name) + 1) * sizeof (ACE_TCHAR));
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:88:17:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        ACE_OS::strcpy (reinterpret_cast<char*> (ncb.ncb_callname), "*");
data/ace-6.5.12+dfsg/ace/OS_NS_netdb.cpp:542:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (hp->h_name) >= size_t (host_len))
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:1008:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t len = ACE_OS::strlen (str),
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.cpp:1592:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sb.out (fmt, ACE_OS::strlen (fmt));
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:64:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#if defined (fgetc)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:65:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return fgetc (fp);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:66:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef fgetc
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:68:29:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ACE_STD_NAMESPACE::fgetc (fp);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:87:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#if defined (getc)
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:88:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return getc (fp);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:89:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getc
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:91:29:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ACE_STD_NAMESPACE::getc (fp);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:94:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#elif defined getc
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:95:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# undef getc
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:255:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int fgetc (FILE* fp);
data/ace-6.5.12+dfsg/ace/OS_NS_stdio.h:258:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int getc (FILE* fp);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:127:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (buf, &start[1], var_len);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:136:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t buf_len = ACE_OS::strlen (str) + 1;
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:138:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buf_len += ACE_OS::strlen (temp) - var_len;
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:156:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (p, str, len);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:168:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (p, start, var_len);
data/ace-6.5.12+dfsg/ace/OS_NS_stdlib.cpp:503:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              int tail_len = ACE_OS::strlen (file_name) + 1;
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:23:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *t = (char *) ACE_Allocator::instance()->malloc (ACE_OS::strlen (s) + 1);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:25:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *t = (char *) ACE_OS::malloc (ACE_OS::strlen (s) + 1);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:42:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (wchar_t *) ACE_OS::malloc ((ACE_OS::strlen (s) + 1)
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:86:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (ret_errortext,
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:186:18:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  return ACE_OS::strncpy (buf, strerror (errnum), buflen);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:218:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const len1 = ACE_OS::strlen (s1);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:243:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const len1 = ACE_OS::strlen (s1);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:278:23:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
              ACE_OS::strncat (rdst, rsrc, --rmaxlen);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:304:23:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
              ACE_OS::strncat (rdst, rsrc, --rmaxlen);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:326:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const l_org = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/OS_NS_string.cpp:330:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const l_sub = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:193:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t strlen (const char *s);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:197:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t strlen (const ACE_WCHAR_T *s);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:201:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  char *strncat (char *s, const char *t, size_t len);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:205:16:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  ACE_WCHAR_T *strncat (ACE_WCHAR_T *s, const ACE_WCHAR_T *t, size_t len);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:235:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  char *strncpy (char *s, const char *t, size_t len);
data/ace-6.5.12+dfsg/ace/OS_NS_string.h:239:16:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_WCHAR_T *strncpy (ACE_WCHAR_T *s, const ACE_WCHAR_T *t, size_t len);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_sendfile.cpp:47:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          || ACE_OS::read (in_fd, buf, count) == -1)
data/ace-6.5.12+dfsg/ace/OS_NS_sys_stat.h:136:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  mode_t umask (mode_t cmask);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_uio.cpp:32:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return ACE_OS::read (handle, iov[0].iov_base, iov[0].iov_len);
data/ace-6.5.12+dfsg/ace/OS_NS_sys_uio.cpp:54:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  length = ACE_OS::read (handle, buf, length);
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:134:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (ACE_TCHAR *) ACE_Allocator::instance()->malloc ((ACE_OS::strlen (temp) + quotes + 3)
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:137:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (ACE_TCHAR *) ACE_OS::malloc ((ACE_OS::strlen (temp) + quotes + 3)
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:177:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buf_len += ACE_OS::strlen (argv_p[i]);
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:503:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      n = ACE_OS::read (handle,
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.cpp:637:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t const bytes_read = ACE_OS::read (handle, buf, nbytes);
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:236:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t read (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/ace/OS_NS_unistd.h:241:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t read (ACE_HANDLE handle,
data/ace-6.5.12+dfsg/ace/OS_NS_wchar.cpp:302:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const wchar_t *p = s + ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/OS_NS_wchar.cpp:316:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  wchar_t *p = s + ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/OS_NS_wchar.cpp:357:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = ACE_OS::strlen (charset);
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:283:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_POSIX_Asynch_Read_Stream::read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:510:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_POSIX_Asynch_Read_File::read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:556:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_POSIX_Asynch_Read_File::read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:562:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ACE_POSIX_Asynch_Read_Stream::read (message_block,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.cpp:2033:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (this->rf_.read (*this->mb_,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.h:290:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.h:459:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/POSIX_Asynch_IO.h:476:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/POSIX_Proactor.cpp:658:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->read_stream_.read (this->message_block_,
data/ace-6.5.12+dfsg/ace/POSIX_Proactor.cpp:732:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (-1 == this->read_stream_.read (this->message_block_,
data/ace-6.5.12+dfsg/ace/Pagefile_Memory_Pool.cpp:91:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && ACE_OS::strlen (this->backing_store_name_) < sizeof this->backing_store_name_)
data/ace-6.5.12+dfsg/ace/Parse_Node.cpp:641:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ACE_OS::strlen (func_name)
data/ace-6.5.12+dfsg/ace/Pipe.cpp:284:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_Pipe::ACE_Pipe (ACE_HANDLE read,
data/ace-6.5.12+dfsg/ace/Pipe.cpp:288:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  this->handles_[0] = read;
data/ace-6.5.12+dfsg/ace/Pipe.h:52:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ACE_Pipe (ACE_HANDLE read, ACE_HANDLE write);
data/ace-6.5.12+dfsg/ace/Process.cpp:105:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t curr_len = ACE_OS::strlen (cmd_line_buf);
data/ace-6.5.12+dfsg/ace/Process.cpp:785:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          total += ACE_OS::strlen (str) + 1;
data/ace-6.5.12+dfsg/ace/Process.cpp:795:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          i += ACE_OS::strlen (env + i);
data/ace-6.5.12+dfsg/ace/Process.cpp:807:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      start += ACE_OS::strlen (buffer[i]) + 1;
data/ace-6.5.12+dfsg/ace/Process.cpp:931:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = ACE_OS::strlen (wta.char_rep ());
data/ace-6.5.12+dfsg/ace/Process.cpp:934:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (&temp_narrow_env[idx], wta.char_rep (), len);
data/ace-6.5.12+dfsg/ace/Process.cpp:948:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = ACE_OS::strlen (existing_environment + slot);
data/ace-6.5.12+dfsg/ace/Process.cpp:988:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          ACE_OS::strlen (envp[i])) == -1)
data/ace-6.5.12+dfsg/ace/Process.cpp:1022:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      ACE_OS::strlen (stack_buf)) == -1)
data/ace-6.5.12+dfsg/ace/Process.cpp:1039:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const buflen = ACE_OS::strlen (variable_name) + ACE_OS::strlen (format) + 2;
data/ace-6.5.12+dfsg/ace/Process.cpp:1039:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const buflen = ACE_OS::strlen (variable_name) + ACE_OS::strlen (format) + 2;
data/ace-6.5.12+dfsg/ace/Process.cpp:1113:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      ACE_OS::strlen (safe_stack_buf.get ())) == -1)
data/ace-6.5.12+dfsg/ace/Process.cpp:1291:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            ACE_OS::strlen (command_line_buf_)
data/ace-6.5.12+dfsg/ace/Process.cpp:1292:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              + ACE_OS::strlen (argv[i])
data/ace-6.5.12+dfsg/ace/Read_Buffer.cpp:76:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_Read_Buffer::read (int term, int search, int replace)
data/ace-6.5.12+dfsg/ace/Read_Buffer.cpp:109:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = ACE_OS::getc (this->stream_);
data/ace-6.5.12+dfsg/ace/Read_Buffer.h:74:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  char *read (int terminator = EOF,
data/ace-6.5.12+dfsg/ace/Registry.cpp:652:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            ACE_OS::strlen (STRING_SEPARATOR);
data/ace-6.5.12+dfsg/ace/Remote_Name_Space.cpp:52:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    static_cast<ACE_UINT32> (ACE_OS::strlen (type));
data/ace-6.5.12+dfsg/ace/Remote_Name_Space.cpp:76:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    static_cast<ACE_UINT32> (ACE_OS::strlen (type));
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:252:115:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      this->send_net_if_ = static_cast<ACE_TCHAR*>(ACE_Allocator::instance()->malloc(sizeof(ACE_TCHAR) * (ACE_OS::strlen (net_if) + 1)));
data/ace-6.5.12+dfsg/ace/SOCK_Dgram_Mcast.cpp:254:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      this->send_net_if_ = new ACE_TCHAR[ACE_OS::strlen (net_if) + 1];
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:113:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           ACE_OS::strlen ("localhost")) == 0)
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:135:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += static_cast<int> (ACE_OS::strlen (temp));
data/ace-6.5.12+dfsg/ace/SPIPE_Addr.cpp:141:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            ACE_OS::strlen (addr) + 1 + len);
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_BIO.cpp:120:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static int read (ACE_SSL_Asynch_Stream * stream,
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_BIO.cpp:182:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ACE_SSL_Asynch_Stream_Accessor::read (p_stream,
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_BIO.cpp:272:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t const n = ACE_OS::strlen (str);
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.cpp:320:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_SSL_Asynch_Stream::read (ACE_Message_Block & message_block,
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.cpp:873:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->bio_istream_.read (
data/ace-6.5.12+dfsg/ace/SSL/SSL_Asynch_Stream.h:235:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.cpp:383:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (name);
data/ace-6.5.12+dfsg/ace/SSL/SSL_Context.cpp:622:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = ACE_Utils::truncate_cast<int> (ACE_OS::strlen (seed));
data/ace-6.5.12+dfsg/ace/SString.cpp:122:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->len_ = this->buf_len_ = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/SString.cpp:223:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->len_ = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/SString.cpp:245:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      this->len_ = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/Service_Gestalt.cpp:136:122:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_ALLOCATOR_NORETURN (name_, static_cast<ACE_TCHAR*>(ACE_Allocator::instance()->malloc (sizeof(ACE_TCHAR) * (ACE_OS::strlen(assd->name_)+1))));
data/ace-6.5.12+dfsg/ace/Service_Gestalt.cpp:138:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_NEW_NORETURN (name_, ACE_TCHAR[ACE_OS::strlen(assd->name_)+1]);
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:96:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/Service_Manager.cpp:198:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ssize_t len = static_cast<ssize_t> (ACE_OS::strlen (sr->name ())) + 11;
data/ace-6.5.12+dfsg/ace/Service_Types.cpp:279:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/Service_Types.cpp:369:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:425:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   if (ACE_OS::strlen (*q) >= len)
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:451:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (ACE_OS::strlen (hp->h_name) >= len)
data/ace-6.5.12+dfsg/ace/Sock_Connect.cpp:1267:14:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
      while (fscanf (fp,
data/ace-6.5.12+dfsg/ace/Stack_Trace.cpp:276:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = ACE_OS::strlen (this->buf_);
data/ace-6.5.12+dfsg/ace/Stream_Modules.cpp:144:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (name));
data/ace-6.5.12+dfsg/ace/Stream_Modules.cpp:288:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (name));
data/ace-6.5.12+dfsg/ace/Stream_Modules.cpp:367:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return static_cast<int> (ACE_OS::strlen (name));
data/ace-6.5.12+dfsg/ace/String_Base.cpp:342:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/String_Base.cpp:417:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/String_Base.cpp:430:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/String_Base.cpp:594:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/String_Base.cpp:607:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tlen = ACE_OS::strlen (t);
data/ace-6.5.12+dfsg/ace/String_Base.cpp:641:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:257:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      result = ACE_OS::strlen (param->source.directive +
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:432:25:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                ACE_OS::strncpy (str, buffer->input_ + buffer->index_,
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:603:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          param->buffer->size_ = ACE_OS::strlen (target) + skip_bytes;
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:632:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (target, ACE_TEXT_CHAR_TO_TCHAR (source), source_size);
data/ace-6.5.12+dfsg/ace/Svc_Conf_Lexer.cpp:636:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = ACE_OS::strlen (target);
data/ace-6.5.12+dfsg/ace/Svc_Conf_y.cpp:894:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#   define ace_yystrlen strlen
data/ace-6.5.12+dfsg/ace/Token_Request_Reply.cpp:64:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t token_len = ACE_OS::strlen (this->token_name_);
data/ace-6.5.12+dfsg/ace/Token_Request_Reply.cpp:81:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     + ACE_OS::strlen (this->token_name_) + 1
data/ace-6.5.12+dfsg/ace/Token_Request_Reply.cpp:82:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     + ACE_OS::strlen (this->client_id_) + 1
data/ace-6.5.12+dfsg/ace/UNIX_Addr.cpp:47:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  ACE_OS::strlen (this->unix_addr_.sun_path));
data/ace-6.5.12+dfsg/ace/UNIX_Addr.cpp:143:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            ACE_OS::strlen (this->unix_addr_.sun_path));
data/ace-6.5.12+dfsg/ace/UPIPE_Acceptor.cpp:101:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (ACE_OS::read (new_stream.get_handle (),
data/ace-6.5.12+dfsg/ace/UTF8_Encoding_Converter.cpp:63:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (targetStart,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:384:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_WIN32_Asynch_Read_Stream::read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:1257:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_WIN32_Asynch_Read_File::read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:1421:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_WIN32_Asynch_Read_File::read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.cpp:1427:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ACE_WIN32_Asynch_Read_Stream::read (message_block,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:324:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:673:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/WIN32_Asynch_IO.h:731:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &message_block,
data/ace-6.5.12+dfsg/ace/config-mqx.h:154:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getchar
data/ace-6.5.12+dfsg/ace/config-mqx.h:158:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define getc(X) _io_fgetc(X)
data/ace-6.5.12+dfsg/ace/config-mqx.h:161:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#ifdef fgetc
data/ace-6.5.12+dfsg/ace/config-mqx.h:162:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef fgetc
data/ace-6.5.12+dfsg/ace/config-mqx.h:163:12:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline int fgetc(FILE* f) {
data/ace-6.5.12+dfsg/ace/config-mqx.h:189:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#ifdef read
data/ace-6.5.12+dfsg/ace/config-mqx.h:190:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef read
data/ace-6.5.12+dfsg/ace/config-mqx.h:191:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline int read(FILE* f, const void* b, int a) {
data/ace-6.5.12+dfsg/ace/config-win32-dmc.h:89:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#undef umask;
data/ace-6.5.12+dfsg/ace/os_include/os_ulimit.h:26:18:  [1] (obsolete) ulimit:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name, which is NOT obsolete) (CWE-676). Use getrlimit(2),
  setrlimit(2), and sysconf(3) instead.
#  include /**/ <ulimit.h>
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Connection_Handler.cpp:58:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (pci.host_) > 0)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/File_Parser.cpp:84:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((c = ACE_OS::getc (this->infile_)) != EOF && c != '\n')
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/File_Parser.cpp:149:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((c = ACE_OS::getc (this->infile_)) != '\n' && c != EOF)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.cpp:70:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ACE_OS::read (h, buf, sizeof (buf));
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.cpp:170:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*strp, buf, length);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Gateway.cpp:171:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_OS::strlen (buf);
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:194:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (ACE_OS::strlen (flag) > 1)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:202:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (ACE_OS::strlen (flag) > 1)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:213:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (this->consumer_config_file_,
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:229:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (ACE_OS::strlen (flag) > 1)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:237:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (ACE_OS::strlen (flag) > 1)
data/ace-6.5.12+dfsg/apps/Gateway/Gateway/Options.cpp:249:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (this->connection_config_file_,
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:125:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (ACE_OS::strlen (flag) > 1)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:133:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (ACE_OS::strlen (flag) > 1)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:152:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (ACE_OS::strlen (flag) > 1)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Options.cpp:160:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (ACE_OS::strlen (flag) > 1)
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:124:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ssize_t n = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:817:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*strp, buf, length);
data/ace-6.5.12+dfsg/apps/Gateway/Peer/Peer.cpp:818:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_OS::strlen (buf);
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob.cpp:27:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ACE_Blob::read (ACE_Message_Block *mb, size_t length, size_t offset)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob.h:61:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block *mb, size_t length, size_t offset);
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:98:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (MAX_HEADER_SIZE < (ACE_OS::strlen (request_prefix_)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:99:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         + ACE_OS::strlen (filename_)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:100:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         + ACE_OS::strlen (request_suffix_) + 4))
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:271:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (request_prefix_)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:272:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (filename_)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/Blob_Handler.cpp:273:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (request_suffix_)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/blobby.cpp:61:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (blob.read (&mb, options->length_, options->offset_) == -1)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Blobby/blobby.cpp:95:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (ACE_OS::read (h, mb.wr_ptr (), total) != total)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_client.cpp:38:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int len = ACE_OS::strlen (s);
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:25:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen ("GET ")
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:26:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (path)
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:27:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (" HTTP/1.0\r\nAccept: HTTP/1.0\r\n\r\n");
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:112:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              count = ACE_OS::strlen (last);
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:220:27:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
                  ACE_OS::strcpy (path, "/");
data/ace-6.5.12+dfsg/apps/JAWS/clients/Caching/http_handler.cpp:226:20:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      else ACE_OS::strcpy (path, "/");
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Handler.cpp:82:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          this->io_.read (message_block, next_read_size);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:32:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_NEW_RETURN (buf, char[ACE_OS::strlen (httpdate) + 1], (time_t) -1);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:66:9:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
  if (::sscanf(buf, "%3s,;%2d;%3s;%4d;%2d:%2d:%2d;GMT", // RFC-1123 date format
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:82:14:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
  else if (::sscanf(buf, "%3s;%3s;%2d;%2d:%2d:%2d;%4d", // ASCTIME date format.
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Helpers.cpp:214:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (int i = ACE_OS::strlen (HTTP_Helper::alphabet_) - 1;
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:99:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  mb.wr_ptr (ACE_OS::strlen(mb.rd_ptr ()) - mb.length ());
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:154:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_OS::memmove (buf, ptr, ACE_OS::strlen (ptr)+1);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:416:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (uri_string == 0 || ACE_OS::strlen (uri_string) == 0)
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:464:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = ACE_OS::strlen (cgi_path_next);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Request.cpp:645:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          ACE_OS::strcat (buf, "/");
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:198:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          char *buf = new char [ACE_OS::strlen (hv)];
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:276:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p = q = buf + ACE_OS::strlen (buf);
data/ace-6.5.12+dfsg/apps/JAWS/server/HTTP_Response.cpp:377:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      HTTP_HEADER_LENGTH = ACE_OS::strlen (HTTP_HEADER);
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:59:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
JAWS_Synch_IO::read (ACE_Message_Block &mb,
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:203:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
JAWS_Asynch_IO::read (ACE_Message_Block& mb,
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:209:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      || ar.read (mb, size) == -1)
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:231:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  || ar.read (result.message_block (),
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:295:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              || ar.read (*mb, mb->size () - mb->length (), handle) == -1)
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.cpp:444:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
JAWS_Synch_IO_No_Cache::read (ACE_Message_Block &mb, int size)
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.h:53:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual void read (ACE_Message_Block& mb, int size) = 0;
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.h:144:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  void read (ACE_Message_Block& mb, int size);
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.h:188:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  void read (ACE_Message_Block& mb, int size);
data/ace-6.5.12+dfsg/apps/JAWS/server/JAWS_IO.h:260:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  void read (ACE_Message_Block& mb, int size);
data/ace-6.5.12+dfsg/apps/JAWS/server/Parse_Headers.cpp:67:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_OS::memmove (header_line, ptr, ACE_OS::strlen(ptr) + 1);
data/ace-6.5.12+dfsg/apps/JAWS/server/Parse_Headers.cpp:91:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ACE_OS::memmove (ptr, ptr+offset, ACE_OS::strlen (ptr + offset) + 1);
data/ace-6.5.12+dfsg/apps/JAWS/server/Parse_Headers.cpp:103:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          ACE_OS::memmove (ptr, ptr+offset, ACE_OS::strlen (ptr + offset) + 1);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/benchd.cpp:56:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      int readresult = ACE_OS::read (h, buf, BUFSIZ);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/connection.cpp:12:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hostname_with_port = new char[ACE_OS::strlen(hostname_opt_port) + 3];
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/connection.cpp:63:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int connection::read(void *buffer, size_t maxlen, unsigned int timeout_seconds) {
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/connection.h:9:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read(void *buffer, size_t maxlen, unsigned int timeout_seconds = 60);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp:36:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  webserver.write_n(request, ACE_OS::strlen(request)) ;
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/http_tester.cpp:42:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    num_read = webserver.read(buffer, sizeof buffer);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp:15:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    protocol_ = (char *) ACE_OS::malloc(ACE_OS::strlen(temp) + 1);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp:20:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hostname_ = (char *) ACE_OS::malloc(ACE_OS::strlen(temp) + 1);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp:24:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    filename_ = (char *) ACE_OS::malloc(ACE_OS::strlen(temp) + 1);
data/ace-6.5.12+dfsg/apps/JAWS/stress_testing/util.cpp:28:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    filename_ = (char *) ACE_OS::malloc(ACE_OS::strlen(INDEX_NAME) + 1);
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_base.cpp:204:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    = ACE_OS::strlen (data->header_value ())
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/http_base.cpp:205:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    + ACE_OS::strlen (data2->header_value ())
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_url.cpp:52:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (this->url_) > 3 && ACE_OS::strstr ("://", this->url_))
data/ace-6.5.12+dfsg/apps/JAWS2/HTTPU/parse_url.cpp:308:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!yes && (ACE_OS::strlen (path) >= 3))
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Parse.cpp:57:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      io->read (handler, data, next_read_size);
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Read.cpp:42:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  io->read (handler, data, data->size ());
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:96:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          ACE_OS::strcat (buf, "/");
data/ace-6.5.12+dfsg/apps/JAWS2/HTTP_10_Request.cpp:110:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          ACE_OS::strcat (buf, ".");
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/IO_Handler.cpp:405:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  || ar.read (result.message_block (),
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:86:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
JAWS_Synch_IO::read (JAWS_IO_Handler *ioh,
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:168:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              count = ACE_OS::read (handle, buf, sizeof (buf));
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:360:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
JAWS_Asynch_IO::read (JAWS_IO_Handler *ioh,
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:374:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      || ar.read (*mb, size) == -1)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.cpp:420:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              || ar.read (*mb, mb->size () - mb->length (), handle) == -1)
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.h:64:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual void read (JAWS_IO_Handler *ioh,
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.h:124:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual void read (JAWS_IO_Handler *ioh,
data/ace-6.5.12+dfsg/apps/JAWS2/JAWS/Jaws_IO.h:184:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  virtual void read (JAWS_IO_Handler *ioh,
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:51:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t random_request_length = ACE_OS::strlen (random_request);
data/ace-6.5.12+dfsg/apps/JAWS3/bench/rqfiles.cpp:222:23:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((c = ACE_OS::fgetc (fp)) != EOF)
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Asynch_IO.cpp:58:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      || asynch_read_stream.read (*mb, mb->space (), act) == -1)
data/ace-6.5.12+dfsg/apps/JAWS3/jaws3/Reactive_IO.cpp:422:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      count = ACE_OS::read (this->source_, mb->wr_ptr (), mb->space ());
data/ace-6.5.12+dfsg/apps/drwho/BS_Server.cpp:70:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (last_lookup, key_name, max_len);
data/ace-6.5.12+dfsg/apps/drwho/File_Manager.cpp:135:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          ACE_OS::strcat (directory, "/");
data/ace-6.5.12+dfsg/apps/drwho/PMC_All.cpp:81:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int length = ACE_OS::strlen (prp->set_real (ACE::strnew (protocol_record.get_real ())));
data/ace-6.5.12+dfsg/apps/drwho/PMC_Flo.cpp:106:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int length = ACE_OS::strlen (prp->get_real ());
data/ace-6.5.12+dfsg/apps/drwho/PMC_Ruser.cpp:85:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int length = ACE_OS::strlen (prp->get_host ());
data/ace-6.5.12+dfsg/apps/drwho/PMS_All.cpp:31:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf_ptr += ACE_OS::strlen (buf_ptr) + 1;
data/ace-6.5.12+dfsg/apps/drwho/PMS_Flo.cpp:29:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf_ptr += ACE_OS::strlen (buf_ptr) + 1;
data/ace-6.5.12+dfsg/apps/drwho/PMS_Ruser.cpp:32:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf_ptr += ACE_OS::strlen (buf_ptr) + 1;
data/ace-6.5.12+dfsg/apps/drwho/PMS_Ruser.cpp:121:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buf_ptr += ACE_OS::strlen (buf_ptr);
data/ace-6.5.12+dfsg/apps/drwho/PM_Server.cpp:70:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buf_ptr += ACE_OS::strlen (buf_ptr) + 1;
data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.cpp:37:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  this->rwho_dir.read ();
data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.cpp:38:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  this->rwho_dir.read ();
data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.cpp:75:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  for (dirent *dir_ptr = this->rwho_dir.read ();
data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.cpp:77:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       dir_ptr = this->rwho_dir.read ())
data/ace-6.5.12+dfsg/apps/drwho/Rwho_DB_Manager.cpp:86:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ACE_OS::read (user_file,
data/ace-6.5.12+dfsg/apps/gperf/src/Hash_Table.cpp:52:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t keysig_width = option.max_keysig_size () > ACE_OS::strlen ("keysig")
data/ace-6.5.12+dfsg/apps/gperf/src/Hash_Table.cpp:54:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        : ACE_OS::strlen ("keysig");
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:46:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  char [ACE_OS::strlen (str) + 1],
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:114:24:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  for (int i = 0; (c = getchar ()) != EOF; i++)
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:118:15:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          c = getchar ();
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:122:27:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              while ((c = getchar ()) != '\n')
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:167:11:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = getchar ();
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:171:17:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  else if ((c = getchar ()) != '{')
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:213:23:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              ACE_OS::strncpy (return_type,
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:224:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (struct_tag,
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:259:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      char *buffer = input.read ('\n');
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:277:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
               (0 != (buffer = input.read ('\n')))
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:576:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        new char[ACE_OS::strlen (s)
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:577:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 + 2 * ACE_OS::strlen (option.key_name ()) + 1];
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:991:19:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          int c = getchar ();
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1080:19:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          int c = getchar ();
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1788:23:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              int c = getchar ();
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1878:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  u_int keysig_width = option.max_keysig_size () > ACE_OS::strlen ("keysig")
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1880:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    : static_cast<u_int> (ACE_OS::strlen ("keysig"));
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1883:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t keyword_width = key_length > ACE_OS::strlen ("keysig")
data/ace-6.5.12+dfsg/apps/gperf/src/Key_List.cpp:1885:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    : ACE_OS::strlen ("keysig");
data/ace-6.5.12+dfsg/apps/gperf/tests/test.cpp:22:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = ACE_OS::strlen (buf) - 1;
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:90:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cpos = source_line_ + ACE_OS::strlen(source_line_);
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:117:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          line_data_ = cpos + ACE_OS::strlen(tags_[i]);
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:231:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen(ace_src_) > 0)
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:301:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *target = new char [ACE_OS::strlen(ace_src_) + ACE_OS::strlen(tgt) + 6];
data/ace-6.5.12+dfsg/apps/mkcsregdb/mkcsregdb.cpp:301:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *target = new char [ACE_OS::strlen(ace_src_) + ACE_OS::strlen(tgt) + 6];
data/ace-6.5.12+dfsg/apps/soreduce/Obj_Module.cpp:71:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while (!eoln && ACE_OS::read(src,&dummy,1) == 1) {
data/ace-6.5.12+dfsg/apps/soreduce/Obj_Module.cpp:77:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (!eoln && ACE_OS::read(src,(*buf)->wr_ptr(),1) == 1) {
data/ace-6.5.12+dfsg/apps/soreduce/Obj_Module.cpp:141:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (ACE_OS::read(pipe[0],&dummy,1) != 1) {
data/ace-6.5.12+dfsg/apps/soreduce/Obj_Module.cpp:152:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (ACE_OS::read(pipe[0],&dummy,1) != 1)
data/ace-6.5.12+dfsg/apps/soreduce/SO_Group.cpp:66:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((nread = ACE_OS::read (pipe[0], line,1)) == 1
data/ace-6.5.12+dfsg/apps/soreduce/SO_Group.cpp:80:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((nread = ACE_OS::read (pipe[0], line + len, 1)) == 1
data/ace-6.5.12+dfsg/apps/soreduce/SO_Group.cpp:119:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (ACE_OS::read (pipe[0], line, 3) != 3)
data/ace-6.5.12+dfsg/apps/soreduce/SO_Group.cpp:127:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((nread = ACE_OS::read(pipe[0],line + len,1)) == 1 &&
data/ace-6.5.12+dfsg/apps/soreduce/SO_Group.cpp:149:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((nread = ACE_OS::read (pipe[0], line, 1)) == 1
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:285:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                  strcat (abspath, "\n");
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:321:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen (msg);    // size_t -> int
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:345:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      WriteFile (logf, msg, (DWORD)strlen(msg), &bl, 0);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:379:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       token != 0 && (cmdchars + strlen (token) + 1) < CMDLINE_LEN;
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:388:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cmdchars += (strlen (token) + 1);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:582:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen (errmsg);
data/ace-6.5.12+dfsg/bin/LabVIEW_RT/labview_test_controller/labview_test_controller.cpp:594:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (errmsg, "\n");
data/ace-6.5.12+dfsg/examples/ASX/CCM_App/SC_Server.cpp:25:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t n = ACE_OS::read (handle, buf, sizeof buf);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Consumer_Router.cpp:154:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*strp, module_name, length);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Consumer_Router.cpp:156:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_Utils::truncate_cast<int> (ACE_OS::strlen (module_name));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Event_Analyzer.cpp:77:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*strp, module_name, length);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Event_Analyzer.cpp:79:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_Utils::truncate_cast<int> (ACE_OS::strlen (module_name));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Supplier_Router.cpp:161:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*strp, module_name, length);
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/Supplier_Router.cpp:163:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_Utils::truncate_cast<int> (ACE_OS::strlen (module_name));
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Event_Server/event_server.cpp:90:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t n = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/examples/ASX/Event_Server/Transceiver/transceiver.cpp:172:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t n = ACE_OS::read (ACE_STDIN, buf, sizeof buf);
data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/bounded_buffer.cpp:33:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      n = ACE_OS::read (ACE_STDIN, mb->wr_ptr (), mb->size ());
data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/buffer_stream.cpp:139:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      n = ACE_OS::read (ACE_STDIN, mb->wr_ptr (), BUFSIZ);
data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/buffer_stream.cpp:210:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       ACE_OS::strlen (mb->rd_ptr ()));
data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/buffer_stream.cpp:237:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (buf, mb->rd_ptr (), sizeof buf);
data/ace-6.5.12+dfsg/examples/ASX/Message_Queue/priority_buffer.cpp:74:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      char *buffer = rb.read ('\n');
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.cpp:133:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*strp, module_name, length);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Consumer_Router.cpp:135:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_Utils::truncate_cast<int> (ACE_OS::strlen (module_name));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Event_Analyzer.cpp:68:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*strp, module_name, length);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Event_Analyzer.cpp:70:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_Utils::truncate_cast<int> (ACE_OS::strlen (module_name));
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.cpp:132:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*strp, module_name, length);
data/ace-6.5.12+dfsg/examples/ASX/UPIPE_Event_Server/Supplier_Router.cpp:134:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_Utils::truncate_cast<int> (ACE_OS::strlen (module_name));
data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/BPR_Drivers_T.cpp:229:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ACE_OS::read (ACE_STDIN, buf, bufsiz);
data/ace-6.5.12+dfsg/examples/Bounded_Packet_Relay/Thread_Bounded_Packet_Relay.cpp:88:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      index_ = (index_ + 1) % ACE_OS::strlen (text_);
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp:36:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return this->ar_.read (this->mb_,
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp:58:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      this->ar_.read (this->mb_, this->mb_.size ());
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-acceptor.cpp:131:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (rendezvous_,
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.cpp:58:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int length = ACE_Utils::truncate_cast<int> (ACE_OS::strlen (buffer));
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.cpp:77:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t n = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/examples/Connection/blocking/SPIPE-connector.cpp:211:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (rendezvous_,
data/ace-6.5.12+dfsg/examples/Connection/misc/test_upipe.h:66:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((n = ACE_OS::read (ACE_STDIN, buf, sizeof buf)) > 0)
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.cpp:72:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t n = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/examples/Connection/non_blocking/CPP-connector.cpp:105:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t n = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/examples/IPC_SAP/DEV_SAP/writer/writer.cpp:47:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       ACE_OS::read (ACE_STDIN, &writeto, 1) != -1;
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-Msg-client.cpp:24:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      msg.len = ACE_OS::strlen (buf) + 1;
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-client.cpp:18:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ssize_t n = ACE_Utils::truncate_cast<ssize_t> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/examples/IPC_SAP/FIFO_SAP/FIFO-test.cpp:59:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((len = ACE_OS::read (inputfd, buf, sizeof buf)) > 0)
data/ace-6.5.12+dfsg/examples/IPC_SAP/FILE_SAP/client.cpp:20:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_TCHAR *readback = new ACE_TCHAR[ACE_OS::strlen (argv[1]) + 1];
data/ace-6.5.12+dfsg/examples/IPC_SAP/FILE_SAP/client.cpp:39:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_Utils::truncate_cast<ssize_t> (ACE_OS::strlen (argv[2]) + 1);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/C-inclient.cpp:68:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((r_bytes = ACE_OS::read (ACE_STDIN, buf, sizeof buf)) > 0)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:55:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->message_len_ = ACE_OS::strlen ("TAO");
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:99:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
Options::read (void *buf, size_t len, size_t &iteration)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:104:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return ACE_OS::read (ACE_STDIN, buf, len);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:264:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (r_bytes = options->read (request, len, iteration)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:269:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ACE_OS::strlen (options->quit_string ())) == 0)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:321:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (r_bytes = options->read (request, len, iteration)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.cpp:326:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ACE_OS::strlen (options->quit_string ())) == 0)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-inclient.h:41:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t read (void *buf, size_t len, size_t &iterations);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-memclient.cpp:29:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      stream.send (buf, ACE_OS::strlen (buf)+1);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/CPP-unclient.cpp:32:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (r_bytes = ACE_OS::read (ACE_STDIN, buf, sizeof buf)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/FD-unserver.cpp:34:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (n = ACE_OS::read (handle, buf, sizeof buf)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/FD-unserver.cpp:40:93:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_DEBUG ((LM_DEBUG, "(%s, %d) ----------------------------------------\n", buf, ACE_OS::strlen (buf)));
data/ace-6.5.12+dfsg/examples/IPC_SAP/SOCK_SAP/FD-unserver.cpp:43:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (stream.send_n (buf, ACE_OS::strlen (buf)) == -1)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/NPClient.cpp:46:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size = ACE_Utils::truncate_cast<int> (ACE_OS::strlen (buf) + 1);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/client.cpp:29:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ssize_t len = ACE_OS::strlen (argv[1]) + 1;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SPIPE_SAP/server.cpp:59:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            ssize_t n = ACE_OS::read (handle, buf, sizeof buf);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:31:11:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  ACE_OS::strcpy (quit_string_, "q");
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:47:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->message_len_ = ACE_OS::strlen ("TAO");
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:83:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
Options::read (void *buf, size_t len, size_t &iteration)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:86:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return ACE_OS::read (ACE_STDIN, buf, len);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:125:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        ACE_OS::strncpy (this->quit_string_,
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:228:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (r_bytes = this->read (request, len, iteration)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:233:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ACE_OS::strlen (this->quit_string ())) == 0)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:278:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (r_bytes = this->read (request, len, iteration)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.cpp:283:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ACE_OS::strlen (this->quit_string ())) == 0)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client-simple.h:38:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t read (void *buf, size_t len, size_t &iterations);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:34:11:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  ACE_OS::strcpy (quit_string_, "q");
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:51:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->message_len_ = ACE_OS::strlen ("TAO");
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:93:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
Options::read (void *buf, size_t len, size_t &iteration)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:98:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return ACE_OS::read (ACE_STDIN, buf, len);
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:137:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        ACE_OS::strncpy (this->quit_string_,
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:255:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (r_bytes = options->read (request, len, iteration)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:260:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ACE_OS::strlen (options->quit_string ())) == 0)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:312:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (r_bytes = options->read (request, len, iteration)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.cpp:317:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ACE_OS::strlen (options->quit_string ())) == 0)
data/ace-6.5.12+dfsg/examples/IPC_SAP/SSL_SAP/SSL-client.h:43:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t read (void *buf, size_t len, size_t &iterations);
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-ATM-client.cpp:135:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (r_bytes = ACE_OS::read (ACE_STDIN, buf, sizeof buf)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/CPP-client.cpp:67:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (r_bytes = ACE_OS::read (ACE_STDIN, buf, sizeof buf)) > 0;
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/db-client.cpp:31:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = ACE_OS::strlen (buf);
data/ace-6.5.12+dfsg/examples/IPC_SAP/TLI_SAP/ftp-client.cpp:36:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  for (int n; (n = ACE_OS::read (fd, buf, sizeof buf)) > 0; )
data/ace-6.5.12+dfsg/examples/Logger/Acceptor-server/server_loggerd.cpp:199:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (this->peer_name_,
data/ace-6.5.12+dfsg/examples/Logger/simple-server/Logging_Handler.cpp:158:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (this->host_name_,
data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/IO_Test.cpp:47:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while (ACE_OS::read (ifd, &c, sizeof c) > 0)
data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/IO_Test.cpp:75:27:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((c = ACE_OS::getc (input_fp)) != EOF)
data/ace-6.5.12+dfsg/examples/Mem_Map/IO-tests/IO_Test.cpp:106:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((n = ACE_OS::read (ifd,
data/ace-6.5.12+dfsg/examples/Misc/test_XtReactor1.cpp:89:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (ACE_OS::read (ACE_STDIN, &c, 1) == 1)
data/ace-6.5.12+dfsg/examples/Misc/test_XtReactor2.cpp:21:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (ACE_OS::read (ACE_STDIN, &c, 1)==1)
data/ace-6.5.12+dfsg/examples/Misc/test_read_buffer.cpp:21:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((buf = rb.read (term, search, replace)) != 0)
data/ace-6.5.12+dfsg/examples/Monitor/Message_Queue_Size/message_queue_size.cpp:93:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          mb = new ACE_Message_Block (ACE_OS::strlen (msg) + 1);
data/ace-6.5.12+dfsg/examples/OS/Process/imore.cpp:176:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((len = ACE_OS::read (infd, buffer, BUFSIZ)) > 0)
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:317:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (cmd_line, ACE_TEXT ("-a"), sizeof (cmd_line));
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:421:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ACE_OS::strlen (existing_environment + size) + 1);
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:423:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_OS::memcpy (environment + (ACE_OS::strlen (environment) + 1),
data/ace-6.5.12+dfsg/examples/OS/Process/process.cpp:430:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (cmd_line, ACE_TEXT ("process -g"), sizeof (cmd_line));
data/ace-6.5.12+dfsg/examples/QOS/Change_Receiver_FlowSpec/Sender_QoS_Event_Handler.cpp:119:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iov[0].iov_len = ACE_OS::strlen(msg);
data/ace-6.5.12+dfsg/examples/QOS/Change_Sender_TSpec/Sender_QoS_Event_Handler.cpp:119:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iov[0].iov_len = ACE_OS::strlen(msg);
data/ace-6.5.12+dfsg/examples/QOS/Diffserv/diffserv_test.cpp:126:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          ret2 = sock.send(buf, ACE_OS::strlen(buf));
data/ace-6.5.12+dfsg/examples/QOS/Simple/Sender_QoS_Event_Handler.cpp:120:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_Utils::truncate_cast<u_long> (ACE_OS::strlen (msg));
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/CODgram.cpp:146:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (buf);
data/ace-6.5.12+dfsg/examples/Reactor/Dgram/Dgram.cpp:154:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (buf);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/notification.cpp:200:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t n = ACE_OS::read (handle, buf, sizeof buf);
data/ace-6.5.12+dfsg/examples/Reactor/Misc/pingpong.cpp:75:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  : buflen_ (ACE_OS::strlen (b) + 1 + (2 * sizeof (int))),
data/ace-6.5.12+dfsg/examples/Reactor/Misc/test_demuxing.cpp:232:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t n = ACE_OS::read (handle, buf, sizeof buf);
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/Log_Wrapper.cpp:67:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_Utils::truncate_cast<ACE_INT32> (ACE_OS::strlen (message) + 1);
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/client.cpp:102:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          ssize_t nbytes = ACE_OS::read (ACE_STDIN, buf, max_message_size);
data/ace-6.5.12+dfsg/examples/Reactor/Multicast/server.cpp:174:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (char *message_end = this->message_ + ACE_OS::strlen (this->message_) - 1;
data/ace-6.5.12+dfsg/examples/Reactor/Ntalker/ntalker.cpp:62:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ssize_t result = ACE_OS::read (h, buf, BUFSIZ);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/simple_test_proactor.cpp:143:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rf_.read (*mb, mb->size () - 1) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb.cpp:95:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->buffer_read_ = new char [strlen (this->buffer_write_) + 1];
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb.cpp:112:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->aiocb_write_->aio_nbytes = strlen (this->buffer_write_);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb.cpp:132:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->aiocb_read_->aio_nbytes = strlen (this->buffer_write_);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb_ace.cpp:106:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  char [ACE_OS::strlen (this->buffer_write_)],
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb_ace.cpp:125:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->aiocb_write_->aio_nbytes = ACE_OS::strlen (this->buffer_write_);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_aiocb_ace.cpp:145:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->aiocb_read_->aio_nbytes = ACE_OS::strlen (this->buffer_write_);
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.cpp:99:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (this->mb_,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_cancel.cpp:140:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (this->rs_.read (this->mb_,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:173:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (*mb,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:351:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                               ACE_OS::strlen (data));
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:352:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->welcome_message_.wr_ptr (ACE_OS::strlen (data));
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor.cpp:501:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rf_.read (*mb,
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:235:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (*mb, mb->size ()- 1) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:416:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->welcome_message_.init (data, ACE_OS::strlen (data));
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:489:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  welcome_message_.wr_ptr (ACE_OS::strlen (data));
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor2.cpp:522:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (*mb, mb->size ()- 1) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:291:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (*mb, mb->size ()- 1) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:472:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  this->welcome_message_.init (data, ACE_OS::strlen (data));
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:543:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  welcome_message_.wr_ptr (ACE_OS::strlen (data));
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_proactor3.cpp:572:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (*mb, mb->size ()- 1) == -1)
data/ace-6.5.12+dfsg/examples/Reactor/Proactor/test_udp_proactor.cpp:287:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msg->copy (raw_msg, ACE_OS::strlen (raw_msg) + 1);
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Console_Input.cpp:45:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int result = ACE_OS::read (ACE_STDIN, buffer, sizeof buffer);
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Handle_Close.cpp:43:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = ACE_OS::strlen (data);
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:343:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  result = this->rd_stream_.read (this->mb_,
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:391:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rd_stream_.read (this->mb_,
data/ace-6.5.12+dfsg/examples/Reactor/WFMO_Reactor/Talker.cpp:484:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      int read_result = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/broadcast_client_test.cpp:54:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (sd.send (buf, ACE_OS::strlen (buf), broadcast_port_number) == -1)
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_dgram_client_test.cpp:101:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               ACE_OS::strlen (name) + 1,
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_pipe_client_test.cpp:80:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((n = ACE_OS::read (fd1, buf, sizeof buf)) > 0)
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/local_pipe_client_test.cpp:89:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((n = ACE_OS::read (fd_read[0],
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_service_directory_test.cpp:80:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (buf) + 1) == -1)
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/client/remote_stream_client_test.cpp:84:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_Utils::truncate_cast<u_long> (ACE_OS::strlen (file_name));
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_L_Pipe.cpp:40:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ((n = ACE_OS::read (fd1, buf, sizeof buf)) == -1)
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:55:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (*strp, buf, length);
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:58:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_Utils::truncate_cast<int> (ACE_OS::strlen (buf));
data/ace-6.5.12+dfsg/examples/Service_Configurator/IPC-tests/server/Handle_Thr_Stream.cpp:170:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (this->peer ().send_n (buf, ACE_OS::strlen (buf) + 1) == -1)
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_multiple_mallocs.cpp:74:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            shmem_request->malloc (ACE_OS::strlen (request_string) + 1),
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_multiple_mallocs.cpp:106:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            shmem_response->malloc (ACE_OS::strlen (response_string) + 1),
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:34:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = ACE_OS::strlen (name) + 1;
data/ace-6.5.12+dfsg/examples/Shared_Malloc/test_persistence.cpp:48:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = ACE_OS::strlen (name) + 1;
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/test.h:21:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (this->username_, user, 9);
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/test.h:22:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (this->mtext_, text, MSGSZ);
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/test.h:28:37:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  void user (char user[]) { ACE_OS::strncpy (this->username_, user, 9); }
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/test.h:30:37:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  void text (char text[]) { ACE_OS::strncpy (this->mtext_, text, MSGSZ); }
data/ace-6.5.12+dfsg/examples/System_V_IPC/SV_Message_Queues/test.h:31:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int length (void) { return sizeof *this - sizeof this->mtext_ + ACE_OS::strlen (this->mtext_) + 1; }
data/ace-6.5.12+dfsg/examples/Threads/barrier2.cpp:227:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = ACE_OS::strlen (str);
data/ace-6.5.12+dfsg/examples/Threads/barrier2.cpp:239:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  n = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:182:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_NEW (this->name_, char[ACE_OS::strlen (newname) + 1]);
data/ace-6.5.12+dfsg/examples/Threads/future1.cpp:260:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_NEW_RETURN (the_name, char[ACE_OS::strlen (this->name_) + 1], 0);
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:182:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_NEW (this->name_, char[ACE_OS::strlen (newname) + 1]);
data/ace-6.5.12+dfsg/examples/Threads/future2.cpp:256:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_NEW_RETURN (the_name, char[ACE_OS::strlen (this->name_) + 1], 0);
data/ace-6.5.12+dfsg/examples/Threads/thread_pool.cpp:167:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          n = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/examples/Threads/thread_pool.cpp:178:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          n = ACE_Utils::truncate_cast<int> (ACE_OS::strlen (mb->rd_ptr ()));
data/ace-6.5.12+dfsg/examples/Threads/thread_specific.cpp:105:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ACE_OS::read (ACE_INVALID_HANDLE, 0, 0);
data/ace-6.5.12+dfsg/examples/Timer_Queue/Driver.cpp:97:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ACE_OS::read (ACE_STDIN, buf, bufsiz);
data/ace-6.5.12+dfsg/examples/Web_Crawler/HTTP_URL.cpp:28:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (this->url_addr ().get_path_name ())
data/ace-6.5.12+dfsg/examples/Web_Crawler/HTTP_URL.cpp:29:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (this->url_addr ().get_host_name ())
data/ace-6.5.12+dfsg/examples/Web_Crawler/HTTP_URL.cpp:48:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              ACE_OS::strlen (cmd_ptr.get ()),
data/ace-6.5.12+dfsg/examples/Web_Crawler/HTTP_URL.cpp:59:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                ACE_OS::strlen (cmd_ptr.get ()),
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:21:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (ipaddr_format == 0 ?
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:24:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen ("65536") // Assume the max port number.
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:25:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (this->get_path_name ())
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:50:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (ipaddr_format == 0 ?
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:53:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen ("65536") // Assume the max port number.
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:54:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (this->get_path_name ())
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Addr.cpp:96:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (ACE_OS::strlen (path_name + 1) > 0)
data/ace-6.5.12+dfsg/examples/Web_Crawler/URL_Visitor.cpp:123:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     ACE_OS::strlen (this->url_.url_addr ().get_path_name ()),
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/Dump_Restore.cpp:332:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
           (temp = read_buffer.read ('\n')) != 0;
data/ace-6.5.12+dfsg/netsvcs/clients/Naming/Dump_Restore/createfile.cpp:22:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buf[ACE_OS::strlen(buf) - 1] = '\0';
data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.cpp:527:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*strp, buf, length);
data/ace-6.5.12+dfsg/netsvcs/lib/Client_Logging_Handler.cpp:528:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_OS::strlen (buf);
data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.cpp:413:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            atype, ACE_OS::strlen (atype));
data/ace-6.5.12+dfsg/netsvcs/lib/Name_Handler.cpp:590:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  ACE_OS::strlen (one_entry->type_));
data/ace-6.5.12+dfsg/netsvcs/lib/TS_Clerk_Handler.cpp:594:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (this->poolname_,
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Addr.cpp:44:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (htid != 0 && ACE_OS::strlen (htid) != 0)
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Addr.cpp:72:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (buffer,
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_ID_Requestor.cpp:83:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int result = cli_stream->send_n (buffer,ACE_OS::strlen(buffer));
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.cpp:62:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen(format)
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.cpp:64:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (cmd)
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.cpp:65:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (remote_host)
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.cpp:67:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + ACE_OS::strlen (local_htid)
data/ace-6.5.12+dfsg/protocols/ace/HTBP/HTBP_Inside_Squid_Filter.cpp:84:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_OS::strlen(buffer);
data/ace-6.5.12+dfsg/protocols/ace/INet/ClientRequestHandler.cpp:56:55:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    bool ClientINetRequestHandler::INetConnectionKey::equal (const ConnectionKey& key) const
data/ace-6.5.12+dfsg/protocols/ace/INet/ClientRequestHandler.h:92:34:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                    virtual bool equal (const ConnectionKey& key) const;
data/ace-6.5.12+dfsg/protocols/ace/INet/ConnectionCache.h:47:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
              virtual bool equal (const ConnectionKey& key) const = 0;
data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_IOStream.cpp:41:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        this->stream_->read (buffer, length);
data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Request.cpp:94:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bool Request::read(std::istream& str)
data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Request.h:66:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              bool read(std::istream& str);
data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Response.cpp:55:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bool Response::read(istream& str)
data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Response.h:63:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              bool read(std::istream& str);
data/ace-6.5.12+dfsg/protocols/ace/INet/FTP_Session.cpp:247:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        return response.read (*this->sock_stream_);
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTPS_Session.cpp:115:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (!connect_response.read (proxy_stream) ||
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_ClientRequestHandler.cpp:173:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    bool ClientRequestHandler::HttpConnectionKey::equal (const ACE::INet::ConnectionKey& key) const
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_ClientRequestHandler.cpp:177:38:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          return (INetConnectionKey::equal (key) &&
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_ClientRequestHandler.h:200:34:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                    virtual bool equal (const ACE::INet::ConnectionKey& key) const;
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_IOStream.cpp:45:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        this->stream_.read (buffer, length);
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Request.cpp:121:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bool Request::read(std::istream& str)
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Request.cpp:164:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (!Header::read (str))
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Request.h:101:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              bool read(std::istream& str);
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Response.cpp:60:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bool Response::read(istream& str)
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Response.cpp:109:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (!Header::read (str))
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_Response.h:75:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              virtual bool read(std::istream& str);
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_SessionBase.cpp:227:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if (!response.read (this->sock_stream ()))
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.cpp:71:57:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int ChunkedTransferStreamPolicyBase<STREAM_BUFFER>::getc ()
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.cpp:94:26:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          int ch = this->getc ();
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.cpp:96:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            ch = this->getc ();
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.cpp:101:26:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              ch = this->getc ();
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.cpp:105:26:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              ch = this->getc ();
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.cpp:124:26:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          int ch = this->getc ();
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.cpp:126:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            ch = this->getc ();
data/ace-6.5.12+dfsg/protocols/ace/INet/HTTP_StreamPolicy.h:75:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              int getc ();
data/ace-6.5.12+dfsg/protocols/ace/INet/HeaderBase.cpp:63:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bool HeaderBase::read(std::istream& str)
data/ace-6.5.12+dfsg/protocols/ace/INet/HeaderBase.h:107:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              virtual bool read(std::istream& str);
data/ace-6.5.12+dfsg/protocols/ace/INet/SSL_CallbackManager.cpp:106:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            ACE_OS::strncpy (buf, pwd.c_str (), size);
data/ace-6.5.12+dfsg/protocols/ace/TMCast/Group.cpp:72:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (id_, id, Protocol::MEMBER_ID_LENGTH);
data/ace-6.5.12+dfsg/protocols/examples/TMCast/Member/member.cpp:64:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          group.send (buffer, ACE_OS::strlen (buffer) + 1);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/client.cpp:111:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = stream.send (buffer,ACE_OS::strlen(buffer)+1);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Reactor_Tests/server.cpp:245:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ACE_OS::fwrite (msg,ACE_OS::strlen(msg),1,f);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/server.cpp:77:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ACE_OS::fwrite (msg,ACE_OS::strlen(msg),1,f);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Large_Msg/server.cpp:147:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ssize_t n = stream.send (buffer, ACE_OS::strlen (buffer)+1);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/Send_Recv_Tests/server.cpp:118:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ACE_OS::fwrite (msg,ACE_OS::strlen(msg),1,f);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/client.cpp:111:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = stream.send (buffer, ACE_OS::strlen (buffer)+1);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/server.cpp:76:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ACE_OS::fwrite (msg,ACE_OS::strlen(msg),1,f);
data/ace-6.5.12+dfsg/protocols/tests/HTBP/ping/server.cpp:150:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = stream.send (buffer,ACE_OS::strlen(buffer)+1);
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:126:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (result != ssize_t (ACE_OS::strlen (message)))
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:128:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                result, ACE_OS::strlen (message)));
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:152:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (message));
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:153:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (result != ssize_t (ACE_OS::strlen (message)))
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:155:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                result, ACE_OS::strlen (message)));
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:183:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (message));
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:184:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (result != ssize_t (ACE_OS::strlen (message)))
data/ace-6.5.12+dfsg/tests/Bug_2653_Regression_Test.cpp:186:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                result, ACE_OS::strlen (message)));
data/ace-6.5.12+dfsg/tests/Bug_2659_Regression_Test.cpp:43:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (class_name_, class_name, 20);
data/ace-6.5.12+dfsg/tests/Bug_2659_Regression_Test.cpp:44:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (method_name_, method_name, 20);
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:81:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    echo_cnt_ (ACE_OS::strlen (ClientSvcHandler::send_str) * echo_cnt),
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:109:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t send_len = ACE_OS::strlen (ClientSvcHandler::send_str);
data/ace-6.5.12+dfsg/tests/Bug_2740_Regression_Test.cpp:155:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t send_len = ACE_OS::strlen (ClientSvcHandler::send_str);
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:74:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) malloc (2 + strlen (subdir_env) + strlen (DllTestName));
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) malloc (2 + strlen (subdir_env) + strlen (DllTestName));
data/ace-6.5.12+dfsg/tests/Bug_2980_Regression_Test.cpp:76:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (dllFile, "/");
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1471:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (pszVariable,
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1500:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (pszString,
data/ace-6.5.12+dfsg/tests/Config_Test.cpp:1532:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (pszString,
data/ace-6.5.12+dfsg/tests/Dev_Poll_Reactor_Test.cpp:122:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        this->peer ().send (buffer, ACE_OS::strlen (buffer));
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:168:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       (directory = dir.read ()) != 0;
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:233:48:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  for (ACE_DIRENT *directory; (directory = dir.read ()) != 0;)
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:241:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (tname, directory->d_name, maxnamlen);
data/ace-6.5.12+dfsg/tests/Dirent_Test.cpp:243:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (tname,
data/ace-6.5.12+dfsg/tests/Dynamic_Priority_Test.cpp:170:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_TEST_ASSERT (local_count == ACE_OS::strlen (receipt_order));
data/ace-6.5.12+dfsg/tests/Dynamic_Priority_Test.cpp:231:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  u_int array_size = ACE_OS::strlen (send_order);
data/ace-6.5.12+dfsg/tests/Dynamic_Priority_Test.cpp:236:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_TEST_ASSERT (ACE_OS::strlen (send_order) == ACE_OS::strlen (receipt_order));
data/ace-6.5.12+dfsg/tests/Dynamic_Priority_Test.cpp:236:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ACE_TEST_ASSERT (ACE_OS::strlen (send_order) == ACE_OS::strlen (receipt_order));
data/ace-6.5.12+dfsg/tests/Dynamic_Priority_Test.cpp:242:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  supplier_args.expected_count_ = ACE_OS::strlen (send_order);
data/ace-6.5.12+dfsg/tests/Dynamic_Priority_Test.cpp:269:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  consumer_args.expected_count_ = ACE_OS::strlen (receipt_order);
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:50:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ssize_t expect = static_cast <ssize_t> (ACE_OS::strlen (ACE_ALPHABET));
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:51:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  send_count = fifo.send (ACE_ALPHABET, ACE_OS::strlen (ACE_ALPHABET));
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:64:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          expect = static_cast <ssize_t> (ACE_OS::strlen (ACE_ALPHABET));
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:65:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          send_count = fifo.send (ACE_ALPHABET, ACE_OS::strlen (ACE_ALPHABET));
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:121:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ssize_t expect = static_cast <ssize_t> (ACE_OS::strlen (ACE_ALPHABET));
data/ace-6.5.12+dfsg/tests/FIFO_Test.cpp:167:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  expect = static_cast <ssize_t> (ACE_OS::strlen (ACE_ALPHABET));
data/ace-6.5.12+dfsg/tests/Future_Set_Test.cpp:234:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           ACE_TCHAR[ACE_OS::strlen (newname) + 1]);
data/ace-6.5.12+dfsg/tests/Future_Test.cpp:240:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           ACE_TCHAR[ACE_OS::strlen (newname) + 1]);
data/ace-6.5.12+dfsg/tests/IOStream_Test.cpp:344:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  while (ACE_OS::strlen (buf) == 0
data/ace-6.5.12+dfsg/tests/IOStream_Test.cpp:345:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         || buf[ACE_OS::strlen (buf) - 1] != '"')
data/ace-6.5.12+dfsg/tests/Log_Msg_Test.cpp:242:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t j = ACE_OS::strlen (alphabet);
data/ace-6.5.12+dfsg/tests/Log_Msg_Test.cpp:648:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (b != log_record.msg_data () && ACE_OS::strlen (b) < 15)
data/ace-6.5.12+dfsg/tests/Log_Msg_Test.cpp:651:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          log_record.msg_data (), ACE_OS::strlen (b)));
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:119:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (ACE_OS::strlen (return_buf) + 1) * sizeof (ACE_TCHAR);
data/ace-6.5.12+dfsg/tests/MEM_Stream_Test.cpp:188:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ssize_t slen = (ACE_OS::strlen (buf) + 1) * sizeof (ACE_TCHAR);
data/ace-6.5.12+dfsg/tests/MT_Reactor_Upcall_Test.cpp:224:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (message);
data/ace-6.5.12+dfsg/tests/Message_Block_Test.cpp:263:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t n = (ACE_OS::strlen (buf) + 1) * sizeof (ACE_TCHAR);
data/ace-6.5.12+dfsg/tests/Message_Queue_Notifications_Test.cpp:193:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  : len_ (ACE_OS::strlen (default_message) + 1),
data/ace-6.5.12+dfsg/tests/Message_Queue_Test_Ex.h:30:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_NEW (this->message_, char[ACE_OS::strlen (inputMsg) + 1]);
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:596:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (buf) == 0)
data/ace-6.5.12+dfsg/tests/Multicast_Test.cpp:777:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (socket.send (buf, ACE_OS::strlen (buf),addr) == -1)
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:608:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (buf) == 0)
data/ace-6.5.12+dfsg/tests/Multicast_Test_IPV6.cpp:773:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (socket.send (buf, ACE_OS::strlen (buf),addr) == -1)
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:930:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      ACE_OS::strncpy (ping_points_ips [0],
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:947:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          ACE_OS::strncpy (local_ip_to_bind,
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:951:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (!ACE_OS::strlen (local_ip_to_bind) ||
data/ace-6.5.12+dfsg/tests/Network_Adapters_Test.cpp:1089:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ACE_OS::strlen (local_ip_to_bind))
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:381:32:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      (ACE_OS::strcmp (ACE_OS::strncat (strncat2, strncat3, 14),
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:437:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    THIS_IS_NOT_AN_ASSERT_IT_IS_A_NON_DEBUG_TEST_AS_WELL (ACE_OS::strlen (strlen1) == 0);
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:438:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    THIS_IS_NOT_AN_ASSERT_IT_IS_A_NON_DEBUG_TEST_AS_WELL (ACE_OS::strlen (strlen2) == 5);
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:537:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      (ACE_OS::strncmp (ACE_OS::strncpy (strncpy2,
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:836:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (ACE_OS::strlen (ACE_OS::strsncpy (strsncpy2,
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:863:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    THIS_IS_NOT_AN_ASSERT_IT_IS_A_NON_DEBUG_TEST_AS_WELL(ACE_OS::strlen(strsncpy2) == 9);
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:906:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (ACE_OS::strlen (ACE_OS::strsncpy (strsncpy2,
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:934:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    THIS_IS_NOT_AN_ASSERT_IT_IS_A_NON_DEBUG_TEST_AS_WELL(ACE_OS::strlen(strsncpy2) == 9);
data/ace-6.5.12+dfsg/tests/OS_Test.cpp:1431:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TEST_INT_EQUAL (ACE_OS::strlen (STR), size_t (ret)) \
data/ace-6.5.12+dfsg/tests/Obstack_Test.cpp:27:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (size_t i = 0; i < ACE_OS::strlen (str1); i++)
data/ace-6.5.12+dfsg/tests/Obstack_Test.cpp:45:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (size_t j = 0; j < ACE_OS::strlen (str2); ++j)
data/ace-6.5.12+dfsg/tests/Obstack_Test.cpp:63:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (size_t k = 0; k < ACE_OS::strlen (str1); ++k)
data/ace-6.5.12+dfsg/tests/Obstack_Test.cpp:82:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (size_t l = 0; l < ACE_OS::strlen (str2); ++l)
data/ace-6.5.12+dfsg/tests/Proactor_File_Test.cpp:172:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (reader_.read(*mb, mb->space()) != 0)
data/ace-6.5.12+dfsg/tests/Proactor_File_Test.cpp:220:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    reader_.read(mb,
data/ace-6.5.12+dfsg/tests/Proactor_File_Test.cpp:245:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (reader_.read(*new_mb, new_mb->space(),
data/ace-6.5.12+dfsg/tests/Proactor_File_Test.cpp:294:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (reader_.read(*mb, mb->space(),
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:790:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (*mb, mb->size () - 1) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1281:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static const size_t complete_message_length = ACE_OS::strlen (complete_message);
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1362:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (complete_message);
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1428:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (*mb, mb->size () - 1) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test.cpp:1797:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  xfer_limit = 50 * ACE_OS::strlen (complete_message);
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:791:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (*mb, mb->size () - 1) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1322:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static const size_t complete_message_length = ACE_OS::strlen (complete_message);
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1403:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (complete_message);
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1469:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->rs_.read (*mb, mb->size () - 1) == -1)
data/ace-6.5.12+dfsg/tests/Proactor_Test_IPV6.cpp:1841:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  xfer_limit = 50 * ACE_OS::strlen (complete_message);
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:1530:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        new ACE_Message_Block (ACE_OS::strlen (close_req_msg) + 1);
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:1549:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (complete_message);
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:1625:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_OS::strlen (complete_message);
data/ace-6.5.12+dfsg/tests/Proactor_UDP_Test.cpp:2063:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  xfer_limit = 50 * ACE_OS::strlen (complete_message);
data/ace-6.5.12+dfsg/tests/Process_Manager_Test.cpp:240:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t command_len = ACE_OS::strlen (command);
data/ace-6.5.12+dfsg/tests/Process_Mutex_Test.cpp:79:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (mutex_check, mutex_name, MAXPATHLEN);
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:285:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
Counting_Service::read (void)
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:400:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        return this->read ();
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:507:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      command_len = ACE_OS::strlen (command);
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:518:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      command_len = ACE_OS::strlen (command);
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.cpp:547:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  command_len = ACE_OS::strlen (command);
data/ace-6.5.12+dfsg/tests/Process_Strategy_Test.h:57:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (void);
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:50:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t env_len = ACE_OS::strlen (opts.env_buf ());
data/ace-6.5.12+dfsg/tests/Process_Test.cpp:82:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((dir = entr.read ()))
data/ace-6.5.12+dfsg/tests/RW_Process_Mutex_Test.cpp:162:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (mutex_check, mutex_name.c_str (), MAXPATHLEN);
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test.cpp:139:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (result != ssize_t (ACE_OS::strlen (message)))
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test.cpp:141:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                result, ACE_OS::strlen (message)));
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test.cpp:173:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (message));
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test.cpp:174:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (result != ssize_t (ACE_OS::strlen (message)))
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test.cpp:177:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  result, ACE_OS::strlen (message)));
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test_Dev_Poll.cpp:138:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (result != ssize_t (ACE_OS::strlen (message)))
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test_Dev_Poll.cpp:140:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                result, ACE_OS::strlen (message)));
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test_Dev_Poll.cpp:172:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (message));
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test_Dev_Poll.cpp:173:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (result != ssize_t (ACE_OS::strlen (message)))
data/ace-6.5.12+dfsg/tests/Reactor_Dispatch_Order_Test_Dev_Poll.cpp:176:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  result, ACE_OS::strlen (message)));
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:106:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ssize_t result = this->peer ().recv (buf, ACE_OS::strlen(ACE_ALPHABET));
data/ace-6.5.12+dfsg/tests/Reactor_Fairness_Test.cpp:214:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t send_cnt = ACE_OS::strlen (ACE_ALPHABET);
data/ace-6.5.12+dfsg/tests/Reactor_Registration_Test.cpp:29:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                 ACE_HANDLE read,
data/ace-6.5.12+dfsg/tests/Reactor_Registration_Test.cpp:44:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                              ACE_HANDLE read,
data/ace-6.5.12+dfsg/tests/Reactor_Registration_Test.cpp:47:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    pipe_ (read, write),
data/ace-6.5.12+dfsg/tests/Refcounted_Event_Handler_Test_DevPoll.cpp:142:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (result != ssize_t (ACE_OS::strlen (message)))
data/ace-6.5.12+dfsg/tests/Refcounted_Event_Handler_Test_DevPoll.cpp:144:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                result, ACE_OS::strlen (message)));
data/ace-6.5.12+dfsg/tests/Refcounted_Event_Handler_Test_DevPoll.cpp:176:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (message));
data/ace-6.5.12+dfsg/tests/Refcounted_Event_Handler_Test_DevPoll.cpp:177:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (result != ssize_t (ACE_OS::strlen (message)))
data/ace-6.5.12+dfsg/tests/Refcounted_Event_Handler_Test_DevPoll.cpp:180:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  result, ACE_OS::strlen (message)));
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Bcast_Test.cpp:47:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     ACE_OS::strlen (dgram_buffer) + 1,
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Test.cpp:182:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (ACE_OS::strncmp (buf, TEST_DATA, ACE_OS::strlen (TEST_DATA)))
data/ace-6.5.12+dfsg/tests/SOCK_Dgram_Test.cpp:239:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (ACE_OS::strncmp (buf, TEST_DATA, ACE_OS::strlen (TEST_DATA)))
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:133:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (if_req.ifr_name,
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:367:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      !ip_slash_mask || !ACE_OS::strlen (ip_slash_mask) ||
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:368:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      !if_name || !ACE_OS::strlen (if_name))
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:409:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (this->ip_buff_,
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:413:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (this->if_buff_,
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:651:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (ip_buff, ip_slash_netmask, sizeof (ip_buff));
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:660:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (!dot || !ACE_OS::strlen (to_search))
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:864:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (! (ip_len = ACE_OS::strlen (ip_slash_mask)))
data/ace-6.5.12+dfsg/tests/SOCK_Netlink_Test.cpp:881:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (! (if_len = ACE_OS::strlen (net_dev_name)))
data/ace-6.5.12+dfsg/tests/SPIPE_Test.cpp:79:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         ACE_OS::strlen (ACE_ALPHABET)) != (ssize_t) ACE_OS::strlen (ACE_ALPHABET))
data/ace-6.5.12+dfsg/tests/SPIPE_Test.cpp:79:78:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         ACE_OS::strlen (ACE_ALPHABET)) != (ssize_t) ACE_OS::strlen (ACE_ALPHABET))
data/ace-6.5.12+dfsg/tests/SPIPE_Test.cpp:164:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (new_stream.recv (buf, sizeof(buf)) != (ssize_t) ACE_OS::strlen (ACE_ALPHABET))
data/ace-6.5.12+dfsg/tests/SPIPE_Test.cpp:167:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_TEST_ASSERT(ACE_OS::memcmp(ACE_ALPHABET, buf, ACE_OS::strlen (ACE_ALPHABET)) == 0);
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:49:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define DATA_SIZE ACE_OS::strlen(DATA)
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:266:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &mb, size_t bytes_to_read);
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:364:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (this->read (result.message_block (),
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:460:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int ret = this->read (*mb, DATA_SIZE);
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:495:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
Server_Service_Handler::read (ACE_Message_Block &mb, size_t bytes_to_read)
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:500:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ((ret = this->ssl_stream_.read (mb, bytes_to_read)) < 0)
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:705:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read (ACE_Message_Block &mb, size_t bytes_to_read);
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:816:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (this->read (result.message_block(),
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:921:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int ret = this->read (*mb, DATA_SIZE);
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:956:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
Client_Service_Handler::read (ACE_Message_Block &mb, size_t bytes_to_read)
data/ace-6.5.12+dfsg/tests/SSL/Bug_2912_Regression_Test.cpp:961:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ((ret = this->ssl_stream_.read (mb, bytes_to_read)) < 0)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:331:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->stream_.read (this->block_, this->block_.space () - 1) == -1)
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:374:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t test_string_len = ACE_OS::strlen (test_string);
data/ace-6.5.12+dfsg/tests/SSL/SSL_Asynch_Stream_Test.cpp:389:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (this->stream_.read (b, b.space () - 1) == -1)
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:244:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf[0] = ACE_OS::strlen (msg) + 1;
data/ace-6.5.12+dfsg/tests/SSL/Thread_Pool_Reactor_SSL_Test.cpp:275:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (stream.send_n (sbuf, (ACE_OS::strlen (sbuf) + 1) * sizeof (ACE_TCHAR)) == -1)
data/ace-6.5.12+dfsg/tests/SString_Test.cpp:287:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (ACE_OS::strlen (s.get ()) != s1.length ())
data/ace-6.5.12+dfsg/tests/Service_Config_DLL.cpp:262:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ACE_OS::strncpy (*info_string, msg, length);
data/ace-6.5.12+dfsg/tests/Service_Config_DLL.cpp:265:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ACE_OS::strlen (*info_string);
data/ace-6.5.12+dfsg/tests/Simple_Message_Block_Test.cpp:175:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_Message_Block mb1 (ACE_OS::strlen (message) + 1);
data/ace-6.5.12+dfsg/tests/Simple_Message_Block_Test.cpp:176:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ACE_Message_Block mb2 (ACE_OS::strlen (message) + 1);
data/ace-6.5.12+dfsg/tests/Simple_Message_Block_Test.cpp:179:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (mb2.size (ACE_OS::strlen (message) + 1 - 10) == -1)
data/ace-6.5.12+dfsg/tests/Simple_Message_Block_Test.cpp:186:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (mb1.copy (message, ACE_OS::strlen (message) + 1) == -1)
data/ace-6.5.12+dfsg/tests/Simple_Message_Block_Test.cpp:193:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (mb2.copy (message, ACE_OS::strlen (message) + 1) != -1)
data/ace-6.5.12+dfsg/tests/Svc_Handler_Test.cpp:46:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ACE_OS::strlen (ACE_TEXT("hello ")));
data/ace-6.5.12+dfsg/tests/Svc_Handler_Test.cpp:48:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 ACE_OS::strlen (ACE_TEXT("there ")));
data/ace-6.5.12+dfsg/tests/Svc_Handler_Test.cpp:51:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ACE_OS::strlen (ACE_TEXT("doug\n")));
data/ace-6.5.12+dfsg/tests/TP_Reactor_Test.cpp:822:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t nbytes = ACE_OS::strlen (send_buf_);
data/ace-6.5.12+dfsg/tests/TSS_Test.cpp:147:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ACE_OS::read (ACE_INVALID_HANDLE, 0, 0);
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:99:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ACE_OS::strncpy (tempenv,
data/ace-6.5.12+dfsg/tests/Test_Output.cpp:112:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ACE_OS::strncpy (temp, test_dir, MAXPATHLEN);
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:296:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf[0] = static_cast<ACE_TCHAR> ((ACE_OS::strlen (msg) + 1));
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:327:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (stream.send_n (sbuf, (ACE_OS::strlen (sbuf) + 1) * sizeof (ACE_TCHAR)) == -1)
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Resume_Test.cpp:334:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              ACE_OS::strlen (sbuf)));
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:253:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf[0] = static_cast<ACE_TCHAR> ((ACE_OS::strlen (msg) + 1));
data/ace-6.5.12+dfsg/tests/Thread_Pool_Reactor_Test.cpp:284:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (stream.send_n (sbuf, (ACE_OS::strlen (sbuf) + 1) * sizeof (ACE_TCHAR)) == -1)
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:230:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          n = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:242:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          n = ACE_OS::strlen (mb->rd_ptr ());
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:322:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          n = ACE_OS::read (ACE_STDIN,
data/ace-6.5.12+dfsg/tests/Thread_Pool_Test.cpp:334:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          n = ACE_OS::strlen (mb->rd_ptr ());
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:41:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int n =  ACE_OS::strlen(s);
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:84:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  mes_len = (int) htonl (ACE_OS::strlen (buf) + 1);
data/ace-6.5.12+dfsg/tests/TkReactor_Test.cpp:97:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   ACE_OS::strlen (buf) + 1) == -1)
data/ace-6.5.12+dfsg/tests/Unload_libACE.cpp:155:15:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
              strcat (buf, "/");
data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp:94:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  mes_len = (int) htonl (ACE_OS::strlen (buf) + 1);
data/ace-6.5.12+dfsg/tests/XtAthenaReactor_Test.cpp:107:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   ACE_OS::strlen (buf) + 1) == -1)
data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp:97:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  mes_len = (int) htonl (ACE_OS::strlen (buf) + 1);
data/ace-6.5.12+dfsg/tests/XtMotifReactor_Test.cpp:110:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   ACE_OS::strlen (buf) + 1) == -1)

ANALYSIS SUMMARY:

Hits = 4869
Lines analyzed = 549219 in approximately 11.44 seconds (48001 lines/second)
Physical Source Lines of Code (SLOC) = 353490
Hits@level = [0] 931 [1] 934 [2] 2790 [3] 278 [4] 858 [5]   9
Hits@level+ = [0+] 5800 [1+] 4869 [2+] 3935 [3+] 1145 [4+] 867 [5+]   9
Hits/KSLOC@level+ = [0+] 16.4078 [1+] 13.7741 [2+] 11.1319 [3+] 3.23913 [4+] 2.45269 [5+] 0.0254604
Dot directories skipped = 2 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.