Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/alpine-2.24+dfsg1/regex/regfree.c
Examining data/alpine-2.24+dfsg1/regex/engine.c
Examining data/alpine-2.24+dfsg1/regex/regerror.c
Examining data/alpine-2.24+dfsg1/regex/regex.h
Examining data/alpine-2.24+dfsg1/regex/utils.h
Examining data/alpine-2.24+dfsg1/regex/regcomp.c
Examining data/alpine-2.24+dfsg1/regex/cclass.h
Examining data/alpine-2.24+dfsg1/regex/cname.h
Examining data/alpine-2.24+dfsg1/regex/regex2.h
Examining data/alpine-2.24+dfsg1/regex/regexec.c
Examining data/alpine-2.24+dfsg1/pico/pico.c
Examining data/alpine-2.24+dfsg1/pico/utf8stub.c
Examining data/alpine-2.24+dfsg1/pico/random.c
Examining data/alpine-2.24+dfsg1/pico/display.c
Examining data/alpine-2.24+dfsg1/pico/buffer.c
Examining data/alpine-2.24+dfsg1/pico/fileio.c
Examining data/alpine-2.24+dfsg1/pico/headers.h
Examining data/alpine-2.24+dfsg1/pico/pilot.c
Examining data/alpine-2.24+dfsg1/pico/attach.c
Examining data/alpine-2.24+dfsg1/pico/composer.c
Examining data/alpine-2.24+dfsg1/pico/keydefs.h
Examining data/alpine-2.24+dfsg1/pico/bind.c
Examining data/alpine-2.24+dfsg1/pico/utf8stub.h
Examining data/alpine-2.24+dfsg1/pico/line.c
Examining data/alpine-2.24+dfsg1/pico/efunc.h
Examining data/alpine-2.24+dfsg1/pico/browse.c
Examining data/alpine-2.24+dfsg1/pico/main.c
Examining data/alpine-2.24+dfsg1/pico/ebind.h
Examining data/alpine-2.24+dfsg1/pico/window.c
Examining data/alpine-2.24+dfsg1/pico/osdep/raw.h
Examining data/alpine-2.24+dfsg1/pico/osdep/os-wnt.h
Examining data/alpine-2.24+dfsg1/pico/osdep/getkey.h
Examining data/alpine-2.24+dfsg1/pico/osdep/newmail.h
Examining data/alpine-2.24+dfsg1/pico/osdep/signals.c
Examining data/alpine-2.24+dfsg1/pico/osdep/terminal.c
Examining data/alpine-2.24+dfsg1/pico/osdep/truncate.c
Examining data/alpine-2.24+dfsg1/pico/osdep/read.c
Examining data/alpine-2.24+dfsg1/pico/osdep/shell.c
Examining data/alpine-2.24+dfsg1/pico/osdep/altedit.h
Examining data/alpine-2.24+dfsg1/pico/osdep/altedit.c
Examining data/alpine-2.24+dfsg1/pico/osdep/terminal.h
Examining data/alpine-2.24+dfsg1/pico/osdep/spell.c
Examining data/alpine-2.24+dfsg1/pico/osdep/color.c
Examining data/alpine-2.24+dfsg1/pico/osdep/mouse.h
Examining data/alpine-2.24+dfsg1/pico/osdep/getkey.c
Examining data/alpine-2.24+dfsg1/pico/osdep/mswin_tw.c
Examining data/alpine-2.24+dfsg1/pico/osdep/fsync.c
Examining data/alpine-2.24+dfsg1/pico/osdep/mswin.h
Examining data/alpine-2.24+dfsg1/pico/osdep/chkpoint.h
Examining data/alpine-2.24+dfsg1/pico/osdep/read.h
Examining data/alpine-2.24+dfsg1/pico/osdep/spell.h
Examining data/alpine-2.24+dfsg1/pico/osdep/tty.c
Examining data/alpine-2.24+dfsg1/pico/osdep/mswin.c
Examining data/alpine-2.24+dfsg1/pico/osdep/mswin_aspell.h
Examining data/alpine-2.24+dfsg1/pico/osdep/popen.c
Examining data/alpine-2.24+dfsg1/pico/osdep/newmail.c
Examining data/alpine-2.24+dfsg1/pico/osdep/color.h
Examining data/alpine-2.24+dfsg1/pico/osdep/mswin_spell.h
Examining data/alpine-2.24+dfsg1/pico/osdep/shell.h
Examining data/alpine-2.24+dfsg1/pico/osdep/msmenu.h
Examining data/alpine-2.24+dfsg1/pico/osdep/mswin_tw.h
Examining data/alpine-2.24+dfsg1/pico/osdep/truncate.h
Examining data/alpine-2.24+dfsg1/pico/osdep/chkpoint.c
Examining data/alpine-2.24+dfsg1/pico/osdep/filesys.c
Examining data/alpine-2.24+dfsg1/pico/osdep/filesys.h
Examining data/alpine-2.24+dfsg1/pico/osdep/fsync.h
Examining data/alpine-2.24+dfsg1/pico/osdep/raw.c
Examining data/alpine-2.24+dfsg1/pico/osdep/mouse.c
Examining data/alpine-2.24+dfsg1/pico/osdep/mswin_aspell.c
Examining data/alpine-2.24+dfsg1/pico/osdep/popen.h
Examining data/alpine-2.24+dfsg1/pico/osdep/signals.h
Examining data/alpine-2.24+dfsg1/pico/osdep/msdlg.c
Examining data/alpine-2.24+dfsg1/pico/osdep/os-win.h
Examining data/alpine-2.24+dfsg1/pico/osdep/tty.h
Examining data/alpine-2.24+dfsg1/pico/osdep/resource.h
Examining data/alpine-2.24+dfsg1/pico/osdep/mswin_spell.c
Examining data/alpine-2.24+dfsg1/pico/search.c
Examining data/alpine-2.24+dfsg1/pico/estruct.h
Examining data/alpine-2.24+dfsg1/pico/pico.h
Examining data/alpine-2.24+dfsg1/pico/region.c
Examining data/alpine-2.24+dfsg1/pico/word.c
Examining data/alpine-2.24+dfsg1/pico/file.c
Examining data/alpine-2.24+dfsg1/pico/mode.h
Examining data/alpine-2.24+dfsg1/pico/edef.h
Examining data/alpine-2.24+dfsg1/pico/blddate.c
Examining data/alpine-2.24+dfsg1/pico/mswinver.c
Examining data/alpine-2.24+dfsg1/pico/basic.c
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/asn1.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/rc4.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/bioerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/store.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/bio.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ssl3.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ossl_typ.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/serializer.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/whrlpool.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/sha.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/idea.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/err.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/kdf.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ocsperr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/core_names.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/uierr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/self_test.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/bnerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/engineerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/dherr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/evperr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/opensslconf.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/cmac.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/asn1err.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/sslerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/aes.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/cmp.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/cryptoerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/storeerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ecdsa.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/dh.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/esserr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ui.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/core_dispatch.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/pkcs7err.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/core.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/evp.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/rand_drbg.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/pkcs7.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/e_os2.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/tserr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/hmac.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/x509.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/x509err.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ecdh.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/safestack.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/cms.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/opensslv.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/md2.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/des.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/txt_db.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/rc2.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/seed.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/comperr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/macros.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/serializererr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/dsa.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/camellia.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/configuration.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/pkcs12err.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ess.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/md4.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/http.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ripemd.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ebcdic.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/rand.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/cmperr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/pemerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/objectserr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/srp.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/crmf.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/comp.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/crmferr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/srtp.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/x509v3err.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/buffererr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/fips_names.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/trace.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/asn1t.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/types.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/rsa.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/dsaerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/x509v3.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/rsaerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/pkcs12.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/kdferr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ct.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/obj_mac.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/md5.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ecerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ts.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/engine.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/dtls1.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/mdc2.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/blowfish.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/stack.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/x509_vfy.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/conf_api.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/async.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ssl2.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/tls1.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/asyncerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/pem.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/buffer.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/mac.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/cterr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/rc5.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/crypto.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/conf.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/asn1_mac.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/bn.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/objects.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/param_build.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/symhacks.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/conferr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/pem2.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/lhash.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/provider.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/randerr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ssl.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/modes.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ocsp.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/ec.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/cmserr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/params.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/httperr.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/cast.h
Examining data/alpine-2.24+dfsg1/openssl/include/openssl/cmp_util.h
Examining data/alpine-2.24+dfsg1/openssl/include/__DECC_INCLUDE_PROLOGUE.H
Examining data/alpine-2.24+dfsg1/openssl/include/__DECC_INCLUDE_EPILOGUE.H
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/ldap.h
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/remote.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/signal.h
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/alpineldap.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/debug.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.h
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/color.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/signal.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/debug.h
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/imap.h
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/stubs.h
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/color.h
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/imap.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/busy.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/status.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/ldap.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/stubs.c
Examining data/alpine-2.24+dfsg1/web/src/alpined.d/wpcomm.c
Examining data/alpine-2.24+dfsg1/web/src/pubcookie/id_table.h
Examining data/alpine-2.24+dfsg1/web/src/pubcookie/wp_uidmapper_lib.h
Examining data/alpine-2.24+dfsg1/web/src/pubcookie/wp_uidmapper.c
Examining data/alpine-2.24+dfsg1/web/src/pubcookie/wp_tclsh.c
Examining data/alpine-2.24+dfsg1/web/src/pubcookie/wp_gssapi_proxy.c
Examining data/alpine-2.24+dfsg1/web/src/pubcookie/wp_uidmapper_lib.c
Examining data/alpine-2.24+dfsg1/web/src/pubcookie/wp_umc.c
Examining data/alpine-2.24+dfsg1/web/src/pubcookie/id_table.c
Examining data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c
Examining data/alpine-2.24+dfsg1/alpine/init.h
Examining data/alpine-2.24+dfsg1/alpine/remote.c
Examining data/alpine-2.24+dfsg1/alpine/mailcmd.h
Examining data/alpine-2.24+dfsg1/alpine/context.c
Examining data/alpine-2.24+dfsg1/alpine/remote.h
Examining data/alpine-2.24+dfsg1/alpine/addrbook.c
Examining data/alpine-2.24+dfsg1/alpine/flagmaint.c
Examining data/alpine-2.24+dfsg1/alpine/pipe.h
Examining data/alpine-2.24+dfsg1/alpine/xoauth2conf.c
Examining data/alpine-2.24+dfsg1/alpine/init.c
Examining data/alpine-2.24+dfsg1/alpine/radio.h
Examining data/alpine-2.24+dfsg1/alpine/signal.h
Examining data/alpine-2.24+dfsg1/alpine/newmail.h
Examining data/alpine-2.24+dfsg1/alpine/context.h
Examining data/alpine-2.24+dfsg1/alpine/colorconf.c
Examining data/alpine-2.24+dfsg1/alpine/pipe.c
Examining data/alpine-2.24+dfsg1/alpine/mailpart.h
Examining data/alpine-2.24+dfsg1/alpine/headers.h
Examining data/alpine-2.24+dfsg1/alpine/setup.h
Examining data/alpine-2.24+dfsg1/alpine/titlebar.h
Examining data/alpine-2.24+dfsg1/alpine/roleconf.c
Examining data/alpine-2.24+dfsg1/alpine/newuser.h
Examining data/alpine-2.24+dfsg1/alpine/busy.h
Examining data/alpine-2.24+dfsg1/alpine/takeaddr.h
Examining data/alpine-2.24+dfsg1/alpine/kblock.c
Examining data/alpine-2.24+dfsg1/alpine/mailview.c
Examining data/alpine-2.24+dfsg1/alpine/signal.c
Examining data/alpine-2.24+dfsg1/alpine/reply.c
Examining data/alpine-2.24+dfsg1/alpine/xoauth2.h
Examining data/alpine-2.24+dfsg1/alpine/addrbook.h
Examining data/alpine-2.24+dfsg1/alpine/rpdump.c
Examining data/alpine-2.24+dfsg1/alpine/colorconf.h
Examining data/alpine-2.24+dfsg1/alpine/radio.c
Examining data/alpine-2.24+dfsg1/alpine/ldapconf.c
Examining data/alpine-2.24+dfsg1/alpine/confscroll.h
Examining data/alpine-2.24+dfsg1/alpine/kblock.h
Examining data/alpine-2.24+dfsg1/alpine/folder.h
Examining data/alpine-2.24+dfsg1/alpine/setup.c
Examining data/alpine-2.24+dfsg1/alpine/talk.h
Examining data/alpine-2.24+dfsg1/alpine/help.c
Examining data/alpine-2.24+dfsg1/alpine/xoauth2conf.h
Examining data/alpine-2.24+dfsg1/alpine/adrbkcmd.c
Examining data/alpine-2.24+dfsg1/alpine/smime.c
Examining data/alpine-2.24+dfsg1/alpine/after.c
Examining data/alpine-2.24+dfsg1/alpine/send.h
Examining data/alpine-2.24+dfsg1/alpine/print.h
Examining data/alpine-2.24+dfsg1/alpine/newuser.c
Examining data/alpine-2.24+dfsg1/alpine/print.c
Examining data/alpine-2.24+dfsg1/alpine/keymenu.h
Examining data/alpine-2.24+dfsg1/alpine/alpine.h
Examining data/alpine-2.24+dfsg1/alpine/arg.c
Examining data/alpine-2.24+dfsg1/alpine/imap.h
Examining data/alpine-2.24+dfsg1/alpine/confscroll.c
Examining data/alpine-2.24+dfsg1/alpine/newmail.c
Examining data/alpine-2.24+dfsg1/alpine/roleconf.h
Examining data/alpine-2.24+dfsg1/alpine/arg.h
Examining data/alpine-2.24+dfsg1/alpine/imap.c
Examining data/alpine-2.24+dfsg1/alpine/busy.c
Examining data/alpine-2.24+dfsg1/alpine/flagmaint.h
Examining data/alpine-2.24+dfsg1/alpine/keymenu.c
Examining data/alpine-2.24+dfsg1/alpine/status.c
Examining data/alpine-2.24+dfsg1/alpine/mailindx.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/termout.unx.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/termin.gen.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/termin.wnt.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/diskquot.hpp
Examining data/alpine-2.24+dfsg1/alpine/osdep/fltrname.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/chnge_pw.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/termin.unx.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/print.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/print.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/termout.unx.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/termin.unx.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/chnge_pw.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/diskquot.non.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/fltrname.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/execview.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/debuging.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/jobcntrl.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/termin.gen.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/jobcntrl.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/execview.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/windlg.h
Examining data/alpine-2.24+dfsg1/alpine/osdep/debuging.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/termin.wnt.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/mswinver.c
Examining data/alpine-2.24+dfsg1/alpine/osdep/resource.h
Examining data/alpine-2.24+dfsg1/alpine/titlebar.c
Examining data/alpine-2.24+dfsg1/alpine/reply.h
Examining data/alpine-2.24+dfsg1/alpine/listsel.c
Examining data/alpine-2.24+dfsg1/alpine/folder.c
Examining data/alpine-2.24+dfsg1/alpine/status.h
Examining data/alpine-2.24+dfsg1/alpine/after.h
Examining data/alpine-2.24+dfsg1/alpine/mailview.h
Examining data/alpine-2.24+dfsg1/alpine/rpload.c
Examining data/alpine-2.24+dfsg1/alpine/dispfilt.h
Examining data/alpine-2.24+dfsg1/alpine/pattern.h
Examining data/alpine-2.24+dfsg1/alpine/ldapconf.h
Examining data/alpine-2.24+dfsg1/alpine/mailpart.c
Examining data/alpine-2.24+dfsg1/alpine/adrbkcmd.h
Examining data/alpine-2.24+dfsg1/alpine/send.c
Examining data/alpine-2.24+dfsg1/alpine/mailindx.c
Examining data/alpine-2.24+dfsg1/alpine/smime.h
Examining data/alpine-2.24+dfsg1/alpine/listsel.h
Examining data/alpine-2.24+dfsg1/alpine/conftype.h
Examining data/alpine-2.24+dfsg1/alpine/pattern.c
Examining data/alpine-2.24+dfsg1/alpine/alpine.c
Examining data/alpine-2.24+dfsg1/alpine/mailcmd.c
Examining data/alpine-2.24+dfsg1/alpine/help.h
Examining data/alpine-2.24+dfsg1/alpine/takeaddr.c
Examining data/alpine-2.24+dfsg1/alpine/dispfilt.c
Examining data/alpine-2.24+dfsg1/alpine/pine-use.c
Examining data/alpine-2.24+dfsg1/include/config.wnt.h
Examining data/alpine-2.24+dfsg1/include/system.h
Examining data/alpine-2.24+dfsg1/include/general.h
Examining data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c
Examining data/alpine-2.24+dfsg1/imap/src/mlock/mlock.c
Examining data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c
Examining data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c
Examining data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/os_nt.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_none.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/os_ntk.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/fdstring.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/ip6_nt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_nt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/proc.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/yunchan.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/kerb_w2k.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/write.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/yunchan.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_win.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/mailfile.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/sslstdio.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/fdstring.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummy.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/nl_nt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/ip4_nt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_w2k.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/kerb_mit.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/pmatch.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/ftl_nt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/pseudo.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/os_w2k.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/os_nt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/pseudo.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/tcp_nt.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/tcp_nt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/nt/fs_nt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/scandir.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/ssl_none.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/phile.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tz_bsd.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/fdstring.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/nl_ami.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/log_std.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/os_ami.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/write.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/ftl_ami.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/fdstring.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/gethstid.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/fs_ami.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/os_ami.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/gr_waitp.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/pmatch.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/pseudo.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/ckp_std.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/amiga/pseudo.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/nl_dos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_dwa.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dpc.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dwa.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_dwa.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dbw.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/ftl_dos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dbw.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_dos.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/fdstring.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dnv.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_wsk.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_dos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/fs_dos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/write.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/fdstring.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummy.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/bezrkdos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dnv.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/pmatch.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dpc.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dnf.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_wsk.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dnf.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dwa.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/os_wce.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/os_wce.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/dummywce.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/fs_wce.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/nl_wce.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/dummy.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/ftl_wce.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/wce/pmatch.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/linkage.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/env_mac.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/os_mac.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/tcp_mac.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/env_mac.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/fs_mac.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/dummy.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/osdep.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/linkage.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/tcp_mac.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/nl_mac.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/ftl_mac.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/os_mac.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/pmatch.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/mac/dummymac.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/linkage.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/fs_t20.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/tcp_t20.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/log_t20.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/ftl_t20.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/nl_t20.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/env_t20.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/shortsym.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/dummy.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/env_t20.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/os_t20.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/linkage.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/dummyt20.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/pmatch.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/os_t20.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/tcp_t20.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/getspnam.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_ssn.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/scandir.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_afs.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_none.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_a32.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_slx.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_qn6.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ip4_unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/phile.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_a52.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_lyn.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_mct.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/setpgrp.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/utime.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_a41.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_aux.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/log_bsi.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_aos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/opendir.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/crx_nfs.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/fs_unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_os4.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_bsd.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/truncate.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/tz_bsd.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_ult.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_d-g.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sgi.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_gss.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv2.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_lnx.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_bsf.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sun.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_bsd.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/flockcyg.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/fdstring.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/flocklnx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_mnt.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/log_cyg.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_dyn.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_nxt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sc5.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_dyn.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_pam.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_lyn.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_a52.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_cyg.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_cvx.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_2nd.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/tz_nul.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_bsi.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_nto.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_isc.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sos.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_nul.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_art.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_do4.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/fsync.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_aix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_ult.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_qnx.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_isc.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/log_std.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ftl_unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sos.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_mct.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_vu2.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/strerror.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_pyr.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_vu2.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_ult.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sua.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_a41.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/log_os4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_sv4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/gr_wait4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_3rd.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_sec.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_osf.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/log_sec.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/write.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_asv.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/sig_psx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/flocksim.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ip6_unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_bsi.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_psx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_a32.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/sig_bsd.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sc5.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/flockcyg.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_cvx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_bsf.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_drs.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sco.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sua.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/flocksim.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_drs.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_qnx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/sslstdio.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sun.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/fdstring.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv4.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_lnx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_nto.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_a41.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/crx_std.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/gr_wait.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/rename.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_svo.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_os4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/gethstid.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_solo.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_sce.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_1st.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_cyg.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_dce.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_soln.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/nl_unix.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_os4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_d-g.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_aix.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_qn6.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/tz_sv4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/log_sv4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_aux.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_do4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_asv.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sgi.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/gr_waitp.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_s40.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_hpp.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_nxt.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/kerb_mit.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_shp.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sco.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/pmatch.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_ptx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/pseudo.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_std.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_s40.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_osf.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/sig_sv4.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_osx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_slx.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_art.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_osx.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/pseudo.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_bsi.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_aos.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_mnt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_pyr.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_ptx.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sol.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/log_old.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_hpp.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_shp.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_cyg.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv2.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_pmb.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/nl_os2.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/tcp_os2.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/os_os2.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/write.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummy.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/fs_os2.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/pmatch.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/pseudo.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/os_os2.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/ftl_os2.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/tcp_os2.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/pseudo.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/linkage.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsl.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/dummyvms.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsn.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/nl_vms.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/fs_vms.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/dummy.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/ftl_vms.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsm.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/os_vms.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/linkage.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vms.h
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/os_vms.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.c
Examining data/alpine-2.24+dfsg1/imap/src/osdep/vms/pmatch.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/jis_0212.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/big5.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/iso_8859.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/cns11643.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/gb_2312.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/viscii.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/ksc_5601.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/gb_12345.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/ibm.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/tis_620.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/koi8_u.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/jis_0208.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/tmap.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/decomtab.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/windows.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/koi8_r.c
Examining data/alpine-2.24+dfsg1/imap/src/charset/widths.c
Examining data/alpine-2.24+dfsg1/imap/src/dmail/dquota.h
Examining data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c
Examining data/alpine-2.24+dfsg1/imap/src/dmail/dquota.c
Examining data/alpine-2.24+dfsg1/imap/src/tmail/tmail.c
Examining data/alpine-2.24+dfsg1/imap/src/tmail/tquota.h
Examining data/alpine-2.24+dfsg1/imap/src/tmail/tquota.c
Examining data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/mail.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/json.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/c-client.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/flstring.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/env.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/flstring.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/utf8aux.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/sslio.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/auth_bea.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/mail.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/auth_pla.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/smtp.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/http.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/netmsg.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/netmsg.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/nntp.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/misc.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/json.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/utf8aux.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/auth_ext.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/http.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/ftl.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/tcp.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/fs.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/auth_oa2.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/auth_ntl.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/auth_log.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/utf8.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/nl.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/utf8.h
Examining data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c
Examining data/alpine-2.24+dfsg1/imap/src/c-client/misc.h
Examining data/alpine-2.24+dfsg1/imap/src/ansilib/memmove2.c
Examining data/alpine-2.24+dfsg1/imap/src/ansilib/strtok.c
Examining data/alpine-2.24+dfsg1/imap/src/ansilib/strstr.c
Examining data/alpine-2.24+dfsg1/imap/src/ansilib/memset.c
Examining data/alpine-2.24+dfsg1/imap/src/ansilib/strtoul.c
Examining data/alpine-2.24+dfsg1/imap/src/ansilib/memmove.c
Examining data/alpine-2.24+dfsg1/imap/src/ansilib/strpbrk.c
Examining data/alpine-2.24+dfsg1/imap/tools/uahelper.c
Examining data/alpine-2.24+dfsg1/ldap/inckit/ldap.h
Examining data/alpine-2.24+dfsg1/ldap/inckit/msdos.h
Examining data/alpine-2.24+dfsg1/ldap/inckit/srchpref.h
Examining data/alpine-2.24+dfsg1/ldap/inckit/lber.h
Examining data/alpine-2.24+dfsg1/ldap/inckit/proto-lb.h
Examining data/alpine-2.24+dfsg1/ldap/inckit/proto-ld.h
Examining data/alpine-2.24+dfsg1/ldap/inckit/disptmpl.h
Examining data/alpine-2.24+dfsg1/ldap/kbind.c
Examining data/alpine-2.24+dfsg1/mapi/pmapi.c
Examining data/alpine-2.24+dfsg1/mapi/instmapi.c
Examining data/alpine-2.24+dfsg1/mapi/smapi.c
Examining data/alpine-2.24+dfsg1/mapi/pmapi.h
Examining data/alpine-2.24+dfsg1/mapi/rfc1522.c
Examining data/alpine-2.24+dfsg1/mapi/resource.h
Examining data/alpine-2.24+dfsg1/pith/ldap.h
Examining data/alpine-2.24+dfsg1/pith/keyword.c
Examining data/alpine-2.24+dfsg1/pith/stream.c
Examining data/alpine-2.24+dfsg1/pith/init.h
Examining data/alpine-2.24+dfsg1/pith/remote.c
Examining data/alpine-2.24+dfsg1/pith/copyaddr.h
Examining data/alpine-2.24+dfsg1/pith/store.h
Examining data/alpine-2.24+dfsg1/pith/mailcmd.h
Examining data/alpine-2.24+dfsg1/pith/context.c
Examining data/alpine-2.24+dfsg1/pith/bitmap.h
Examining data/alpine-2.24+dfsg1/pith/remote.h
Examining data/alpine-2.24+dfsg1/pith/detach.c
Examining data/alpine-2.24+dfsg1/pith/addrbook.c
Examining data/alpine-2.24+dfsg1/pith/readfile.c
Examining data/alpine-2.24+dfsg1/pith/pipe.h
Examining data/alpine-2.24+dfsg1/pith/foldertype.h
Examining data/alpine-2.24+dfsg1/pith/init.c
Examining data/alpine-2.24+dfsg1/pith/icache.h
Examining data/alpine-2.24+dfsg1/pith/maillist.h
Examining data/alpine-2.24+dfsg1/pith/signal.h
Examining data/alpine-2.24+dfsg1/pith/url.h
Examining data/alpine-2.24+dfsg1/pith/rfc2231.h
Examining data/alpine-2.24+dfsg1/pith/newmail.h
Examining data/alpine-2.24+dfsg1/pith/context.h
Examining data/alpine-2.24+dfsg1/pith/abdlc.h
Examining data/alpine-2.24+dfsg1/pith/detoken.h
Examining data/alpine-2.24+dfsg1/pith/remtype.h
Examining data/alpine-2.24+dfsg1/pith/text.c
Examining data/alpine-2.24+dfsg1/pith/pipe.c
Examining data/alpine-2.24+dfsg1/pith/news.c
Examining data/alpine-2.24+dfsg1/pith/smkeys.h
Examining data/alpine-2.24+dfsg1/pith/string.c
Examining data/alpine-2.24+dfsg1/pith/mailpart.h
Examining data/alpine-2.24+dfsg1/pith/maillist.c
Examining data/alpine-2.24+dfsg1/pith/headers.h
Examining data/alpine-2.24+dfsg1/pith/smkeys.c
Examining data/alpine-2.24+dfsg1/pith/strlst.c
Examining data/alpine-2.24+dfsg1/pith/save.h
Examining data/alpine-2.24+dfsg1/pith/sort.h
Examining data/alpine-2.24+dfsg1/pith/detoken.c
Examining data/alpine-2.24+dfsg1/pith/busy.h
Examining data/alpine-2.24+dfsg1/pith/helpindx.c
Examining data/alpine-2.24+dfsg1/pith/mailcap.h
Examining data/alpine-2.24+dfsg1/pith/hist.h
Examining data/alpine-2.24+dfsg1/pith/stream.h
Examining data/alpine-2.24+dfsg1/pith/text.h
Examining data/alpine-2.24+dfsg1/pith/flag.c
Examining data/alpine-2.24+dfsg1/pith/takeaddr.h
Examining data/alpine-2.24+dfsg1/pith/color.c
Examining data/alpine-2.24+dfsg1/pith/state.c
Examining data/alpine-2.24+dfsg1/pith/indxtype.h
Examining data/alpine-2.24+dfsg1/pith/detach.h
Examining data/alpine-2.24+dfsg1/pith/msgno.c
Examining data/alpine-2.24+dfsg1/pith/mailview.c
Examining data/alpine-2.24+dfsg1/pith/filter.h
Examining data/alpine-2.24+dfsg1/pith/reply.c
Examining data/alpine-2.24+dfsg1/pith/mimedesc.h
Examining data/alpine-2.24+dfsg1/pith/addrbook.h
Examining data/alpine-2.24+dfsg1/pith/escapes.c
Examining data/alpine-2.24+dfsg1/pith/string.h
Examining data/alpine-2.24+dfsg1/pith/folder.h
Examining data/alpine-2.24+dfsg1/pith/icaltype.h
Examining data/alpine-2.24+dfsg1/pith/help.c
Examining data/alpine-2.24+dfsg1/pith/msgno.h
Examining data/alpine-2.24+dfsg1/pith/help_c_gen.c
Examining data/alpine-2.24+dfsg1/pith/adrbklib.h
Examining data/alpine-2.24+dfsg1/pith/tempfile.h
Examining data/alpine-2.24+dfsg1/pith/help_h_gen.c
Examining data/alpine-2.24+dfsg1/pith/adjtime.c
Examining data/alpine-2.24+dfsg1/pith/debug.h
Examining data/alpine-2.24+dfsg1/pith/search.h
Examining data/alpine-2.24+dfsg1/pith/smime.c
Examining data/alpine-2.24+dfsg1/pith/filttype.h
Examining data/alpine-2.24+dfsg1/pith/send.h
Examining data/alpine-2.24+dfsg1/pith/sequence.h
Examining data/alpine-2.24+dfsg1/pith/strlst.h
Examining data/alpine-2.24+dfsg1/pith/rfc2231.c
Examining data/alpine-2.24+dfsg1/pith/ical.h
Examining data/alpine-2.24+dfsg1/pith/adrbklib.c
Examining data/alpine-2.24+dfsg1/pith/keyword.h
Examining data/alpine-2.24+dfsg1/pith/mailcap.c
Examining data/alpine-2.24+dfsg1/pith/pineelt.h
Examining data/alpine-2.24+dfsg1/pith/addrstring.c
Examining data/alpine-2.24+dfsg1/pith/charset.c
Examining data/alpine-2.24+dfsg1/pith/handle.h
Examining data/alpine-2.24+dfsg1/pith/margin.h
Examining data/alpine-2.24+dfsg1/pith/thread.c
Examining data/alpine-2.24+dfsg1/pith/imap.h
Examining data/alpine-2.24+dfsg1/pith/margin.c
Examining data/alpine-2.24+dfsg1/pith/editorial.h
Examining data/alpine-2.24+dfsg1/pith/thread.h
Examining data/alpine-2.24+dfsg1/pith/charset.h
Examining data/alpine-2.24+dfsg1/pith/newmail.c
Examining data/alpine-2.24+dfsg1/pith/color.h
Examining data/alpine-2.24+dfsg1/pith/tempfile.c
Examining data/alpine-2.24+dfsg1/pith/mimedesc.c
Examining data/alpine-2.24+dfsg1/pith/imap.c
Examining data/alpine-2.24+dfsg1/pith/util.h
Examining data/alpine-2.24+dfsg1/pith/atttype.h
Examining data/alpine-2.24+dfsg1/pith/state.h
Examining data/alpine-2.24+dfsg1/pith/handle.c
Examining data/alpine-2.24+dfsg1/pith/icache.c
Examining data/alpine-2.24+dfsg1/pith/status.c
Examining data/alpine-2.24+dfsg1/pith/store.c
Examining data/alpine-2.24+dfsg1/pith/mailindx.h
Examining data/alpine-2.24+dfsg1/pith/util.c
Examining data/alpine-2.24+dfsg1/pith/adjtime.h
Examining data/alpine-2.24+dfsg1/pith/osdep/temp_nam.c
Examining data/alpine-2.24+dfsg1/pith/osdep/bldpath.h
Examining data/alpine-2.24+dfsg1/pith/osdep/rename.h
Examining data/alpine-2.24+dfsg1/pith/osdep/pipe.h
Examining data/alpine-2.24+dfsg1/pith/osdep/filesize.c
Examining data/alpine-2.24+dfsg1/pith/osdep/writ_dir.c
Examining data/alpine-2.24+dfsg1/pith/osdep/forkwait.h
Examining data/alpine-2.24+dfsg1/pith/osdep/coredump.h
Examining data/alpine-2.24+dfsg1/pith/osdep/pw_stuff.c
Examining data/alpine-2.24+dfsg1/pith/osdep/pipe.c
Examining data/alpine-2.24+dfsg1/pith/osdep/hostname.c
Examining data/alpine-2.24+dfsg1/pith/osdep/collate.h
Examining data/alpine-2.24+dfsg1/pith/osdep/err_desc.h
Examining data/alpine-2.24+dfsg1/pith/osdep/lstcmpnt.h
Examining data/alpine-2.24+dfsg1/pith/osdep/debugtime.h
Examining data/alpine-2.24+dfsg1/pith/osdep/pithosd.h
Examining data/alpine-2.24+dfsg1/pith/osdep/fnexpand.h
Examining data/alpine-2.24+dfsg1/pith/osdep/color.c
Examining data/alpine-2.24+dfsg1/pith/osdep/pw_stuff.h
Examining data/alpine-2.24+dfsg1/pith/osdep/collate.c
Examining data/alpine-2.24+dfsg1/pith/osdep/hostname.h
Examining data/alpine-2.24+dfsg1/pith/osdep/creatdir.h
Examining data/alpine-2.24+dfsg1/pith/osdep/err_desc.c
Examining data/alpine-2.24+dfsg1/pith/osdep/domnames.h
Examining data/alpine-2.24+dfsg1/pith/osdep/canaccess.h
Examining data/alpine-2.24+dfsg1/pith/osdep/domnames.c
Examining data/alpine-2.24+dfsg1/pith/osdep/mimedisp.c
Examining data/alpine-2.24+dfsg1/pith/osdep/tempfile.h
Examining data/alpine-2.24+dfsg1/pith/osdep/lstcmpnt.c
Examining data/alpine-2.24+dfsg1/pith/osdep/creatdir.c
Examining data/alpine-2.24+dfsg1/pith/osdep/canonicl.c
Examining data/alpine-2.24+dfsg1/pith/osdep/color.h
Examining data/alpine-2.24+dfsg1/pith/osdep/tempfile.c
Examining data/alpine-2.24+dfsg1/pith/osdep/debugtime.c
Examining data/alpine-2.24+dfsg1/pith/osdep/canaccess.c
Examining data/alpine-2.24+dfsg1/pith/osdep/fgetpos.c
Examining data/alpine-2.24+dfsg1/pith/osdep/filesize.h
Examining data/alpine-2.24+dfsg1/pith/osdep/bldpath.c
Examining data/alpine-2.24+dfsg1/pith/osdep/rename.c
Examining data/alpine-2.24+dfsg1/pith/osdep/canonicl.h
Examining data/alpine-2.24+dfsg1/pith/osdep/mimedisp.h
Examining data/alpine-2.24+dfsg1/pith/osdep/temp_nam.h
Examining data/alpine-2.24+dfsg1/pith/osdep/coredump.c
Examining data/alpine-2.24+dfsg1/pith/osdep/writ_dir.h
Examining data/alpine-2.24+dfsg1/pith/osdep/fgetpos.h
Examining data/alpine-2.24+dfsg1/pith/osdep/fnexpand.c
Examining data/alpine-2.24+dfsg1/pith/bldaddr.c
Examining data/alpine-2.24+dfsg1/pith/user.h
Examining data/alpine-2.24+dfsg1/pith/reply.h
Examining data/alpine-2.24+dfsg1/pith/body.c
Examining data/alpine-2.24+dfsg1/pith/body.h
Examining data/alpine-2.24+dfsg1/pith/list.c
Examining data/alpine-2.24+dfsg1/pith/addrstring.h
Examining data/alpine-2.24+dfsg1/pith/folder.c
Examining data/alpine-2.24+dfsg1/pith/readfile.h
Examining data/alpine-2.24+dfsg1/pith/mimetype.h
Examining data/alpine-2.24+dfsg1/pith/search.c
Examining data/alpine-2.24+dfsg1/pith/status.h
Examining data/alpine-2.24+dfsg1/pith/copyaddr.c
Examining data/alpine-2.24+dfsg1/pith/repltype.h
Examining data/alpine-2.24+dfsg1/pith/url.c
Examining data/alpine-2.24+dfsg1/pith/options.h
Examining data/alpine-2.24+dfsg1/pith/list.h
Examining data/alpine-2.24+dfsg1/pith/mailview.h
Examining data/alpine-2.24+dfsg1/pith/hist.c
Examining data/alpine-2.24+dfsg1/pith/editorial.c
Examining data/alpine-2.24+dfsg1/pith/savetype.h
Examining data/alpine-2.24+dfsg1/pith/sort.c
Examining data/alpine-2.24+dfsg1/pith/ablookup.h
Examining data/alpine-2.24+dfsg1/pith/sorttype.h
Examining data/alpine-2.24+dfsg1/pith/pattern.h
Examining data/alpine-2.24+dfsg1/pith/abdlc.c
Examining data/alpine-2.24+dfsg1/pith/ical.c
Examining data/alpine-2.24+dfsg1/pith/news.h
Examining data/alpine-2.24+dfsg1/pith/conf.h
Examining data/alpine-2.24+dfsg1/pith/save.c
Examining data/alpine-2.24+dfsg1/pith/send.c
Examining data/alpine-2.24+dfsg1/pith/mailindx.c
Examining data/alpine-2.24+dfsg1/pith/ablookup.c
Examining data/alpine-2.24+dfsg1/pith/smime.h
Examining data/alpine-2.24+dfsg1/pith/bldaddr.h
Examining data/alpine-2.24+dfsg1/pith/ldap.c
Examining data/alpine-2.24+dfsg1/pith/mimetype.c
Examining data/alpine-2.24+dfsg1/pith/conftype.h
Examining data/alpine-2.24+dfsg1/pith/sequence.c
Examining data/alpine-2.24+dfsg1/pith/charconv/filesys.c
Examining data/alpine-2.24+dfsg1/pith/charconv/filesys.h
Examining data/alpine-2.24+dfsg1/pith/charconv/utf8.c
Examining data/alpine-2.24+dfsg1/pith/charconv/utf8.h
Examining data/alpine-2.24+dfsg1/pith/pattern.c
Examining data/alpine-2.24+dfsg1/pith/flag.h
Examining data/alpine-2.24+dfsg1/pith/mailcmd.c
Examining data/alpine-2.24+dfsg1/pith/help.h
Examining data/alpine-2.24+dfsg1/pith/takeaddr.c
Examining data/alpine-2.24+dfsg1/pith/escapes.h
Examining data/alpine-2.24+dfsg1/pith/filter.c
Examining data/alpine-2.24+dfsg1/pith/conf.c

FINAL RESULTS:

data/alpine-2.24+dfsg1/alpine/roleconf.c:7170:3:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
		strncat(ctmp->varname, "=", NOTLEN);
data/alpine-2.24+dfsg1/imap/src/mlock/mlock.c:131:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (hitch,LOCKPROTECTION);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:887:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (base->lock,(int) lock_protection);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:915:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (base->lock,(int) lock_protection);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:1112:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod (lock,(int) lock_protection);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:1191:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod (path,mode);		/* set the new protection, ignore failure */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:652:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (LOCAL->lname,(long) mail_parameters (NIL,GET_LOCKPROTECTION,NIL));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:513:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (LOCAL->lname,(long) mail_parameters (NIL,GET_LOCKPROTECTION,NIL));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1199:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (base->lock,(int) dotlock_mode);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1217:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (base->lock,(int) dotlock_mode);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1427:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod (lock,shlock_mode);	/* make sure mode OK (don't use fchmod()) */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1506:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod (path,mode);		/* set the new protection, ignore failure */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:654:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (LOCAL->lname,(long) mail_parameters (NIL,GET_LOCKPROTECTION,NIL));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:515:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (LOCAL->lname,(long) mail_parameters (NIL,GET_LOCKPROTECTION,NIL));
data/alpine-2.24+dfsg1/openssl/include/openssl/bio.h:826:29:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
                      int (*gets) (BIO *, char *, int));
data/alpine-2.24+dfsg1/pith/charconv/filesys.c:621:12:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    return(chmod(fname_to_locale(path), mode));
data/alpine-2.24+dfsg1/pith/charconv/filesys.c:632:12:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    return(chown(fname_to_locale(path), owner, group));
data/alpine-2.24+dfsg1/alpine/addrbook.c:2650:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		    if(pab->access != NoAccess){
data/alpine-2.24+dfsg1/alpine/addrbook.c:5509:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(prompt, sizeof(prompt), fmt, "Nickname");
data/alpine-2.24+dfsg1/alpine/addrbook.c:5512:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(prompt, sizeof(prompt), fmt, "All Text");
data/alpine-2.24+dfsg1/alpine/addrbook.c:5515:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(prompt, sizeof(prompt), fmt, "Fullname");
data/alpine-2.24+dfsg1/alpine/addrbook.c:5518:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(prompt, sizeof(prompt), fmt, "addresses");
data/alpine-2.24+dfsg1/alpine/addrbook.c:5521:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(prompt, sizeof(prompt), fmt, "Comment");
data/alpine-2.24+dfsg1/alpine/addrbook.c:5524:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(prompt, sizeof(prompt), fmt, "Fcc");
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2021:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    remember_access_result = pab->access;
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2385:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(prompt,sizeof(prompt),
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2419:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(prompt, sizeof(prompt),
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2474:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(prompt,sizeof(prompt),
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2527:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(prompt, sizeof(prompt),
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3130:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(tmp, sizeof(tmp),
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3387:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if(pab->type & GLOBAL && pab->access != NoAccess)
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3940:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if(pab->access != NoAccess)
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3946:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if(pab->access != NoAccess && pab->access != MaybeRorW)
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3946:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if(pab->access != NoAccess && pab->access != MaybeRorW)
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:6389:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(prompt, sizeof(prompt), cmd, dname);
data/alpine-2.24+dfsg1/alpine/alpine.c:2262:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf), mkeys[cmd].key_and_name[0] ? _(mkeys[cmd].key_and_name) : "",
data/alpine-2.24+dfsg1/alpine/alpine.c:2291:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf), mkeys[cmd].key_and_name[0] ? _(mkeys[cmd].key_and_name) : "",
data/alpine-2.24+dfsg1/alpine/arg.c:232:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      sprintf(options[nlines++], "%s%s \\", prefix, s+1);
data/alpine-2.24+dfsg1/alpine/arg.c:245:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	   strcat(options[nlines], prefix);
data/alpine-2.24+dfsg1/alpine/arg.c:246:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	   strcat(options[nlines], s+1);
data/alpine-2.24+dfsg1/alpine/arg.c:464:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_conflict), "-copy_pinerc");
data/alpine-2.24+dfsg1/alpine/arg.c:486:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_conflict), "-copy_abook");
data/alpine-2.24+dfsg1/alpine/arg.c:518:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_conflict), "-url");
data/alpine-2.24+dfsg1/alpine/arg.c:537:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			  snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_attachment), "-attach");
data/alpine-2.24+dfsg1/alpine/arg.c:544:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_conflict), "-attach");
data/alpine-2.24+dfsg1/alpine/arg.c:571:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			  snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_attachment), "-attachList");
data/alpine-2.24+dfsg1/alpine/arg.c:578:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_conflict), "-attachList");
data/alpine-2.24+dfsg1/alpine/arg.c:597:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			  snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_attachment), "-attach_and_delete");
data/alpine-2.24+dfsg1/alpine/arg.c:604:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_conflict), "-attach_and_delete");
data/alpine-2.24+dfsg1/alpine/arg.c:745:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_flag_arg), c);
data/alpine-2.24+dfsg1/alpine/arg.c:789:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			  snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_flag_arg), c);
data/alpine-2.24+dfsg1/alpine/arg.c:802:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_conflict), "-f");
data/alpine-2.24+dfsg1/alpine/arg.c:815:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_conflict), "-F");
data/alpine-2.24+dfsg1/alpine/arg.c:903:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			      snprintf(tmp_20k_buf, SIZEOF_20KBUF,
data/alpine-2.24+dfsg1/alpine/arg.c:916:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			      snprintf(tmp_20k_buf, SIZEOF_20KBUF,
data/alpine-2.24+dfsg1/alpine/arg.c:934:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		      snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_unknown), c);
data/alpine-2.24+dfsg1/alpine/arg.c:957:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	  snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_conflict), *av);
data/alpine-2.24+dfsg1/alpine/arg.c:974:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_I_error), cmd_list, error);
data/alpine-2.24+dfsg1/alpine/arg.c:1024:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(tmp_20k_buf, SIZEOF_20KBUF, args_err_internal, error);
data/alpine-2.24+dfsg1/alpine/arg.c:1049:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(tmp1,"%s=%s", ps_global->vars[V_XOAUTH2_INFO].name, tmp2);
data/alpine-2.24+dfsg1/alpine/arg.c:1115:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_d_error), debug_str, error);
data/alpine-2.24+dfsg1/alpine/arg.c:1130:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_debug_num), *p);
data/alpine-2.24+dfsg1/alpine/arg.c:1151:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_debug_num), *p);
data/alpine-2.24+dfsg1/alpine/arg.c:1163:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_debug_num), *p);
data/alpine-2.24+dfsg1/alpine/arg.c:1177:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_debug_num), *p);
data/alpine-2.24+dfsg1/alpine/arg.c:1192:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp_20k_buf, SIZEOF_20KBUF, _(args_err_missing_debug_num), *p);
data/alpine-2.24+dfsg1/alpine/folder.c:6040:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(tmp, sizeof(tmp), context->context, folder);
data/alpine-2.24+dfsg1/alpine/imap.c:377:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(tmp, "%s (%s)", oa2list->name, method);
data/alpine-2.24+dfsg1/alpine/imap.c:491:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, _("<CENTER>Authorizing Alpine Access to %s Email Services</CENTER>"), name);
data/alpine-2.24+dfsg1/alpine/imap.c:493:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, _("<P>Alpine is attempting to log you into your %s account, using the %s method."), name, method),
data/alpine-2.24+dfsg1/alpine/imap.c:497:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(tmp,
data/alpine-2.24+dfsg1/alpine/imap.c:507:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, _(" When you open this link, you will be sent to %s's servers to complete this process."), name);
data/alpine-2.24+dfsg1/alpine/imap.c:668:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, _("<CENTER>Authorizing Alpine Access to %s Email Services</CENTER>"), oauth2->name);
data/alpine-2.24+dfsg1/alpine/imap.c:670:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, _("<P>Alpine is attempting to log you into your %s account, using the %s method."), oauth2->name, method),
data/alpine-2.24+dfsg1/alpine/imap.c:691:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp_20k_buf, _("<A HREF=\"%s\">%s</A>"), url, url);
data/alpine-2.24+dfsg1/alpine/imap.c:695:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, _(" When you open this link, you will be sent to %s's servers to complete this process."), oauth2->name);
data/alpine-2.24+dfsg1/alpine/imap.c:820:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(prompt, "%s: ", accesscodelabel);
data/alpine-2.24+dfsg1/alpine/imap.c:962:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(prompt, "%s: %s - %s: ", hostlabel, mb->orighost, userlabel);
data/alpine-2.24+dfsg1/alpine/imap.c:1204:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(token, "%s%c%s%c%lu", 
data/alpine-2.24+dfsg1/alpine/imap.c:2327:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    system("csh");
data/alpine-2.24+dfsg1/alpine/imap.c:3017:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(prompt, "%s: ", accesscodelabel);
data/alpine-2.24+dfsg1/alpine/imap.c:3700:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(blob, "%s%c%d", authtype, PWDAUTHSEP, l->altflag);
data/alpine-2.24+dfsg1/alpine/imap.c:3750:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(blob, "%s%c%d", authtype, PWDAUTHSEP, l->altflag);
data/alpine-2.24+dfsg1/alpine/imap.c:3833:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(blob, "%s%c%d", authtype, PWDAUTHSEP, l->altflag);
data/alpine-2.24+dfsg1/alpine/init.c:90:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(tmp_20k_buf, SIZEOF_20KBUF, init_md_exists, ps->folders_dir);
data/alpine-2.24+dfsg1/alpine/init.c:95:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(tmp_20k_buf, SIZEOF_20KBUF, init_md_file, ps->folders_dir);
data/alpine-2.24+dfsg1/alpine/init.c:100:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(tmp_20k_buf, SIZEOF_20KBUF, init_md_create, ps->folders_dir);
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4947:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(prompt_buf, sizeof(prompt_buf),
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4972:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(prompt_buf, sizeof(prompt_buf),
data/alpine-2.24+dfsg1/alpine/mailpart.c:2132:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_path, "file://%s", filename);
data/alpine-2.24+dfsg1/alpine/osdep/chnge_pw.c:59:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(cmd_buf);
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:293:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(debugfile, fmt, args);
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:320:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(b, sizeof(b), fmt, args);
data/alpine-2.24+dfsg1/alpine/osdep/execview.c:331:13:  [4] (shell) WinExec:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    return((WinExec(cmd, SW_SHOWMINNOACTIVE) < 32) ? 1 : 0);
data/alpine-2.24+dfsg1/alpine/osdep/print.c:525:34:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    if(!ps_global->print->err && snprintf(buf, sizeof(buf), line, a1) < 0)
data/alpine-2.24+dfsg1/alpine/osdep/termin.unx.c:728:15:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
	    if((pw = getpass(prompt)) != NULL){
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:335:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, sizeof(buffer), line, arg1);
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:356:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, sizeof(buffer), line, arg1, arg2);
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:377:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, sizeof(buffer), line, arg1, arg2, arg3);
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:399:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, sizeof(buffer), line, arg1, arg2, arg3, arg4);
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:422:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, sizeof(buffer), line, arg1, arg2, arg3, arg4, arg5);
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:977:2:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	_sntprintf(tcbuf, sizeof(tcbuf), TEXT("Host: %.100s%s"), host_lptstr,
data/alpine-2.24+dfsg1/alpine/pine-use.c:105:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if(access(filename, 0) == 0)
data/alpine-2.24+dfsg1/alpine/pine-use.c:167:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buf, sizeof(buf), MAILSPOOLPCTS, user);
data/alpine-2.24+dfsg1/alpine/reply.c:2112:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if(rd->access != NoExists){
data/alpine-2.24+dfsg1/alpine/reply.c:2143:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if(rd->access != ReadWrite || rd_remote_is_readonly(rd)){
data/alpine-2.24+dfsg1/alpine/roleconf.c:8056:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buf, buflen, fmt, q);
data/alpine-2.24+dfsg1/alpine/rpdump.c:85:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, ustr, argv[0]);
data/alpine-2.24+dfsg1/alpine/rpdump.c:100:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, ustr, argv[0]);
data/alpine-2.24+dfsg1/alpine/rpdump.c:152:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if(access(local, WRITE_ACCESS) == 0){
data/alpine-2.24+dfsg1/alpine/rpdump.c:751:15:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
	    if((pw = getpass(prompt)) != NULL){
data/alpine-2.24+dfsg1/alpine/rpload.c:89:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, ustr, argv[0]);
data/alpine-2.24+dfsg1/alpine/rpload.c:112:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, ustr, argv[0]);
data/alpine-2.24+dfsg1/alpine/rpload.c:128:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if(access(local, ACCESS_EXISTS) != 0){
data/alpine-2.24+dfsg1/alpine/rpload.c:133:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if(access(local, READ_ACCESS) != 0){
data/alpine-2.24+dfsg1/alpine/rpload.c:989:15:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
	    if((pw = getpass(prompt)) != NULL){
data/alpine-2.24+dfsg1/alpine/signal.c:825:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    result = system(shell);
data/alpine-2.24+dfsg1/alpine/smime.c:1627:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(tmp, sizeof(tmp), u,
data/alpine-2.24+dfsg1/alpine/smime.c:1665:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, _("List of %s certificates"), ctype == Public ? _("public")
data/alpine-2.24+dfsg1/alpine/smime.c:1728:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(tmp, sizeof(tmp), u,
data/alpine-2.24+dfsg1/alpine/takeaddr.c:922:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if(pab->access != ReadWrite){
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:103:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(rv, list[i]);
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:140:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(rv, "%s\"%s\" %s\"%s\"", XNAME, x->name, XID, x->client_id);
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:142:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(rv + strlen(rv), " %s\"%s\"", XSECRET, x->client_secret);
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:144:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(rv + strlen(rv), " %s\"%s\"", XTENANT, x->tenant);
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:145:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(rv + strlen(rv), " %s\"%s\"", XUSER, x->users ? x->users : "");
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:147:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(rv + strlen(rv), " %s\"%s\"", XFLOW, x->flow ? x->flow : "");
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:189:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(s, _("Alpine cannot determine which client-id to use for the username <%s> for your %s account. "), user, xinfo[0]->name);
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:193:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(s + strlen(s), "%s", "\n\n");
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:237:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(tmp, _("Alpine cannot determine which client-id to use for the username <%s>"), user);
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:242:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(tmp, _("for your %s account. Please select the client-id to use from the following list.\n\n"), xinfo[0]->name);
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:361:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(x->users, user);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_bea.c:125:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(response, "%s%s,\001%s%s\001%s%s\001%s%s\001\001", BEARER_ACCOUNT, user,
data/alpine-2.24+dfsg1/imap/src/c-client/auth_ext.c:66:35:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if ((*responder) (stream,base,strcpy (user,mb->user),strlen(mb->user))) {
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:56:25:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
#define SERVER_LOG(x,y) syslog (LOG_ALERT,x,y)
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:69:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s@%s",(char *) mail_parameters (NIL,GET_SERVICENAME,NIL),
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:149:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s@%s",service,mb->host);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:212:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (tmp+4,strcpy (user,mb->user[0] ? mb->user : myusername ()));
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:212:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (tmp+4,strcpy (user,mb->user[0] ? mb->user : myusername ()));
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:226:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (tmp,"Unknown gss_wrap failure: %s",(char *) resp.value);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:235:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (tmp,"GSSAPI mechanism status: %s",(char *) resp.value);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:256:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Kerberos credentials expired (try running kinit) for %s",
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:276:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (tmp,kerberos_try_kinit (smn) ?
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:291:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Unknown GSSAPI failure: %s",(char *) resp.value);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:300:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"GSSAPI mechanism status: %s",(char *) resp.value);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:336:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s@%s",(char *) mail_parameters (NIL,GET_SERVICENAME,NIL),
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:158:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (chal,"<%lu.%lu@%s>",(unsigned long) getpid (),
data/alpine-2.24+dfsg1/imap/src/c-client/auth_oa2.c:145:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(response, "%s%s\001%s%s\001\001", OAUTH2_USER, user, OAUTH2_BEARER, oauth2.access_token);
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:770:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(line, "%s %s %s", method, target, version);
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:787:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf((*reqp)->header + hlen, "%s: %s\015\012", name, value);
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:800:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(*bufp, text);
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:915:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(mb->host, mb->orighost);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:521:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (ref && *ref) sprintf (mbx,"%s%s",ref,pat);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:522:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (mbx,pat);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:592:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (ref && *ref) sprintf (mbx,"%s%s",ref,pat);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:593:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    else strcpy (mbx,pat);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:789:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (strchr (strcpy (tmp,stream->mailbox),'}') + 1,mb.mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:789:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (strchr (strcpy (tmp,stream->mailbox),'}') + 1,mb.mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:839:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Reusing connection to %s",net_host (LOCAL->netstream));
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:840:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if (LOCAL->user) sprintf (tmp + strlen (tmp),"/user=\"%s\"",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1002:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"{%s",(long) mail_parameters (NIL,GET_TRUSTDNS,NIL) ?
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1022:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (LOCAL->user) sprintf (tmp + strlen (tmp),"/user=\"%s\"",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1043:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (tmp,mb.mailbox);/* mailbox name */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1134:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s AUTHENTICATE ANONYMOUS",tag);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1191:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Retrying using %s authentication after %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1200:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Retrying %s authentication after %.80s",at->name,lsterr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1207:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s AUTHENTICATE %s",tag,at->name);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1676:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if (imap_extrahdrs) sprintf (tmp + strlen (tmp)," %s %s %s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1679:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	else sprintf (tmp + strlen (tmp)," %s %s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1685:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (tmp,LEVELIMAP4 (stream) ? " BODYSTRUCTURE" : " BODY");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1911:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"[NOTIMAP4REV1] IMAP%s server can't do extended body fetch",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1917:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"[NOTIMAP4REV1] IMAP%s server can't do partial fetch",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1922:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp,"[NOTIMAP4REV1] IMAP%s server can't do selective header fetch",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1934:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (tmp,nopeek ?	/* only babble if \Seen not set */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3018:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(p, " \"%s\" \"%s\"", list->name, list->value);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3117:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (CMDBASE,"%s %s",tag,cmd);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3425:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	       sprintf (u, (X), (Y));		\
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3918:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (*s," %s %d-%s-%d",name,date & 0x1f,
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3961:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s = (char *) fs_get ((i = strlen (string) + 2) + 1),
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4420:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (strncpy (LOCAL->tmp,stream->mailbox,i) + i,t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4464:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s = LOCAL->tmp,"%s%s",LOCAL->prefix,(char *) t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4670:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (t = LOCAL->tmp,"%s%s",LOCAL->prefix,(char *) reply->text);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5136:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	    sprintf (LOCAL->tmp,/* yes, must be bad syntax */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:6104:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (*s) strcpy (rs,s);	/* write remainder of sequence */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:730:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't %s with such a name",purpose);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:748:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't %s %.80s: %s",purpose,mailbox,(*mailbox == '{') ?
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:768:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (host) strcpy (host,mb.host);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:769:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (mailbox) strcpy (mailbox,mb.mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:812:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (mb->mailbox,t+1);	/* set mailbox name */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:850:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  lcase (strcpy (mb->service,v));
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:852:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (mb->user,v);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:854:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		 !*mb->authuser) strcpy (mb->authuser,v);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:856:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		 !*mb->auth) strcpy (mb->auth,v);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:900:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  lcase (strcpy (mb->service,s));
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:918:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (!*mb->service) strcpy (mb->service,service);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1073:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't create %.80s: %s",mailbox,(*mailbox == '{') ?
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1085:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't create %s: %.80s",s,mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1165:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't rename to %s: %.80s",s,newname);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1843:32:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (section && *section) sprintf (tmp,"%s.HEADER",section);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1923:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s.TEXT",section);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1984:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s.MIME",section);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2037:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (!strcmp (s = strcpy (tmp,section),"0") ||
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2120:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s.TEXT",section);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2543:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		 s += strlen (s)) sprintf (s," %s",f);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2565:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (tmp,"Unable to move message %lu from %s mailbox",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2690:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't append %.80s: %s",mailbox,(*mailbox == '{') ?
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2695:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else if (!strncmp (lcase (strcpy (tmp,mailbox)),"#driver.",8)) {
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2872:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (string,"%2d-%s-%d %02d:%02d:%02d %c%02d%02d",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2899:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (string,fmt,days[(int) (d + 2 + ((7 + 31 * m) / 12)
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2962:64:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (s && *s && (strlen (s) < (size_t)MAILTMPLEN)) s = ucase (strcpy (tmp,s));
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3833:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (sect,"%s%lu",prefix ? prefix : "",section++);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4047:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Search botch, mbx = %.80s, %s = %lu[%.80s]",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5050:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s.%lx.%lx@%s",stream->mailbox,stream->uid_validity,
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5281:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (ret = (char *) fs_get (strlen (adr->mailbox) +
data/alpine-2.24+dfsg1/imap/src/c-client/misc.c:74:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return string ? strcpy ((char *) fs_get (1 + strlen (string)),string) : NIL;
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:53:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (tmp,fmt,text);
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:164:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (*(lcl = strcpy (name,pattern)) == '{') lcl = strchr (lcl,'}') + 1;
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:350:24:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    if (!(bf = fopen ((strcat (strcpy (backup,newsrc),OLDFILESUFFIX)),"wb"))) {
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:350:32:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (!(bf = fopen ((strcat (strcpy (backup,newsrc),OLDFILESUFFIX)),"wb"))) {
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:243:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (mb.mailbox[0] != '#') strcpy (mbx,mb.mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:247:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	   (mb.mailbox[5] == '.')) strcpy (mbx,mb.mailbox+6);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:355:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (*(lcl = strchr (strcpy (name,pattern),'}') + 1) == '#') lcl += 6;
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:364:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (lcl,s);		/* make full form of name */
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:398:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (ref && *ref) sprintf (mbx,"%s%s",ref,pat);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:399:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (mbx,pat);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:421:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pattern,ref);	/* copy reference to pattern */
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:423:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (*pat == '#') strcpy (strchr (pattern,'}') + 1,pat);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:426:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (pattern,pat + 1);	/* append, omitting one of the period */
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:427:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    else strcat (pattern,pat);	/* anything else is just appended */
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:429:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (pattern,pat);	/* just have basic name */
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:522:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Invalid NNTP name %s",mbx);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:664:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Reusing connection to %s",net_host (nstream->netstream));
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:689:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    hostlist[0] = strcpy (tmp,mb.host);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:703:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (mb.user[0]) sprintf (tmp + strlen (tmp),"/user=\"%s\"",mb.user);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:749:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmp,newsrc);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:752:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    lcase (strcpy (s,(long) mail_parameters (NIL,GET_NEWSRCCANONHOST,NIL) ?
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:762:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"{%s:%lu/nntp",(long) mail_parameters (NIL,GET_TRUSTDNS,NIL) ?
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:777:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (LOCAL->user) sprintf (tmp + strlen (tmp),"/user=\"%s\"",LOCAL->user);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:779:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else sprintf (tmp + strlen (tmp),"}#news.%s",mbx);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:826:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Newsgroup %s is empty",mbx);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1939:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (path,"Path: %s!%s\015\012",net_localhost (stream->netstream),
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2003:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (args) sprintf (s,"%s %s",command,args);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2004:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    else strcpy (s,command);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2058:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Retrying using %s authentication after %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2067:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Retrying %s authentication after %.80s",at->name,lsterr);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2073:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(tmp, "AUTHINFO SASL %s", at->name);	/* create base string */
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2230:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stream->reply,"%ld %s",NNTPSOFTFATAL,text);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:88:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	   strcat(rv, u);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:90:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	      strcat(rv, tenant);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:248:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (strchr (strcpy (tmp,ref),'}')+1,"INBOX");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:253:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (strchr (strcpy (tmp,pat),'}')+1,"INBOX");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:275:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (ref && *ref) sprintf (mbx,"%s%s",ref,pat);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:276:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (mbx,pat);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:435:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp + strlen (tmp),"/user=\"%s\"}%s",usr,mb.mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:635:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (pwd,"Retrying %s authentication after %.80s",at->name,t);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:640:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(pwd, "AUTH %s", at->name);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:1084:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (args) sprintf (s,"%s %s",command,args);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:1085:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    else strcpy (s,command);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:814:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	  sprintf (tmp,s,string);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1023:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (adl + adllen - 1,",@%s",s);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1026:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    else sprintf (adl = (char *) fs_get (i),"@%s",s);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1100:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (v = (char *) fs_get (strlen (adr->mailbox) + strlen (s) + 2),
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1178:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (v = (char *) fs_get (strlen (ret) + strlen (s) + 2),
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:250:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      sprintf (tmp,"%sSMTP authentication not available: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:301:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Retrying using %s authentication after %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:310:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Retrying %s authentication after %.80s",at->name,lsterr);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:315:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "AUTH %s", at->name);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:454:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (smtpserver,"{%.200s/smtp%s}<none>",
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:480:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp + strlen (tmp),"@%s",env->return_path->host);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:495:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (tmp,ESMTP.dsn.full ? " RET=FULL" : " RET=HDRS");
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:600:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp + strlen (tmp),"@%s>",adr->host);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:653:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (args) sprintf (s,"%s %s",command,args);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:654:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (s,command);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:707:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"EHLO %s",host);	/* build the complete command */
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:799:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stream->reply,"%ld %s",code,text);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:265:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (path,sysinbox ());/* use system INBOX */
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:273:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"#driver.%s/INBOX",ds->dtb->name);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:327:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (path,sysinbox ());	/* use system INBOX for unix and MMDF */
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:340:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"#driver.%s/INBOX",ds->dtb->name);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:391:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s appending to %.80s (%s %.80s)",
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:427:26:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  if (lstat (path,sbuf)) strcat (tmp,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:426:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (tmp,response,t ? (char *) cmdbuf : "*");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:576:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (msg,"%s %s",cmd,s);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:678:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy (u,v);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1508:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (tmp,response,lstref ? "*" : tag);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1515:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	  sprintf (tmp,response,tag);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1525:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (tmp,response,tag);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1560:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (tmp,response,tag,cmd,lasterror ());
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3012:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"BODY[%s.MIME]",ta->section);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3042:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"BODY[%s]",ta->section ? ta->section : "");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3122:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"BINARY.SIZE[%s] %lu",ta->section ? ta->section : "",
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3131:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"BINARY[%s]<%lu> ",
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3133:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	else sprintf (tmp,"BINARY[%s] ",ta->section ? ta->section : "");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3147:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"BINARY[%s] NIL",ta->section ? ta->section : "");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3213:38:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (ta->section && *ta->section) sprintf (tmp,"BODY[%s.TEXT]",ta->section);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4011:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (s,"#public/%s",(*name == '/') ? name+1 : name);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4058:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pattern,ref);	/* copy reference to pattern */
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4060:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (*pat == '#') strcpy (pattern,pat);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4063:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (pattern,pat + 1);	/* append, omitting one of the period */
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4064:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    else strcat (pattern,pat);	/* anything else is just appended */
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4066:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (pattern,pat);	/* just have basic name */
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4204:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (s,t);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:350:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmp+i,t);		/* append mailbox to initial spec */
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:398:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (elt) sprintf (status,"Status: %s%s\015\012",
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:383:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	      sprintf (tmp,STATUS,elt->seen ? "R" : " ",
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:451:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	      sprintf (tmp,STATUS,elt->seen ? "R" : " ",
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:268:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf (usage2,pgm,usgchk,stdsw);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:277:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf (usage2,pgm,usgcre,stdsw);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:285:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf (usage2,pgm,usgdel,stdsw);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:293:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf (usage2,pgm,usgren,stdsw);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:301:32:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if (!src || !dst || merge) printf (usage3,pgm,cmd,usgcpymov,stdsw);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:312:32:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if (!src || !dst || merge) printf (usage3,pgm,cmd,usgappdel,stdsw);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:325:38:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	!(criteria = prune_criteria (dst))) printf (usage2,pgm,usgprn,stdsw);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:365:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if (!src || !dst) printf (usage2,pgm,usgxfr,stdsw);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:375:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (dest) strcpy (strchr (strcpy (tmp,dest->mailbox),'}') + 1,
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:375:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (dest) strcpy (strchr (strcpy (tmp,dest->mailbox),'}') + 1,
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:387:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (source) strcpy (strchr (strcpy (tmp,source->mailbox),'}') + 1,
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:387:35:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (source) strcpy (strchr (strcpy (tmp,source->mailbox),'}') + 1,
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:389:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      else strcpy (tmp,src);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:426:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf (usage2,pgm,"command [switches] arguments",stdsw);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:486:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%s%lu", *len == 0L ? "" : ",", i);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:488:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%s%lu:*", *len == 0L ? "" : ",", i);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:490:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%s%lu:%lu", *len == 0L ? "" : ",", i, j);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:500:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(*sequence + strlen(*sequence), tmp);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:757:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (ndst = (char *) fs_get (strlen (dst) + strlen (suffix) + 1),
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:783:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (s,tail);		/* terminate flags list */
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:872:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (t,t1);		/* copy the user flag */
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1041:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s = tmp,"{%s/%s",mb->host,mb->service);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1042:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (*mb->user) sprintf (tmp+strlen (tmp),"/user=%s",
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1043:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			  strcpy (username,mb->user));
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1044:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (*mb->authuser) sprintf (tmp+strlen (tmp),"/authuser=%s",mb->authuser);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1053:18:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
  if(strlen (s = getpass (s)) < MAILTMPLEN) *password = cpystr(s);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1062:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (s = tmp,"{%s/%s",mb->host,mb->service);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1063:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (*mb->user) sprintf (tmp+strlen (tmp),"/user=%s",
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1064:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			  strcpy (username,mb->user));
data/alpine-2.24+dfsg1/imap/src/mlock/mlock.c:110:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (lock,"%s.lock",file);
data/alpine-2.24+dfsg1/imap/src/mlock/mlock.c:124:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (hitch,"%s.%lu.%lu.",lock,(unsigned long) time (0),
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:105:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmp,pwd->pw_gecos);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:108:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (personalname,tmp);/* make a permanent copy of it */
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:397:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (t = tmp+400,"%s@%s",adr->mailbox,adr->host);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:404:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (tmp,stream->user_flags[find_rightmost_bit (&i)]);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:442:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (tmp,stream->user_flags[find_rightmost_bit (&i)]);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:466:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (pfx) sprintf (tmp,"%s%ld.",pfx,++i);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:473:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (s," %s%ld %s",pfx,++i,body_types[body->type]);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:474:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (body->subtype) sprintf (s += strlen (s),"/%s",body->subtype);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:475:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (body->description) sprintf (s += strlen (s)," (%s)",body->description);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:477:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s),";%s=%s",par->attribute,par->value);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:479:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (body->id) sprintf (s += strlen (s),", id = %s",body->id);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:495:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"%s%ld.",pfx,i);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:713:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (curhst,mb->host);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:714:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s = tmp,"{%s/%s",mb->host,mb->service);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:715:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (*mb->user) sprintf (tmp+strlen (tmp),"/user=%s",strcpy (user,mb->user));
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:715:55:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (*mb->user) sprintf (tmp+strlen (tmp),"/user=%s",strcpy (user,mb->user));
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:716:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (*mb->authuser) sprintf (tmp+strlen (tmp),"/authuser=%s",mb->authuser);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:727:25:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
  if(pwd) *pwd = cpystr(getpass (s));
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:810:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (text,line);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:817:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (msg->date,line);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/ckp_std.c:40:36:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	  !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) ?
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:172:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    else strcpy (file,test);	/* use just that name then */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:222:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  pmatch ("INBOX",ucase (strcpy (tmp,test))))
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:299:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if (dir) sprintf (tmp,"%s%s",dir,d->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:300:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	else strcpy (tmp,d->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:302:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	if ((pmatch_full (strcpy (path,tmp),pat,'/') ||
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:306:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy (path+len-1,d->d_name) && !stat (path,&sbuf)) {
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:311:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (path,"%s/",tmp);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:757:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return (s && !*s) ? strcpy (dst,sysinbox ()) : s;
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:778:32:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (mailboxfile (tmp,pat)) strcpy (tmp,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:786:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmp,pat);		/* yes, ignore */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:791:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (!ref) strcpy (tmp,pat);	/* just copy if no namespace */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:794:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (*pat == '/') strcpy (strchr (strcpy (tmp,ref),'/'),pat);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:794:40:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (*pat == '/') strcpy (strchr (strcpy (tmp,ref),'/'),pat);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:796:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      else sprintf (tmp,"%s%s",ref,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:329:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (date,prefix,days[t->tm_wday]);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:333:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (date,fmt,t->tm_mday,months[t->tm_mon],t->tm_year+1900,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:621:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s/INBOX",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:638:44:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (!myNewsrc) myNewsrc = cpystr(strcat (strcpy (tmp,myHomeDir),"/.newsrc"));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:665:24:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
    if (((s = (char *) getlogin ()) && *s && (strlen (s) < NETMAXUSER) &&
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:723:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s/%s",home,mailsubdir);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:740:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s/%s",MAILSPOOL,myusername ());
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:759:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmp,dir);		/* write directory prefix */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:764:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (tmp,name);	/* write name in directory */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:770:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (dst,mymailboxdir ());
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:794:31:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(name[4] == '/') && ftpHome) sprintf (dst,"%s/%s",ftpHome,name+5);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:810:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (dst,"%s/%s",s,compare_cstring (name,"INBOX") ? name : "INBOX");
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:818:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    else strcpy (dst,name);	/* unrestricted, copy root name */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:824:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    else if (*name == '/') sprintf (dst,"%s/%s",mymailboxdir (),name+1);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:840:23:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	else if (mailsubdir) sprintf (dst,"%s/%s/%s",pw->pw_dir,mailsubdir,name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:841:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	else sprintf (dst,"%s/%s",pw->pw_dir,name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:849:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (anonymous) sprintf (dst,"%s/INBOX",mymailboxdir ());
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:855:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (dst,"%s/%s",mymailboxdir (),name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:877:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (base->lock,"%s.lock",file);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:947:13:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    _exit (execv (argv[0],argv));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:975:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(tmp,		/* generate default message */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:987:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Mailbox vulnerable - error creating %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:1062:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (lock,"%s/.%lx.%lx","/tmp",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.h:41:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONFILE(t) sprintf (t,"%s/.mailboxlist",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.h:42:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONTEMP(t) sprintf (t,"%s/.mlbxlsttmp",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:397:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:408:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s += strlen (s),"%s\015\012",t);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:411:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:452:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:460:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:491:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:498:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:574:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't open mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:963:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Can't copy new mail: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:1058:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:1198:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:1304:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:1510:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:1515:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf+50,"Invalid flags for message %lu (%lu %lu): %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:1552:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (s += strlen (s),"%s\015\012",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:1594:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf,"Unable to read old status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mbx.c:1599:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf+50,"Invalid flags for message %lu (%lu %lu): %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:245:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s/%s",myhomedir (),MHPROFILE);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:261:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    else sprintf (s = tmp,"%s/%s",myhomedir (),v);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:270:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"%s/%s",myhomedir (),MHPATH);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:364:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      else strcpy (file,test+4);/* use just that name then */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:422:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (dir) sprintf (name,"#mh/%s/",dir);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:431:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (cp,d->d_name);	/* make directory name */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:433:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (np,d->d_name);/* make mh name of directory name */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:488:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't create mailbox %.80s: %s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:517:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmp + i,d->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:524:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s: %s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:563:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:662:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:878:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"%s/%s",LOCAL->dir,names[i]->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:899:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,++old);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:987:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:989:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Expunge of message %lu failed, aborted: %s",i,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:1045:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:1158:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't open append message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:1169:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:1250:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pattern,ref);	/* copy reference to pattern */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:1252:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (*pat == '#') strcpy (pattern,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:1255:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (pattern,pat + 1);	/* append, omitting one of the period */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:1256:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    else strcat (pattern,pat);	/* anything else is just appended */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mh.c:1258:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (pattern,pat);	/* just have basic name */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:325:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s = (char *) fs_get (namelen + strlen (names[i]->d_name) + 2),
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:417:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf (f,SEQFMT,now);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:418:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf (f,MTAFMT,now,(unsigned long) 0,now);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:430:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (s,MIXINDEX);	/* create index */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:435:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (s,MIXSTATUS);	/* create status */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:472:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else if (unlink (tmp)) sprintf (tmp,"Can't delete mailbox %.80s index: %80s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:482:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (s,d->d_name);	/* make path */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:557:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (src = (char *) fs_get (srcl + len + 2),"%s/%s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:559:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (dst = (char *) fs_get (dstl + len + 1),"%s%s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:753:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Error reading mix message header, uid=%lx, s=%.0lx, h=%s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1232:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (LOCAL->buf,staterr,burp->name,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1243:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (LOCAL->buf,truncerr,burp->name,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1257:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (LOCAL->buf,staterr,burp->name,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1311:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (LOCAL->buf,truncerr,burp->name,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1397:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (local->buf,MSRFMT,MSGTOK,(unsigned long) 0,0,0,0,0,0,0,'+',0,0,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1439:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat (strcat (tmp," "),t);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1555:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (local->buf,MSRFMT,MSGTOK,(unsigned long) 0,0,0,0,0,0,0,'+',0,0,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1669:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf (f,MSRFMT,MSGTOK,elt->private.uid,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1956:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			    sprintf (tmp,shortmsg,plt->msgno,plt->private.uid,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:1991:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			    sprintf (tmp,shortmsg,elt->msgno,elt->private.uid,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2019:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Error in %s in mix index file: %.500s",msg,s);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2120:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (msg,"Error in mix status file message record%s: %.80s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2204:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (LOCAL->buf,SEQFMT,LOCAL->metaseq = mix_modseq (LOCAL->metaseq));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2205:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (LOCAL->buf + strlen (LOCAL->buf),MTAFMT,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2251:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (tmp,IXRFMT,(unsigned long) 0,14,4,4,13,0,0,'+',0,0,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2257:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (tmp,SEQFMT,LOCAL->indexseq);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2282:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf (idxf,SEQFMT,LOCAL->indexseq);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2287:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	  fprintf (idxf,IXRFMT,elt->private.uid,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2334:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (tmp,STRFMT,(unsigned long) 0,(unsigned long) 0,0,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2338:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (tmp,SEQFMT,LOCAL->statusseq);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2363:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf (statf,SEQFMT,LOCAL->statusseq);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2370:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	  fprintf (statf,STRFMT,elt->private.uid,elt->user_flags,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2661:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Error in %s in mix sortcache record: %.500s",msg,t);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2695:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf (f,SEQFMT,LOCAL->sortcacheseq = mix_modseq(LOCAL->sortcacheseq));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2705:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf (f,SCRFMT,elt->private.uid,s->date,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2760:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Empty mix %s record",type);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2764:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Oversize mix %s record: %.512s",type,buf);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mix.c:2769:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Truncated mix %s record: %.512s",type,buf);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:480:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:486:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%sFrom %s %sDate: ",mmdfhdr,pseudo_from,ctime (&ti));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:488:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (s += strlen (s),	/* write the pseudo-header */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:493:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s += strlen (s)," %s",default_user_flag (i));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:494:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s),"\nStatus: RO\n\n%s\n%s",pseudo_msg,mmdfhdr);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:497:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",mbx,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:541:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:553:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       sprintf (tmp,"Can't lock mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:572:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:577:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:667:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ((LOCAL->ld >= 0) && access (stream->mailbox,W_OK) && (errno == EACCES)) {
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:926:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Mailbox stat failed, aborted: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:1082:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Can't open destination mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:1117:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Message copy failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:1276:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:1286:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (buf,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:1591:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:1692:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (tmp,"Unable to parse internal date: %s",(char *) date);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:1913:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (err,"Discarding bogus %s header in message %lu",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:2131:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (hdr,"%sFrom %s %.24s\nDate: %s\nFrom: %s <%s@%.80s>\nSubject: %s\nMessage-ID: <%lu@%.80s>\nX-IMAP: %010lu %010lu",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:2138:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s)," %s",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:2139:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s += strlen (s),"\nStatus: RO\n\n%s\n%s",pseudo_msg,mmdfhdr);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:2401:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:2434:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Unable to extend mailbox: %s",strerror (e));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mmdf.c:2544:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to write to mailbox: %s",strerror (e = errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:290:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:298:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:328:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:335:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:708:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Can't copy new mail: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:896:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to open copy mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:924:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:1009:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:1056:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:1124:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:1133:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to find CRLF at %lu in %lu bytes, text: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:1142:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header at %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:1171:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header elements at %ld: %s,%s;%s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mtx.c:1266:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:46:22:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define MXINDEX(d,s) strcat (mx_file (d,s),MXINDEXNAME)
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:280:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s = (char *) fs_get (namelen + strlen (names[i]->d_name) + 2),
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:361:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't create mailbox %.80s: %s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:391:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s index: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:399:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (s,d->d_name);	/* make path */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:405:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't delete name %.80s: %s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:474:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:497:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s,"%s/%s",src,name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:498:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (d,"%s%s",dst,name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:591:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (LOCAL->buf,"%s/%lu",stream->mailbox,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:767:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",stream->mailbox,++old);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:855:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",stream->mailbox,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:857:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Expunge of message %lu failed, aborted: %s",i,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:951:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	      strcat (strcat (tmp," "),t);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:1072:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s/%lu",stream->mailbox,++stream->uid_last);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:1075:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't create append message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:1083:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:1168:26:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      (LOCAL->fd = open (strcat (strcpy (tmp,stream->mailbox),MXINDEXNAME),
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:1168:34:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      (LOCAL->fd = open (strcat (strcpy (tmp,stream->mailbox),MXINDEXNAME),
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/mx.c:1249:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s),"K%s\n",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c:236:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (name + 6,t);	/* make full form of name */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c:274:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pattern,ref);	/* copy reference to pattern */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c:276:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (*pat == '#') strcpy (pattern,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c:279:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (pattern,pat + 1);	/* append, omitting one of the period */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c:280:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    else strcat (pattern,pat);	/* anything else is just appended */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c:282:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (pattern,pat);	/* just have basic name */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c:366:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s = tmp,"%s/%s",(char *) mail_parameters (NIL,GET_NEWSSPOOL,NIL),
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c:392:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Newsgroup %s is empty",LOCAL->name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/news.c:495:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/phile.c:269:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to open file %s",stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/phile.c:300:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s, %d %s %d %02d:%02d:%02d %c%02d%02d",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/phile.c:309:36:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (pw = getpwuid (sbuf.st_uid)) strcpy (tmp,pw->pw_name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/phile.c:529:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Can't copy - file \"%s\" is not in valid mailbox format",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/scandir.c:55:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (p->d_name,d->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:124:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (hostname,host+1);	/* yes, copy number part */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:130:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hostname,host);	/* hostname is user's argument */
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:145:38:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (!(he = gethostbyname (lcase (strcpy (hostname,host)))))
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:154:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hostname,he->h_name);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:206:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Trying IP address [%s]",inet_ntoa (sin->sin_addr));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:210:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to create TCP socket: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:237:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't connect to %.80s,%lu: %s",hst,port,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:266:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Connection failed to %.80s,%lu: %s",hst,port,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:729:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ret = (he = gethostbyname (lcase (strcpy (host,name)))) ?
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:753:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Reverse DNS resolution %s",adr);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tcp_ami.c:764:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (flag)	sprintf (ret = tmp,"%s %s",t,adr);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:297:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:305:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:335:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:342:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:417:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't open mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:797:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Can't copy new mail: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:986:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to open copy mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:1014:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:1099:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:1153:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:1236:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:1245:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to find newline at %lu in %lu bytes, text: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:1254:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header at %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:1283:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header elements at %ld: %s,%s;%s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/tenex.c:1378:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:340:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:346:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"From %s %sDate: ",pseudo_from,ctime (&ti));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:349:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s),
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:354:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s += strlen (s)," %s",default_user_flag (i));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:355:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s),"\nStatus: RO\n\n%s\n\n",pseudo_msg);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:358:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",mbx,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:402:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:414:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't lock mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:433:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:438:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:528:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ((LOCAL->ld >= 0) && access (stream->mailbox,W_OK) && (errno == EACCES)) {
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:787:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Mailbox stat failed, aborted: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:947:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Can't open destination mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:981:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Message copy failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:1140:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:1150:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (buf,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:1462:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:1550:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Unable to parse internal date: %s",(char *) date);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:1749:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (err,"Discarding bogus %s header in message %lu",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:1968:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (hdr,"From %s %.24s\nDate: %s\nFrom: %s <%s@%.80s>\nSubject: %s\nMessage-ID: <%lu@%.80s>\nX-IMAP: %010lu %010lu",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:1975:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s)," %s",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:1976:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s += strlen (s),"\nStatus: RO\n\n%s\n\n",pseudo_msg);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:2255:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:2288:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Unable to extend mailbox: %s",strerror (e));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:2398:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to write to mailbox: %s",strerror (e = errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:2604:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Mail drop %s is not in standard Unix format",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:2618:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"New mail move failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:2625:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Mail drop %s lock failure, old=%lu now=%lu",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.c:2643:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (LOCAL->buf,"Moved %lu bytes of new mail to %s from %s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.h:88:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	      sscanf(&x[start],"%3c, %d %s %d %s %s",			\
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.h:90:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      sprintf(realtime,"%s %s %2d %s %d %s",			\
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.h:119:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	      sscanf(&x[start],"%3c, %d %3c %d %s",weekday,		\
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/unix.h:121:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      sprintf(realtime,"%s %s %2d %s %d",weekday,month,day,time,\
data/alpine-2.24+dfsg1/imap/src/osdep/dos/bezrkdos.c:345:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/bezrkdos.c:514:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Not a Bezerk-format mailbox: %s",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/bezrkdos.c:524:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to open copy mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/bezrkdos.c:541:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/bezrkdos.c:650:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/bezrkdos.c:663:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (buf,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/bezrkdos.c:740:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Invalid mailbox name: %s",s);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:170:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    else strcpy (file,test);	/* use just that name then */
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:237:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Can't subscribe %s: not a mailbox",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:258:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (base) sprintf (tmpx,"%s\\",base);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:260:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  if (dir) strcat (tmpx,dir);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:264:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (tmp,(tmp[strlen (tmp) -1] == '\\') ? "*." : "\\*.");
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:265:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (tmp,file_extension ? file_extension : "*");
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:273:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (base) sprintf (tmpx,"%s\\",base);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:275:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (dir) sprintf (tmpx + strlen (tmpx),"%s%s",dir,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:276:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      else strcat (tmpx,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:281:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if (dir) sprintf (tmp,"%s%s",dir,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:282:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	else strcpy (tmp,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:399:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't create mailbox node %s: %s",path,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:420:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %s: %s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:453:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't rename mailbox %s to %s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:477:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s: %s",strerror (errno),stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:482:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (sbuf.st_size) sprintf (tmp,"Not a mailbox: %s",stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:607:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s: %s",strerror (e),mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:617:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Indeterminate mailbox format: %s",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:630:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Invalid mailbox name: %s",s);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:666:32:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (mailboxfile (tmp,pat)) strcpy (tmp,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/dummydos.c:678:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s%s%s",dev,ref ? ref : "",pat);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:89:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s\\NEWSRC",myhomedir ());
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:134:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (date,prefix,days[t->tm_wday]);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:138:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (date,fmt,t->tm_mday,months[t->tm_mon],t->tm_year+1900,
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:200:44:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if ((*name == '\\') || (name[1] == ':')) strcpy (dst,name);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:201:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else sprintf (dst,"%s\\%s",myhomedir (),name);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:202:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (ext) sprintf (dst + strlen (dst),".%s",ext);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:259:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Mailbox %s, %s %lu[%.80s], %lu octets truncated to %ld",
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:287:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...)
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.h:28:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONFILE(t) sprintf (t,"%s/MAILBOX.LST",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.h:29:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONTEMP(t) sprintf (t,"%s/MAILBOX.TMP",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.h:66:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:297:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:537:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Not a MTX-format mailbox: %s",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:545:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to open copy mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:562:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:635:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:677:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:699:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Invalid mailbox name: %s",s);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:732:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %ld, size = %ld: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:740:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to find end of line at %ld in %ld bytes, text: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:749:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header at %ld: %s",curpos,
data/alpine-2.24+dfsg1/imap/src/osdep/dos/mtxdos.c:773:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header elements at %ld: %s,%s;%s",
data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dnf.c:70:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s = tmp,"[%s]",inet_ntoa (myip));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dnf.c:89:46:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  struct hostent *hn = gethostbyname (lcase (strcpy (tmp,*host)));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dnv.c:69:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      else sprintf (s = tmp,"[%s]",inet_ntoa (in));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dpc.c:71:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s = tmp,"[%s]",inet_ntoa (in));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dpc.c:96:46:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  struct hostent *hn = gethostbyname (lcase (strcpy (tmp,*host)));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dwa.c:67:30:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (myip = gethostid ()) sprintf (s = tmp,"[%s]",inet_ntoa (hname,myip));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_dos.c:81:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmp,host+1);	/* yes, copy number part */
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_dos.c:91:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Host not found: %s",host);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_dos.c:131:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't connect to %.80s,%ld: %s (%d)",host,port,s,errno);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_dwa.c:78:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Host not found: %s",host);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmp,host+1);	/* yes, copy number part */
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:139:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hostname,host);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:152:38:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (!(he = gethostbyname (lcase (strcpy (tmp,host)))))
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:153:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Host not found (#%d): %s",WSAGetLastError(),host);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:160:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hostname,he->h_name);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:204:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Trying IP address [%s]",inet_ntoa (sin->sin_addr));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:232:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't connect to %.80s,%ld: %s (%d)",hst,port,s,
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:731:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ret = (he = gethostbyname (lcase (strcpy (host,name)))) ? he->h_name : name;
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:753:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Reverse DNS resolution %s",adr);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/tcp_wsk.c:764:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (flag)	sprintf (ret = tmp,"%s %s",t,adr);
data/alpine-2.24+dfsg1/imap/src/osdep/mac/dummymac.c:206:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Not a mailbox: %s",stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/mac/dummymac.c:292:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Can't append to %s",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/mac/env_mac.c:65:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s:News State",myhomedir ());
data/alpine-2.24+dfsg1/imap/src/osdep/mac/env_mac.c:223:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...)
data/alpine-2.24+dfsg1/imap/src/osdep/mac/env_mac.h:30:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONFILE(t) sprintf (t,"%s:Mailbox List",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/mac/env_mac.h:31:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONTEMP(t) sprintf (t,"%s:Mailbox List Temp",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/mac/env_mac.h:58:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...);
data/alpine-2.24+dfsg1/imap/src/osdep/mac/tcp_mac.c:166:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if (s) sprintf (tmp,"%s: %.80s",s,host);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:168:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    else strcpy (file,test);	/* use just that name then */
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:260:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (tmp,(tmp[strlen (tmp) -1] == '\\') ? "*.*" : "\\*.*");
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:272:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if (dir) sprintf (tmp,"%s%s",dir,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:273:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	else strcpy (tmp,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:280:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  if (dir) sprintf (tmp,"%s%s",dir,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:281:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  else strcpy (tmp,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:329:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (tmp,(tmp[strlen (tmp) -1] == '\\') ? "*.*" : "\\*.*") &&
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:668:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return (s && !*s) ? strcpy (dst,sysinbox ()) : s;
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:702:32:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (mailboxfile (tmp,pat)) strcpy (tmp,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/dummynt.c:714:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s%s%s",dev,ref ? ref : "",pat);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:103:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s\\NEWSRC",myhomedir ());
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:192:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (date,prefix,days[t->tm_wday]);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:196:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (date,fmt,t->tm_mday,months[t->tm_mon],t->tm_year+1900,
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:398:9:  [4] (access) ImpersonateLoggedOnUser:
  If this call fails, the program could fail to drop heightened privileges
  (CWE-250). Make sure the return value is checked, and do not continue if a
  failure is reported.
	       ImpersonateLoggedOnUser (hdl)) return env_init (user,NIL);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:489:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (!check_nt ()) sprintf (tmp,"%s\\My Documents",defaultDrive ());
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:508:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else sprintf (tmp,"%s\\users\\default",defaultDrive ());
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:545:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (path = pth,"%s%s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:548:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (path = pth,"%s\\My Documents",defaultDrive ());
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:600:22:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    if (check_nt ()) sprintf (tmp,MAILFILE,myUserName);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:601:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    else sprintf (tmp,"%s\\INBOX",myhomedir ());
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:621:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmp,dir);		/* write directory prefix */
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:626:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (tmp,name);	/* write name in directory */
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:631:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (dst,myhomedir());/* no arguments, wants home directory */
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:668:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (dst,"%s\\%s",dir,name);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:676:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (dst,"%s%s",homedev,name);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:680:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (name[2] == '\\') strcpy (dst,name);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:681:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      else sprintf (dst,"%c:\\%s",name[0],name+2);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:684:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    else sprintf (dst,"%s\\%s",dir,name);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.h:33:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONFILE(t) sprintf (t,"%s\\MAILBOX.LST",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.h:34:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONTEMP(t) sprintf (t,"%s\\MAILBOX.TMP",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ip4_nt.c:170:30:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(he = gethostbyname (lcase (strcpy (tmp,name))))) {
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ip6_nt.c:130:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      (!getaddrinfo (lcase (strcpy (tmp,text)),NIL,&hints,&ai))) {
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ip6_nt.c:248:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(!getaddrinfo (lcase (strcpy (tmp,name)),NIL,&hints,
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:388:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:397:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s += strlen (s),"%s\015\012",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:401:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:441:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:449:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:485:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:495:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:526:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't open mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:895:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to open copy mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:934:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:1076:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:1161:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:1367:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:1372:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf+50,"Invalid flags for message %lu (%lu %lu): %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:1407:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (s += strlen (s),"%s\015\012",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:1448:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf,"Unable to read old status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mbxnt.c:1453:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf+50,"Invalid flags for message %lu (%lu %lu): %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:301:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:309:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:345:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:796:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:883:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:930:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:983:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:992:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to find CRLF at %lu in %lu bytes, text: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:1001:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header at %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:1030:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header elements at %ld: %s,%s;%s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/mtxnt.c:1125:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c:20:9:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
#define crypt ssl_private_crypt
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c:35:8:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
#undef crypt
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c:933:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s\\%s-%s.pem",SSL_CERT_DIRECTORY,server,tcp_serveraddr ());
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c:935:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s\\%s.pem",SSL_CERT_DIRECTORY,server);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c:963:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (cert,"%s\\%s-%s.pem",SSL_CERT_DIRECTORY,server,tcp_serveraddr ());
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c:964:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (key,"%s\\%s-%s.pem",SSL_KEY_DIRECTORY,server,tcp_serveraddr ());
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c:966:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (stat (cert,&sbuf)) sprintf (cert,"%s\\%s.pem",SSL_CERT_DIRECTORY,server);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c:968:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (key,"%s\\%s.pem",SSL_KEY_DIRECTORY,server);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_libressl.c:970:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (stat (key,&sbuf)) strcpy (key,cert);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tcp_nt.c:144:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmp,host+1);	/* yes, copy number part */
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tcp_nt.c:163:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Host not found (#%d): %s",WSAGetLastError (),host);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tcp_nt.c:222:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Trying IP address [%s]",ip_sockaddrtostring (sadr,buf));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tcp_nt.c:886:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Reverse DNS resolution %s",adr);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tcp_nt.c:893:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (flag)	sprintf (ret = tmp,"%s %s",t,adr);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:309:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:317:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:353:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:867:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:954:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:1007:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:1074:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:1083:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to find newline at %lu in %lu bytes, text: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:1092:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header at %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:1121:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header elements at %ld: %s,%s;%s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/tenexnt.c:1217:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:308:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:314:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"From %s %s",pseudo_from,ctime (&ti));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:318:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (s += strlen (s),	/* write the pseudo-header */
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:327:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",mbx,
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:368:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:383:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't lock mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:407:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:412:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:474:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ((LOCAL->ld >= 0) && access (stream->mailbox,02) && (errno == EACCES)) {
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:715:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Mailbox stat failed, aborted: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:868:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Can't open destination mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:907:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Message copy failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:1068:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:1078:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (buf,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:1308:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (lock,"%s.lock",file);/* build lock filename */
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:1315:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Error creating %.80s: %s",lock,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:1415:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:1502:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Unable to parse internal date: %s",(char *) date);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:1701:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (err,"Discarding bogus %s header in message %lu",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:1905:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (hdr,"From %s %.24s\r\nDate: %s\r\nFrom: %s <%s@%.80s>\r\nSubject: %s\r\nMessage-ID: <%lu@%.80s>\r\nX-IMAP: %010ld %010ld",
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:1912:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (t += strlen (t)," %s",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:2183:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Unable to extend mailbox: %s",strerror (e));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/unixnt.c:2293:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to write to mailbox: %s",strerror (e = errno));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/yunchan.c:100:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...)
data/alpine-2.24+dfsg1/imap/src/osdep/nt/yunchan.c:120:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  vsprintf (tmp,message,args);	/* build message */
data/alpine-2.24+dfsg1/imap/src/osdep/nt/yunchan.c:141:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (tmp,(logopt & LOG_PID) ? "%s[%d]" : "%s",ident,getpid ());
data/alpine-2.24+dfsg1/imap/src/osdep/nt/yunchan.c:342:7:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
char *getpass (const char *prompt)
data/alpine-2.24+dfsg1/imap/src/osdep/nt/yunchan.h:80:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/yunchan.h:86:7:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
char *getpass (const char *prompt);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c:175:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    else strcpy (file,test);	/* use just that name then */
data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c:267:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (tmp,(tmp[strlen (tmp) -1] == '\\') ? "*.*" : "\\*.*");
data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c:279:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if (dir) sprintf (tmp,"%s%s",dir,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c:280:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	else strcpy (tmp,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c:287:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  if (dir) sprintf (tmp,"%s%s",dir,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c:288:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  else strcpy (tmp,f.name);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c:659:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return (s && !*s) ? strcpy (dst,sysinbox ()) : s;
data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c:693:32:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (mailboxfile (tmp,pat)) strcpy (tmp,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/dummyos2.c:705:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s%s%s",dev,ref ? ref : "",pat);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:69:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s\\newsrc",myhomedir ());
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:109:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (date,prefix,days[t->tm_wday]);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:113:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (date,fmt,t->tm_mday,months[t->tm_mon],t->tm_year+1900,
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:193:44:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if ((*name == '\\') || (name[1] == ':')) strcpy (dst,name);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:194:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else sprintf (dst,"%s\\%s",myhomedir (),name);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:195:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (ext) sprintf (dst + strlen (dst),".%s",ext);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:305:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...)
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.h:57:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:387:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:396:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s += strlen (s),"%s\015\012",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:400:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:440:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:448:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:484:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:494:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:525:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't open mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:894:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to open copy mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:933:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:1075:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:1160:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:1366:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:1371:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf+50,"Invalid flags for message %lu (%lu %lu): %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:1406:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (s += strlen (s),"%s\015\012",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:1447:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf,"Unable to read old status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mbxnt.c:1452:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf+50,"Invalid flags for message %lu (%lu %lu): %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:300:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:308:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:344:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:795:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:882:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:929:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:982:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:991:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to find CRLF at %lu in %lu bytes, text: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:1000:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header at %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:1029:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header elements at %ld: %s,%s;%s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/mtxnt.c:1124:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/os_os2.c:85:46:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  struct hostent *hn = gethostbyname (lcase (strcpy (tmp,*host)));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/os_os2.c:98:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...)
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tcp_os2.c:81:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmp,host+1);	/* yes, copy number part */
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tcp_os2.c:91:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Host not found: %s",host);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tcp_os2.c:131:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't connect to %.80s,%ld: %s (%d)",host,port,s,errno);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:308:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:316:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:352:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:866:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:953:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:1006:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:1073:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:1082:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to find newline at %lu in %lu bytes, text: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:1091:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header at %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:1120:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header elements at %ld: %s,%s;%s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/tenexnt.c:1216:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:307:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:313:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"From %s %s",pseudo_from,ctime (&ti));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:317:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (s += strlen (s),	/* write the pseudo-header */
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:326:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",mbx,
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:367:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:382:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't lock mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:406:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:411:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:473:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ((LOCAL->ld >= 0) && access (stream->mailbox,02) && (errno == EACCES)) {
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:714:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Mailbox stat failed, aborted: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:867:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Can't open destination mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:906:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Message copy failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:1067:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:1077:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (buf,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:1307:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (lock,"%s.lock",file);/* build lock filename */
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:1314:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Error creating %.80s: %s",lock,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:1414:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:1501:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Unable to parse internal date: %s",(char *) date);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:1700:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (err,"Discarding bogus %s header in message %lu",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:1904:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (hdr,"From %s %.24s\r\nDate: %s\r\nFrom: %s <%s@%.80s>\r\nSubject: %s\r\nMessage-ID: <%lu@%.80s>\r\nX-IMAP: %010ld %010ld",
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:1911:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (t += strlen (t)," %s",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:2182:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Unable to extend mailbox: %s",strerror (e));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/unixnt.c:2292:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to write to mailbox: %s",strerror (e = errno));
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/dummyt20.c:205:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Not a mailbox: %s",stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/dummyt20.c:291:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Can't append to %s",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/env_t20.c:159:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%sNEWSRC",myhomedir ());
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/env_t20.c:213:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...)
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/env_t20.h:38:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONFILE(t) sprintf (t,"%s\\SUBSCRIPTIONS.TXT",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/env_t20.h:39:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONTEMP(t) sprintf (t,"%s\\SUBSCRIPTIONS.TMP",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/env_t20.h:73:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...);
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/os_t20.c:85:7:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
char *getpass (const char *prompt)
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/os_t20.h:50:7:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
char *getpass (const char *prompt);
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/tcp_t20.c:91:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"No such host as %s",host);
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/tcp_t20.c:98:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	if (!jsys (GTHST,argblk)) strcpy (tmp,host);
data/alpine-2.24+dfsg1/imap/src/osdep/tops-20/tcp_t20.c:112:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (file,"Can't connect to %s,%d server",tmp,port);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_bsi.c:44:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"auth-%s",(char *) mail_parameters (NIL,GET_SERVICENAME,NIL));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_dce.c:50:39:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
      !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) return pw;
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_dce.c:58:34:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	!strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_psx.c:62:38:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
      strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_psx.c:80:32:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	!strcmp (sp->sp_pwdp,(char *) crypt (pass,sp->sp_pwdp))) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_sce.c:42:40:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
       !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) ||
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_sec.c:42:40:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
       !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) ||
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_ssn.c:49:39:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
      !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) ||
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_ssn.c:52:40:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
      !strcmp (pa->pwa_passwd,(char *) crypt (pass,pa->pwa_passwd)))) ?
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_std.c:40:36:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	  !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) ?
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_sv4.c:62:38:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
      strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_sv4.c:76:32:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	!strcmp (sp->sp_pwdp,(char *) crypt (pass,sp->sp_pwdp))) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_svo.c:62:38:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
      strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ckp_svo.c:75:32:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	!strcmp (sp->sp_pwdp,(char *) crypt (pass,sp->sp_pwdp))) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/crx_nfs.c:48:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (hitch,"%s.%lu.%d.",name,(unsigned long) time (0),getpid ());
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:173:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    else strcpy (file,test);	/* use just that name then */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:223:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  pmatch ("INBOX",ucase (strcpy (tmp,test))))
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:300:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if (dir) sprintf (tmp,"%s%s",dir,d->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:301:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	else strcpy (tmp,d->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:303:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	if ((pmatch_full (strcpy (path,tmp),pat,'/') ||
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:307:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy (path+len-1,d->d_name) && !stat (path,&sbuf)) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:312:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (path,"%s/",tmp);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:758:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return (s && !*s) ? strcpy (dst,sysinbox ()) : s;
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:779:32:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (mailboxfile (tmp,pat)) strcpy (tmp,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:787:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmp,pat);		/* yes, ignore */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:792:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (!ref) strcpy (tmp,pat);	/* just copy if no namespace */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:795:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (*pat == '/') strcpy (strchr (strcpy (tmp,ref),'/'),pat);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:795:40:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (*pat == '/') strcpy (strchr (strcpy (tmp,ref),'/'),pat);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/dummy.c:797:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      else sprintf (tmp,"%s%s",ref,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:544:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (date,prefix,days[t->tm_wday]);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:548:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (date,fmt,t->tm_mday,months[t->tm_mon],t->tm_year+1900,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:861:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"%s/%s",blackBoxDir,myUserName);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:869:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (sysInbox,"%s/INBOX",home);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:888:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s/INBOX",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:897:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    dorc (strcat (strcpy (tmp,myHomeDir),"/.mminit"),T);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:898:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    dorc (strcat (strcpy (tmp,myHomeDir),"/.imaprc"),NIL);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:911:44:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (!myNewsrc) myNewsrc = cpystr(strcat (strcpy (tmp,myHomeDir),"/.newsrc"));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:935:24:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
    if (((s = (char *) getlogin ()) && *s && (strlen (s) < NETMAXUSER) &&
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:998:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s/%s",home,mailsubdir);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1015:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s/%s",MAILSPOOL,myusername ());
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1034:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmp,dir);		/* write directory prefix */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1039:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (tmp,name);	/* write name in directory */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1045:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (dst,mymailboxdir ());
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1069:31:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(name[4] == '/') && ftpHome) sprintf (dst,"%s/%s",ftpHome,name+5);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1085:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (dst,"%s/%s",s,compare_cstring (name+8,"INBOX") ?
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1097:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (dst,"%s/%s/INBOX",blackBoxDir,name+1);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1100:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      else sprintf (dst,"%s/%s",blackBoxDir,name+1);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1107:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      else strcpy (dst,name);	/* unrestricted, copy root name */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1114:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    else if (*name == '/') sprintf (dst,"%s/%s",mymailboxdir (),name+1);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1121:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (dst,"%s/%s/INBOX",blackBoxDir,name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1124:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      else sprintf (dst,"%s/%s",blackBoxDir,name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1139:23:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	else if (mailsubdir) sprintf (dst,"%s/%s/%s",pw->pw_dir,mailsubdir,name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1140:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	else sprintf (dst,"%s/%s",pw->pw_dir,name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1150:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (dst,"%s/INBOX",mymailboxdir ());
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1156:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (dst,"%s/%s",mymailboxdir (),name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1178:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (base->lock,"%s.lock",file);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1255:13:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    _exit (execv (argv[0],argv));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1286:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(tmp,		/* generate default message */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1298:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Mailbox vulnerable - error creating %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1373:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (lock,"%s/.%lx.%lx",closedBox ? "" : tmpdir,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1631:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (tmpx,"Unknown new mailbox format in %s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1651:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (tmpx,"Unknown empty mailbox format in %s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:1851:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (path,"%s/INBOX",mymailboxdir ());
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.h:41:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONFILE(t) sprintf (t,"%s/.mailboxlist",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.h:42:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONTEMP(t) sprintf (t,"%s/.mlbxlsttmp",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/unix/flockcyg.c:81:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Unexpected file locking failure: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/flocklnx.c:55:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"File locking failure: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/flocklnx.c:67:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unexpected file locking failure: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ip4_unix.c:170:30:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(he = gethostbyname (lcase (strcpy (tmp,name))))) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ip6_unix.c:130:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      (!getaddrinfo (lcase (strcpy (tmp,text)),NIL,&hints,&ai))) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ip6_unix.c:248:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(!getaddrinfo (lcase (strcpy (tmp,name)),NIL,&hints,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:398:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:409:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s += strlen (s),"%s\015\012",t);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:412:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:453:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,newname ?
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:461:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:492:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:499:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:575:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't open mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:964:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Can't copy new mail: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:1059:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:1199:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:1305:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:1511:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:1516:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf+50,"Invalid flags for message %lu (%lu %lu): %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:1553:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (s += strlen (s),"%s\015\012",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:1595:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf,"Unable to read old status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mbx.c:1600:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf+50,"Invalid flags for message %lu (%lu %lu): %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:246:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s/%s",myhomedir (),MHPROFILE);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:262:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    else sprintf (s = tmp,"%s/%s",myhomedir (),v);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:271:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"%s/%s",myhomedir (),MHPATH);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:365:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      else strcpy (file,test+4);/* use just that name then */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:423:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (dir) sprintf (name,"#mh/%s/",dir);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:432:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (cp,d->d_name);	/* make directory name */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:434:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (np,d->d_name);/* make mh name of directory name */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:489:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't create mailbox %.80s: %s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:518:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmp + i,d->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:525:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s: %s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:564:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:663:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:879:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"%s/%s",LOCAL->dir,names[i]->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:900:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,++old);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:988:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:990:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Expunge of message %lu failed, aborted: %s",i,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:1046:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:1159:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't open append message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:1170:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:1251:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pattern,ref);	/* copy reference to pattern */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:1253:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (*pat == '#') strcpy (pattern,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:1256:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (pattern,pat + 1);	/* append, omitting one of the period */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:1257:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    else strcat (pattern,pat);	/* anything else is just appended */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mh.c:1259:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (pattern,pat);	/* just have basic name */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:326:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s = (char *) fs_get (namelen + strlen (names[i]->d_name) + 2),
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:418:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf (f,SEQFMT,now);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:419:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf (f,MTAFMT,now,(unsigned long) 0,now);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:431:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (s,MIXINDEX);	/* create index */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:436:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (s,MIXSTATUS);	/* create status */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:473:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else if (unlink (tmp)) sprintf (tmp,"Can't delete mailbox %.80s index: %80s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:483:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (s,d->d_name);	/* make path */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:558:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (src = (char *) fs_get (srcl + len + 2),"%s/%s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:560:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (dst = (char *) fs_get (dstl + len + 1),"%s%s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:754:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Error reading mix message header, uid=%lx, s=%.0lx, h=%s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1233:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (LOCAL->buf,staterr,burp->name,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1244:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (LOCAL->buf,truncerr,burp->name,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1258:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (LOCAL->buf,staterr,burp->name,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1312:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (LOCAL->buf,truncerr,burp->name,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1398:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (local->buf,MSRFMT,MSGTOK,(unsigned long) 0,0,0,0,0,0,0,'+',0,0,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1440:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat (strcat (tmp," "),t);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1556:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (local->buf,MSRFMT,MSGTOK,(unsigned long) 0,0,0,0,0,0,0,'+',0,0,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1670:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf (f,MSRFMT,MSGTOK,elt->private.uid,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1957:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			    sprintf (tmp,shortmsg,plt->msgno,plt->private.uid,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:1992:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			    sprintf (tmp,shortmsg,elt->msgno,elt->private.uid,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2020:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Error in %s in mix index file: %.500s",msg,s);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2121:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (msg,"Error in mix status file message record%s: %.80s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2205:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (LOCAL->buf,SEQFMT,LOCAL->metaseq = mix_modseq (LOCAL->metaseq));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2206:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (LOCAL->buf + strlen (LOCAL->buf),MTAFMT,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2252:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (tmp,IXRFMT,(unsigned long) 0,14,4,4,13,0,0,'+',0,0,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2258:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (tmp,SEQFMT,LOCAL->indexseq);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2283:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf (idxf,SEQFMT,LOCAL->indexseq);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2288:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	  fprintf (idxf,IXRFMT,elt->private.uid,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2335:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (tmp,STRFMT,(unsigned long) 0,(unsigned long) 0,0,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2339:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (tmp,SEQFMT,LOCAL->statusseq);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2364:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf (statf,SEQFMT,LOCAL->statusseq);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2371:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	  fprintf (statf,STRFMT,elt->private.uid,elt->user_flags,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2662:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Error in %s in mix sortcache record: %.500s",msg,t);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2696:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf (f,SEQFMT,LOCAL->sortcacheseq = mix_modseq(LOCAL->sortcacheseq));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2706:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf (f,SCRFMT,elt->private.uid,s->date,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2761:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Empty mix %s record",type);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2765:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Oversize mix %s record: %.512s",type,buf);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mix.c:2770:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Truncated mix %s record: %.512s",type,buf);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:481:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:487:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%sFrom %s %sDate: ",mmdfhdr,pseudo_from,ctime (&ti));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:489:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf (s += strlen (s),	/* write the pseudo-header */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:494:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s += strlen (s)," %s",default_user_flag (i));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:495:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s),"\nStatus: RO\n\n%s\n%s",pseudo_msg,mmdfhdr);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:498:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",mbx,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:555:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       sprintf (tmp,"Can't lock mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:574:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:579:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:669:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ((LOCAL->ld >= 0) && access (stream->mailbox,W_OK) && (errno == EACCES)) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:928:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Mailbox stat failed, aborted: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:1084:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Can't open destination mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:1119:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Message copy failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:1278:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:1288:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (buf,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:1593:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:1694:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (tmp,"Unable to parse internal date: %s",(char *) date);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:1915:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (err,"Discarding bogus %s header in message %lu",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:2133:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (hdr,"%sFrom %s %.24s\nDate: %s\nFrom: %s <%s@%.80s>\nSubject: %s\nMessage-ID: <%lu@%.80s>\nX-IMAP: %010lu %010lu",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:2140:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s)," %s",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:2141:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s += strlen (s),"\nStatus: RO\n\n%s\n%s",pseudo_msg,mmdfhdr);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:2403:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:2436:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Unable to extend mailbox: %s",strerror (e));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mmdf.c:2546:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to write to mailbox: %s",strerror (e = errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:300:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:330:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:337:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:710:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Can't copy new mail: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:898:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to open copy mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:926:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:1011:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:1058:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:1126:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:1135:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to find CRLF at %lu in %lu bytes, text: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:1144:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header at %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:1173:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header elements at %ld: %s,%s;%s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mtx.c:1268:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:46:22:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define MXINDEX(d,s) strcat (mx_file (d,s),MXINDEXNAME)
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:281:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s = (char *) fs_get (namelen + strlen (names[i]->d_name) + 2),
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:362:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't create mailbox %.80s: %s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:392:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s index: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:400:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (s,d->d_name);	/* make path */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:406:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't delete name %.80s: %s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:475:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:498:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s,"%s/%s",src,name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:499:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (d,"%s%s",dst,name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:592:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (LOCAL->buf,"%s/%lu",stream->mailbox,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:768:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",stream->mailbox,++old);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:856:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"%s/%lu",stream->mailbox,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:858:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Expunge of message %lu failed, aborted: %s",i,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:952:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	      strcat (strcat (tmp," "),t);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:1073:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s/%lu",stream->mailbox,++stream->uid_last);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:1076:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't create append message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:1084:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:1169:26:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      (LOCAL->fd = open (strcat (strcpy (tmp,stream->mailbox),MXINDEXNAME),
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:1169:34:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      (LOCAL->fd = open (strcat (strcpy (tmp,stream->mailbox),MXINDEXNAME),
data/alpine-2.24+dfsg1/imap/src/osdep/unix/mx.c:1250:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s),"K%s\n",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c:237:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (name + 6,t);	/* make full form of name */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c:275:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pattern,ref);	/* copy reference to pattern */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c:277:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (*pat == '#') strcpy (pattern,pat);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c:280:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (pattern,pat + 1);	/* append, omitting one of the period */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c:281:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    else strcat (pattern,pat);	/* anything else is just appended */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c:283:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy (pattern,pat);	/* just have basic name */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c:367:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s = tmp,"%s/%s",(char *) mail_parameters (NIL,GET_NEWSSPOOL,NIL),
data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c:393:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Newsgroup %s is empty",LOCAL->name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/news.c:496:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (LOCAL->buf,"%s/%lu",LOCAL->dir,elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_a32.c:46:7:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
char *crypt (char *key,char *salt);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_aix.c:45:7:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
char *crypt (char *key,char *salt);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_art.h:74:5:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
int syslog (priority,message,parameters ...);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_drs.c:45:7:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
char *crypt (char *key,char *salt);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_lyn.c:45:7:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
char *crypt (char *key,char *salt);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_nto.c:73:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  dc.d_namlen = strlen (strcpy (dc.d_name,de->d_name));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_qnx.c:49:14:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
extern char *crypt (const char *pw, const char *salt);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_qnx.c:74:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  dc.d_namlen = strlen (strcpy (dc.d_name,de->d_name));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_soln.h:68:9:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
#define getpass getpassphrase
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv2.c:102:5:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
int syslog (int priority,char *message,char *parameters)
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv2.h:109:5:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
int syslog (priority,message,parameters ...);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/phile.c:270:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to open file %s",stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/phile.c:301:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s, %d %s %d %02d:%02d:%02d %c%02d%02d",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/phile.c:310:46:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if ((pw = getpwuid (sbuf.st_uid)) != NULL) strcpy (tmp,pw->pw_name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/phile.c:530:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Can't copy - file \"%s\" is not in valid mailbox format",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/scandir.c:55:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (p->d_name,d->d_name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c:27:9:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
#define crypt ssl_private_crypt
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c:42:8:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
#undef crypt
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c:926:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s/%s-%s.pem",SSL_CERT_DIRECTORY,server,tcp_serveraddr ());
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c:928:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s/%s.pem",SSL_CERT_DIRECTORY,server);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c:956:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (cert,"%s/%s-%s.pem",SSL_CERT_DIRECTORY,server,tcp_serveraddr ());
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c:957:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (key,"%s/%s-%s.pem",SSL_KEY_DIRECTORY,server,tcp_serveraddr ());
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c:959:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (stat (cert,&sbuf)) sprintf (cert,"%s/%s.pem",SSL_CERT_DIRECTORY,server);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c:961:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (key,"%s/%s.pem",SSL_KEY_DIRECTORY,server);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/ssl_unix.c:963:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (stat (key,&sbuf)) strcpy (key,cert);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:177:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmp,host+1);	/* yes, copy number part */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:257:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Trying IP address [%s]",ip_sockaddrtostring (sadr,buf));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:261:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to create TCP socket: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:288:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't connect to %.80s,%u: %s",hst,(unsigned int) port,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:322:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Connection failed to %.80s,%lu: %s",hst,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:371:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (host,mb->host+1);	/* yes, copy without brackets */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:382:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (host,r = tcp_canonical (mb->host));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:387:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,sshcommand,sshpath,host,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:389:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  else sprintf (tmp,rshcommand,rshpath,host,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:426:14:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      _exit (execv (path,argv));/* now run it */
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:457:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (tmp,i ? "error in %s to IMAP server" :
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:465:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (usrbuf,mb->user[0] ? mb->user : myusername ());
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:997:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Reverse DNS resolution %s",adr);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:1005:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (flag)	sprintf (ret = tmp,"%s %s",t,adr);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:309:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:339:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:346:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:421:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't open mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:801:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Can't copy new mail: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:990:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to open copy mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:1018:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to write message: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:1103:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:1157:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:1240:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to read internal header at %lu, size = %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:1249:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to find newline at %lu in %lu bytes, text: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:1258:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header at %lu: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:1287:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Unable to parse internal header elements at %ld: %s,%s;%s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tenex.c:1382:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Unable to read new status: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:341:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't reopen mailbox node %.80s: %s",mbx,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:347:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"From %s %sDate: ",pseudo_from,ctime (&ti));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:350:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s),
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:355:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (s += strlen (s)," %s",default_user_flag (i));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:356:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s),"\nStatus: RO\n\n%s\n\n",pseudo_msg);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:359:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't initialize mailbox node %.80s: %s",mbx,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:416:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Can't lock mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:435:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:440:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"Can't delete mailbox %.80s: %s",old,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:530:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ((LOCAL->ld >= 0) && access (stream->mailbox,W_OK) && (errno == EACCES)) {
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:776:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Mailbox stat failed, aborted: %s",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:936:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Can't open destination mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:970:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (LOCAL->buf,"Message copy failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:1129:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't open append mailbox: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:1139:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (buf,"Message append failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:1451:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:1539:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tmp,"Unable to parse internal date: %s",(char *) date);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:1738:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (err,"Discarding bogus %s header in message %lu",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:1957:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (hdr,"From %s %.24s\nDate: %s\nFrom: %s <%s@%.80s>\nSubject: %s\nMessage-ID: <%lu@%.80s>\nX-IMAP: %010lu %010lu",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:1964:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (s += strlen (s)," %s",stream->user_flags[i]);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:1965:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (s += strlen (s),"\nStatus: RO\n\n%s\n\n",pseudo_msg);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:2244:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (LOCAL->buf,"Mailbox open failed, aborted: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:2277:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Unable to extend mailbox: %s",strerror (e));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:2387:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to write to mailbox: %s",strerror (e = errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:2593:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (LOCAL->buf,"Mail drop %s is not in standard Unix format",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:2607:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"New mail move failed: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:2614:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (LOCAL->buf,"Mail drop %s lock failure, old=%lu now=%lu",
data/alpine-2.24+dfsg1/imap/src/osdep/unix/unix.c:2632:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (LOCAL->buf,"Moved %lu bytes of new mail to %s from %s",
data/alpine-2.24+dfsg1/imap/src/osdep/vms/dummyvms.c:206:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Not a mailbox: %s",stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/vms/dummyvms.c:292:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Can't append to %s",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.c:68:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s:.newsrc",myhomedir ());
data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.c:89:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (date,prefix,days[t->tm_wday]);
data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.c:93:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (date,fmt,t->tm_mday,months[t->tm_mon],t->tm_year+1900,
data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.c:127:26:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
    myUserName = cpystr (cuserid (NIL));
data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.c:161:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...)
data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.h:27:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONFILE(t) sprintf (t,"%s\\SUBSCRIPTIONS.TXT",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.h:28:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONTEMP(t) sprintf (t,"%s\\SUBSCRIPTIONS.TMP",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/vms/env_vms.h:57:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...);
data/alpine-2.24+dfsg1/imap/src/osdep/vms/os_vms.c:68:7:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
char *getpass (const char *prompt)
data/alpine-2.24+dfsg1/imap/src/osdep/vms/os_vms.h:50:7:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
char *getpass (const char *prompt);
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsl.c:76:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't connect to %.80s,%lu: %s",host,port,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsm.c:96:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (hostname,host+1);	/* yes, copy number part */
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsm.c:100:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hostname,host);	/* hostname is user's argument */
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsm.c:111:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (hostname,host);	/* in case host is in write-protected memory */
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsm.c:116:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hostname,host_name->h_name);
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsm.c:128:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Unable to create TCP socket: %s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsm.c:145:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't connect to %.80s,%d: %s",hostname,port,
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsm.c:464:51:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else return cpystr ((he = gethostbyname (lcase (strcpy (host,name)))) ?
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsn.c:49:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else sprintf (tmp,"Can't connect to %.80s,%s: no TCP",host,service);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/dummywce.c:213:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Not a mailbox: %s",stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/dummywce.c:298:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Can't append to %s",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:86:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"%s\\NEWSRC",myhomedir ());
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:137:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (date,prefix,days[t->tm_wday]);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:141:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf (date,fmt,t->tm_mday,months[t->tm_mon],t->tm_year+1900,
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:147:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if (tz && tz[0]) sprintf (date + strlen (date)," (%s)",tz);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:214:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (path,"%s%s",homeDrive (),s);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:238:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"%s\\INBOX",myhomedir ());
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:264:56:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else if ((*name == '\\') || (name[1] == ':')) return strcpy (dst,name);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:266:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (dst,"%s\\%s",dir,name);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:288:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...)
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.h:27:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONFILE(t) sprintf (t,"%s\\MAILBOX.LST",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.h:28:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define SUBSCRIPTIONTEMP(t) sprintf (t,"%s\\MAILBOX.TMP",myhomedir ())
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.h:67:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog (int priority,const char *message,...);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmp,host+1);	/* yes, copy number part */
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:139:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hostname,host);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:152:38:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (!(he = gethostbyname (lcase (strcpy (tmp,host)))))
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:153:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Host not found (#%d): %s",WSAGetLastError(),host);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:160:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hostname,he->h_name);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:204:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"Trying IP address [%s]",inet_ntoa (sin->sin_addr));
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:232:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"Can't connect to %.80s,%ld: %s (%d)",hst,port,s,
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:731:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  ret = (he = gethostbyname (lcase (strcpy (host,name)))) ? he->h_name : name;
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:753:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tmp,"Reverse DNS resolution %s",adr);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/tcp_wce.c:764:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if (flag)	sprintf (ret = tmp,"%s %s",t,adr);
data/alpine-2.24+dfsg1/imap/src/tmail/tmail.c:385:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (path,sysinbox ());/* use system INBOX */
data/alpine-2.24+dfsg1/imap/src/tmail/tmail.c:393:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmp,"#driver.%s/INBOX",ds->dtb->name);
data/alpine-2.24+dfsg1/imap/src/tmail/tmail.c:448:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (path,sysinbox ());	/* use system INBOX for unix and MMDF */
data/alpine-2.24+dfsg1/imap/src/tmail/tmail.c:461:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmp,"#driver.%s/INBOX",ds->dtb->name);
data/alpine-2.24+dfsg1/imap/src/tmail/tmail.c:511:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s appending to %.80s (%s %.80s)",
data/alpine-2.24+dfsg1/imap/src/tmail/tmail.c:543:26:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  if (lstat (path,sbuf)) strcat (tmp,strerror (errno));
data/alpine-2.24+dfsg1/include/system.h:64:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char *strcpy (char *, const char *);
data/alpine-2.24+dfsg1/include/system.h:65:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
char *strcat (char *, const char *);
data/alpine-2.24+dfsg1/include/system.h:368:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef snprintf
data/alpine-2.24+dfsg1/include/system.h:369:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/alpine-2.24+dfsg1/include/system.h:369:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/alpine-2.24+dfsg1/ldap/inckit/ldap.h:68:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf( stderr, fmt, arg1, arg2, arg3 ); \
data/alpine-2.24+dfsg1/ldap/inckit/ldap.h:70:4:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
			syslog( ldap_syslog_level, fmt, arg1, arg2, arg3 ); \
data/alpine-2.24+dfsg1/ldap/inckit/ldap.h:76:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf( stderr, fmt, arg1, arg2, arg3 );
data/alpine-2.24+dfsg1/ldap/inckit/msdos.h:125:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define strcpy( a, b )		_fstrcpy( a, b )
data/alpine-2.24+dfsg1/mapi/instmapi.c:94:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s%s", dir, dir[strlen(dir)-1] == '\\' ?
data/alpine-2.24+dfsg1/mapi/instmapi.c:97:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer, 
data/alpine-2.24+dfsg1/mapi/instmapi.c:198:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(mapifile, "%s%s", dir, dir[strlen(dir)-1] == '\\' ? 
data/alpine-2.24+dfsg1/mapi/instmapi.c:204:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(buffer2, "pmapi32.dll exists in %s as mapi32.dll", 
data/alpine-2.24+dfsg1/mapi/instmapi.c:212:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(buffer, "%s%s", dir, dir[strlen(dir)-1] == '\\' ? 
data/alpine-2.24+dfsg1/mapi/instmapi.c:230:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buffer2, "%s%s", dir, dir[strlen(dir)-1] == '\\' ? 
data/alpine-2.24+dfsg1/mapi/instmapi.c:234:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(buffer2, "pmapi32.dll has been copied to %s", 
data/alpine-2.24+dfsg1/mapi/instmapi.c:241:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(buffer2, "pmapi32.dll could not be copied to %s", 
data/alpine-2.24+dfsg1/mapi/pmapi.c:199:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s%s%d", prefix, (*prefix ? "." : ""), num);
data/alpine-2.24+dfsg1/mapi/pmapi.c:250:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      sprintf(filename, "%smapiapp%d%s", dir, nmg->attach_no, 
data/alpine-2.24+dfsg1/mapi/pmapi.c:315:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(tmp, "%d/%s%d/%s%d %s%d:%s%d",
data/alpine-2.24+dfsg1/mapi/pmapi.c:328:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s@%s", env->from->mailbox, env->from->host);
data/alpine-2.24+dfsg1/mapi/pmapi.c:366:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(tmp, "%s@%s", addr->mailbox, addr->host);
data/alpine-2.24+dfsg1/mapi/pmapi.c:380:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(tmp, "%s@%s", addr->mailbox, addr->host);
data/alpine-2.24+dfsg1/mapi/pmapi.c:394:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(tmp, "%s@%s", addr->mailbox, addr->host);
data/alpine-2.24+dfsg1/mapi/pmapi.c:496:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(user, tpwc->user);
data/alpine-2.24+dfsg1/mapi/pmapi.c:497:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(pwd, tpwc->pwd);
data/alpine-2.24+dfsg1/mapi/pmapi.c:511:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(user, nmg->cs->dlge.edit1);
data/alpine-2.24+dfsg1/mapi/pmapi.c:512:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(pwd, nmg->cs->dlge.edit2);
data/alpine-2.24+dfsg1/mapi/pmapi.c:889:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tfcc, "%s%s%s", col, fcc, p2);
data/alpine-2.24+dfsg1/mapi/pmapi.c:978:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(filename, "%s%smapipinerc%d", dir, 
data/alpine-2.24+dfsg1/mapi/pmapi.c:1216:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(newstr, *valstrp);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1217:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(newstr, p3 && *p3 ? p3 : "");
data/alpine-2.24+dfsg1/mapi/pmapi.c:1218:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(newstr, p2 + 1);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1503:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(subkey, "MIME\\Database\\Content Type\\%s", mime_type);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1554:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tf,dir);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1595:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(cs->dlge.edit1, *cs->mb->user ? cs->mb->user
data/alpine-2.24+dfsg1/mapi/pmapi.c:1597:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(cs->dlge.edit2, ui[0]);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1625:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dir, tmpdir);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1629:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dir, tmpdir);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1633:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dir, ms_global->attachDir);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1652:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(mime_type, "%s/%s", body_types[part->body.type], part->body.subtype);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1670:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(file_ext, tmp_ext);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1714:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ms_global->debugFile, path);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1755:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(pineExe, pineKeyData);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1778:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(ms_global->pineExe, pineExe);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1799:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ms_global->pineExe, defPath);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1811:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ms_global->pineExeAlt, strrchr(defPath, '\\')+1);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1843:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ms_global->attachDir,  ms_global->pineExe);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1878:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ms_global->attachDir, defAttachDir);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1888:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ms_global->pinerc, penv);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1896:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ms_global->pineconf, penv);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1907:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ms_global->pinercex, penv);
data/alpine-2.24+dfsg1/mapi/pmapi.c:2068:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      i = sprintf(dstName, "%s%s%s", dstDir, 
data/alpine-2.24+dfsg1/mapi/pmapi.c:2081:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(dstName+i-strlen(srcExt), "%03d%s", cnt, srcExt);
data/alpine-2.24+dfsg1/mapi/pmapi.c:2093:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      i = sprintf(dstName, "%s%s%s", dstDir, 
data/alpine-2.24+dfsg1/mapi/pmapi.c:2147:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpfiles,files);
data/alpine-2.24+dfsg1/mapi/pmapi.c:2240:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(url, *keyvalp);
data/alpine-2.24+dfsg1/mapi/pmapi.c:2297:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ret, key);
data/alpine-2.24+dfsg1/mapi/pmapi.c:2758:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(ms_global->dfd, str, arg1);
data/alpine-2.24+dfsg1/mapi/pmapi.c:2841:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmp, old);
data/alpine-2.24+dfsg1/mapi/pmapi.h:64:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, msg, parm);					\
data/alpine-2.24+dfsg1/mapi/pmapi.h:67:46:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DEBUG_WRITE(msg, parm) { if(MSDEBUG) fprintf(ms_global->dfd,msg,parm);}
data/alpine-2.24+dfsg1/mapi/smapi.c:337:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tmpseq, tmp);
data/alpine-2.24+dfsg1/mapi/smapi.c:340:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(tmpseq, tmp);
data/alpine-2.24+dfsg1/mapi/smapi.c:601:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(adrstr, "SMTP:%s@%s", adrlist->mailbox, adrlist->host);
data/alpine-2.24+dfsg1/openssl/include/openssl/evp.h:814:19:  [4] (crypto) EVP_des_ecb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_ecb(void);
data/alpine-2.24+dfsg1/openssl/include/openssl/evp.h:820:11:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
#  define EVP_des_cfb EVP_des_cfb64
data/alpine-2.24+dfsg1/openssl/include/openssl/evp.h:829:19:  [4] (crypto) EVP_des_ofb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_ofb(void);
data/alpine-2.24+dfsg1/openssl/include/openssl/evp.h:832:19:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_cbc(void);
data/alpine-2.24+dfsg1/openssl/include/openssl/evp.h:835:19:  [4] (crypto) EVP_desx_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_desx_cbc(void);
data/alpine-2.24+dfsg1/openssl/include/openssl/evp.h:845:19:  [4] (crypto) EVP_rc4_40:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc4_40(void);
data/alpine-2.24+dfsg1/openssl/include/openssl/evp.h:860:19:  [4] (crypto) EVP_rc2_40_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_40_cbc(void);
data/alpine-2.24+dfsg1/openssl/include/openssl/evp.h:861:19:  [4] (crypto) EVP_rc2_64_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_64_cbc(void);
data/alpine-2.24+dfsg1/pico/browse.c:2703:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    status = system(child);
data/alpine-2.24+dfsg1/pico/display.c:1393:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(t1, sizeof(t1), PICO_TITLE, version);	/* write version */
data/alpine-2.24+dfsg1/pico/main.c:219:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define cpstr(s) strcpy((char *)fs_get(1+strlen(s)), s)
data/alpine-2.24+dfsg1/pico/main.c:664:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	  snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_arg), '+');
data/alpine-2.24+dfsg1/pico/main.c:671:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	  snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_num), '+');
data/alpine-2.24+dfsg1/pico/main.c:716:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_arg), '-');
data/alpine-2.24+dfsg1/pico/main.c:723:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_num), '-');
data/alpine-2.24+dfsg1/pico/main.c:796:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dictionary[i++], str);
data/alpine-2.24+dfsg1/pico/main.c:808:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_arg_s), cmd);
data/alpine-2.24+dfsg1/pico/main.c:838:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_color), cmd);
data/alpine-2.24+dfsg1/pico/main.c:854:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_output_charset), display_character_set);
data/alpine-2.24+dfsg1/pico/main.c:862:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_input_charset), keyboard_character_set);
data/alpine-2.24+dfsg1/pico/main.c:869:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_charset), cmd);
data/alpine-2.24+dfsg1/pico/main.c:966:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		  snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_arg), c);
data/alpine-2.24+dfsg1/pico/main.c:992:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		  snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_num), c);
data/alpine-2.24+dfsg1/pico/main.c:1014:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pico_missing_flag), c);
data/alpine-2.24+dfsg1/pico/osdep/altedit.c:288:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if(execl("/bin/sh", "sh", "-c", fname_to_locale(eb), (char *) NULL) < 0)
data/alpine-2.24+dfsg1/pico/osdep/altedit.c:315:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(prompt, sizeof(prompt), prmpt, (long) filesize);
data/alpine-2.24+dfsg1/pico/osdep/color.c:817:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	      snprintf(t->rgb, RGBLEN+1, MATCH_TRAN_COLOR);
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:377:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(e, "Can't find first file in \"%s\"", dn);
data/alpine-2.24+dfsg1/pico/osdep/msdlg.c:965:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(caption, ncaption, TEXT("%s '%s'"), button_list[maxstrIdx].label, 
data/alpine-2.24+dfsg1/pico/osdep/msdlg.c:1035:6:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    _sntprintf(caption, ncaption, TEXT("%s '%s'"), pB->label, pB->name);
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:1623:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(newFont.lfFaceName, LF_FACESIZE, TEXT("%s"), TEXT("Courier New"));
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:3713:10:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
         _sntprintf (TempBuf, sizeof(TempBuf)/sizeof(TCHAR), szTemp, mswin_specific_winver(),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:5031:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(buf, 256, TEXT("%.*s - Alpine"), 80, lptstr_title);
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:5143:3:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		_sntprintf(tcbuf, sizeof(tcbuf)/sizeof(TCHAR),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:5178:3:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		_sntprintf(tcbuf, sizeof(tcbuf)/sizeof(TCHAR),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:5467:4:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			_sntprintf(tcbuf, sizeof(tcbuf)/sizeof(TCHAR),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:5480:8:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			    _sntprintf(tcbuf, sizeof(tcbuf)/sizeof(TCHAR),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:5968:2:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	_sntprintf(newFont.lfFaceName, LF_FACESIZE, TEXT("%s"), fontName_lpt);
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:8328:2:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	_tcscpy (gHomeDir, targDir);
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:8394:4:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	  _sntprintf(filters + _tcslen(filters),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:8398:4:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	  _sntprintf(filters, sizeof(filters)/sizeof(TCHAR),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:8532:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(filters, sizeof(filters)/sizeof(TCHAR),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:8686:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(filters, sizeof(filters)/sizeof(TCHAR),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10360:2:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	_sntprintf(waitingFor, sizeof(waitingFor)/sizeof(TCHAR),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10606:2:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	_sntprintf(msg, sizeof(msg)/sizeof(TCHAR),
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10789:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(keybuf, MSWR_KEY_MAX+1, TEXT("%s%s%s"), MSWR_ROOT,
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10812:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(keybuf, MSWR_KEY_MAX+1, TEXT("%s%s%s"), MSWR_ROOT,
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10842:6:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    _sntprintf(tmp_lptstr, tmp_lptstr_tcharlen, TEXT("%salpine.exe,0"), path_lptstr);
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10910:8:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	      _sntprintf(tmp_lptstr, tmp_lptstr_tcharlen,
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10927:6:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    _sntprintf(tmp_lptstr, tmp_lptstr_tcharlen,
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10962:6:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    _sntprintf(tmp_lptstr, tmp_lptstr_tcharlen,
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:11122:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(tmp_lptstr, tmp_lptstr_len,
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:11126:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(tmp_lptstr, tmp_lptstr_len,
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:11291:2:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	_sntprintf(new_buf+k, new_buf_len - k, TEXT("%s"), pSubKey);
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:11307:6:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    _sntprintf(new_buf+k, new_buf_len - k,
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:11332:2:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	_sntprintf(new_buf+k, new_buf_len - k, TEXT("%s - Not Defined"), pSubKey);
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:11910:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(tcbuf, 256, TEXT("%c %s %s %s"), is_us ? '+' : ' ',
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:11949:3:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		_sntprintf(description, DESC_LEN+1, TEXT("Printing failed:  %s"), e);
data/alpine-2.24+dfsg1/pico/osdep/mswin_aspell.c:116:13:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            _sntprintf(aspell_fullname, ARRAYSIZE(aspell_fullname),
data/alpine-2.24+dfsg1/pico/osdep/mswin_spell.c:158:5:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _sntprintf(dlg_title, ARRAYSIZE(dlg_title), TEXT("Not in Dictionary: %s"),
data/alpine-2.24+dfsg1/pico/osdep/mswin_tw.c:311:5:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _vsntprintf(msg, ARRAYSIZE(msg), fmt, vlist);
data/alpine-2.24+dfsg1/pico/osdep/mswin_tw.c:624:13:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            ShellExecute(hwnd, TEXT("Open"), link_buf, NULL,  NULL,  SW_SHOWNORMAL);
data/alpine-2.24+dfsg1/pico/osdep/newmail.c:53:65:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
      snprintf(inbox, sizeof(inbox), "%s/%s", MAILDIR, (char *) getlogin());
data/alpine-2.24+dfsg1/pico/osdep/popen.c:43:25:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if((g_pico_fio.fp = popen(s, "r")) != NULL)
data/alpine-2.24+dfsg1/pico/osdep/shell.c:108:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system((shell = (char *)getenv("SHELL")) ? shell : "/bin/csh");
data/alpine-2.24+dfsg1/pico/pilot.c:141:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define cpstr(s) strcpy((char *)fs_get(1+strlen(s)), s)
data/alpine-2.24+dfsg1/pico/pilot.c:285:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pilot_missing_color), cmd);
data/alpine-2.24+dfsg1/pico/pilot.c:301:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pilot_output_charset), display_character_set);
data/alpine-2.24+dfsg1/pico/pilot.c:309:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pilot_input_charset), keyboard_character_set);
data/alpine-2.24+dfsg1/pico/pilot.c:316:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pilot_missing_charset), cmd);
data/alpine-2.24+dfsg1/pico/pilot.c:373:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	      snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pilot_missing_arg), c);
data/alpine-2.24+dfsg1/pico/pilot.c:388:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		  snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pilot_missing_num), c);
data/alpine-2.24+dfsg1/pico/pilot.c:404:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(tmp_1k_buf, sizeof(tmp_1k_buf), _(args_pilot_missing_flag), c);
data/alpine-2.24+dfsg1/pith/abdlc.c:1160:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if(pab->ostatus != Open && pab->access != NoAccess)
data/alpine-2.24+dfsg1/pith/adrbklib.c:218:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if(pab->access != NoExists){
data/alpine-2.24+dfsg1/pith/adrbklib.c:486:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		    snprintf(warning, warninglen,
data/alpine-2.24+dfsg1/pith/adrbklib.c:5144:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    if(pab->type & GLOBAL && pab->access != NoAccess)
data/alpine-2.24+dfsg1/pith/adrbklib.c:5325:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return(access);
data/alpine-2.24+dfsg1/pith/adrbklib.c:5442:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if(pab->access != NoAccess){
data/alpine-2.24+dfsg1/pith/adrbklib.h:587:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessType          access;
data/alpine-2.24+dfsg1/pith/charconv/filesys.c:712:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return(access(fname_to_locale(path), mode));
data/alpine-2.24+dfsg1/pith/charconv/utf8.c:1428:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(pdest, size - (pdest-dest), newfmt, input_str);
data/alpine-2.24+dfsg1/pith/charconv/utf8.c:1477:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		    snprintf(pdest, size - (pdest-dest), newfmt, int_arg);
data/alpine-2.24+dfsg1/pith/charconv/utf8.c:1483:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		    snprintf(pdest, size - (pdest-dest), newfmt, input_str);
data/alpine-2.24+dfsg1/pith/charconv/utf8.c:1490:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		    snprintf(pdest, size - (pdest-dest), newfmt, double_arg);
data/alpine-2.24+dfsg1/pith/charconv/utf8.c:1496:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		    snprintf(pdest, size - (pdest-dest), newfmt, ptr_arg);
data/alpine-2.24+dfsg1/pith/charconv/utf8.c:1931:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define cpstr(s) strcpy((char *)fs_get(1+strlen(s)), s)
data/alpine-2.24+dfsg1/pith/charconv/utf8.c:2007:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(buf, sizeof(buf),
data/alpine-2.24+dfsg1/pith/charconv/utf8.c:2282:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(b, sizeof(buf[0])-(b-buf[whichbuf]), done_one ? "%03ld" : "%ld", x);
data/alpine-2.24+dfsg1/pith/conf.c:985:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		   snprintf x ;		\
data/alpine-2.24+dfsg1/pith/conf.c:7805:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buf2, sizeof(buf2), message, buf1);
data/alpine-2.24+dfsg1/pith/context.c:216:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	  snprintf(b, len, pq, name);
data/alpine-2.24+dfsg1/pith/context.c:223:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(t, l+1, pq, name);
data/alpine-2.24+dfsg1/pith/filter.c:4934:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(tmp_20k_buf + strlen(tmp_20k_buf),
data/alpine-2.24+dfsg1/pith/filter.c:9078:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	       sprintf(s,  "<%s", line+f2);
data/alpine-2.24+dfsg1/pith/ical.c:931:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(ical_buf, s);
data/alpine-2.24+dfsg1/pith/ical.c:1027:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(ical_buf, s);
data/alpine-2.24+dfsg1/pith/ical.c:1130:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(ical_buf, s);
data/alpine-2.24+dfsg1/pith/ical.c:1212:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(ical_buf, s);
data/alpine-2.24+dfsg1/pith/ical.c:1293:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(ical_buf, s);
data/alpine-2.24+dfsg1/pith/ical.c:1348:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(token, "%s\r\n", ical->comp);	/* this is allocated memory */
data/alpine-2.24+dfsg1/pith/ical.c:1405:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(ical_buf, s);
data/alpine-2.24+dfsg1/pith/imap.c:1066:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf((*l)->passwd, "%s%c%s", authtype, PWDAUTHSEP, passwd);
data/alpine-2.24+dfsg1/pith/imap.c:1075:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf((*l)->user, "%s%c%s", authtype, PWDAUTHSEP, user);
data/alpine-2.24+dfsg1/pith/ldap.c:879:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp);
data/alpine-2.24+dfsg1/pith/ldap.c:882:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp, scp);
data/alpine-2.24+dfsg1/pith/ldap.c:885:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp, scp, scp);
data/alpine-2.24+dfsg1/pith/ldap.c:888:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp, scp, scp, scp);
data/alpine-2.24+dfsg1/pith/ldap.c:891:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp, scp, scp, scp, scp);
data/alpine-2.24+dfsg1/pith/ldap.c:894:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp, scp, scp, scp, scp, scp);
data/alpine-2.24+dfsg1/pith/ldap.c:897:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp, scp, scp, scp, scp, scp, scp);
data/alpine-2.24+dfsg1/pith/ldap.c:900:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp, scp, scp, scp, scp, scp, scp,
data/alpine-2.24+dfsg1/pith/ldap.c:904:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp, scp, scp, scp, scp, scp, scp,
data/alpine-2.24+dfsg1/pith/ldap.c:909:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    snprintf(filter, sizeof(filter), filt_format, scp, scp, scp, scp, scp, scp, scp,
data/alpine-2.24+dfsg1/pith/mailcap.c:938:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(to, SIZEOF_20KBUF-(to-tmp_20k_buf), MC_ADD_TMP, tmp_file);
data/alpine-2.24+dfsg1/pith/maillist.c:133:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(h, p);		/* assumption #383: decoding shrinks */
data/alpine-2.24+dfsg1/pith/mimedesc.c:660:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(tmp, sizeof(tmp), (flags & FMS_SPACE) ? " %-5.5s" : " %s", p);
data/alpine-2.24+dfsg1/pith/osdep/canaccess.c:89:70:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
	       strncat(testname, "caXXXXXX", MAXPATH-strlen(testname)-1) && mktemp(testname)){
data/alpine-2.24+dfsg1/pith/osdep/mimedisp.c:389:2:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	_sntprintf(keybuf, sizeof(keybuf), TEXT("MIME\\Database\\Content Type\\%s"), mime_type);
data/alpine-2.24+dfsg1/pith/osdep/pipe.c:376:6:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    execvp(syspipe->argv[0], syspipe->argv);
data/alpine-2.24+dfsg1/pith/osdep/pipe.c:398:6:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    execl(shellpath, shell, command ? "-c" : (char *)NULL, fname_to_locale(command), (char *)NULL);
data/alpine-2.24+dfsg1/pith/remote.c:124:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if(prc->rd->access != NoExists){
data/alpine-2.24+dfsg1/pith/remote.c:207:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
       (!file || !prc->rd || prc->rd->access != ReadWrite)){
data/alpine-2.24+dfsg1/pith/remtype.h:35:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessType   access;	/* of remote folder                          */
data/alpine-2.24+dfsg1/pith/reply.c:3366:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(id, "<%s@%s>", leftpart, hostpart);
data/alpine-2.24+dfsg1/pith/reply.c:3622:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if(rd->access != NoExists){
data/alpine-2.24+dfsg1/pith/save.c:1644:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(tmp, "%s%s/%s%s%s%s%s%s%s", _("A "),
data/alpine-2.24+dfsg1/pith/save.c:1658:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(tmp, "%s%s/%s%s%s%s%s", _("A "),
data/alpine-2.24+dfsg1/pith/save.c:1692:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s%s/%s%s%s%s%s%s%s%s%s%s%s",
data/alpine-2.24+dfsg1/pith/send.c:4141:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(outbuf, outbuflen, printstring, error);
data/alpine-2.24+dfsg1/pith/smime.c:1790:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    if(rd->access != NoExists){
data/alpine-2.24+dfsg1/pith/smime.c:1820:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    if(rd->access != ReadWrite || rd_remote_is_readonly(rd)){
data/alpine-2.24+dfsg1/pith/smkeys.c:1000:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    if(rd->access != NoExists){
data/alpine-2.24+dfsg1/pith/smkeys.c:1030:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    if(rd->access != ReadWrite || rd_remote_is_readonly(rd)){
data/alpine-2.24+dfsg1/pith/status.c:39:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(tmp_20k_buf, SIZEOF_20KBUF, s, a);
data/alpine-2.24+dfsg1/pith/status.c:61:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(tmp_20k_buf, SIZEOF_20KBUF, s, a1, a2);
data/alpine-2.24+dfsg1/pith/status.c:84:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(tmp_20k_buf, SIZEOF_20KBUF, s, a1, a2, a3);
data/alpine-2.24+dfsg1/pith/status.c:108:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(tmp_20k_buf, SIZEOF_20KBUF, s, a1, a2, a3, a4);
data/alpine-2.24+dfsg1/pith/status.c:117:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(tmp_20k_buf, SIZEOF_20KBUF, s, a1, a2, a3, a4, a5);
data/alpine-2.24+dfsg1/pith/status.c:126:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(tmp_20k_buf, SIZEOF_20KBUF, s, a1, a2, a3, a4, a5, a6);
data/alpine-2.24+dfsg1/pith/status.c:153:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(tmp_20k_buf, SIZEOF_20KBUF, s, a1, a2, a3, a4, a5, a6, a7);
data/alpine-2.24+dfsg1/pith/status.c:162:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(tmp_20k_buf, SIZEOF_20KBUF, s, a1, a2, a3, a4, a5, a6, a7, a8);
data/alpine-2.24+dfsg1/pith/string.c:2855:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(sp->name, "%s%s%s", authtype ? authtype :  "",
data/alpine-2.24+dfsg1/pith/text.c:409:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buf, sizeof(buf), ENCODING_DISCLAIMER, body_encodings[att->body->encoding]);
data/alpine-2.24+dfsg1/pith/text.c:478:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buf, sizeof(buf), CHARSET_DISCLAIMER_1, charset ? charset : "US-ASCII");
data/alpine-2.24+dfsg1/pith/text.c:546:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(p, sizeof(buf)-(p-buf), CHARSET_DISCLAIMER_3,
data/alpine-2.24+dfsg1/regex/regcomp.c:1232:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(cs->multis + oldend - 1, cp);
data/alpine-2.24+dfsg1/regex/regerror.c:133:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				(void) strcpy(convbuf, r->name);
data/alpine-2.24+dfsg1/regex/regerror.c:145:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void) strcpy(errbuf, s);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:644:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(name.sun_path, peSocketName = sname);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:3743:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if(rd->access != NoExists){
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:4165:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				    strcpy(mb.user, p);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:4246:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(mb.user, p);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8268:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			    strcpy(peED.color.bg, tp2);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8279:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			    strcpy(peED.color.bg, peED.color.bgdef);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8284:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(peED.color.fg, tp);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8303:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			    strcpy(peED.color.fg, tp2);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8314:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			    strcpy(peED.color.fg, peED.color.fgdef);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8319:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(peED.color.bg, tp);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8495:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(peED.color.fgdef, peColorStr(color, wtmp_20k_buf));
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8503:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(peED.color.bgdef, peColorStr(color,wtmp_20k_buf));
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8954:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(peED.color.fgdef, peColorStr(color, wtmp_20k_buf));
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:8962:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(peED.color.bgdef, peColorStr(color,wtmp_20k_buf));
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:9047:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(peED.color.fgdef, peColorStr(color, wtmp_20k_buf));
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:9055:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(peED.color.bgdef, peColorStr(color,wtmp_20k_buf));
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:9145:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(section, subsection);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:11204:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(wtmp_20k_buf,
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:11779:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(errp, s);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:12424:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(err = wtmp_20k_buf, "Unknown Post Option: %s", value);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:12435:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(err = wtmp_20k_buf, "Malformed header (%s)", field);
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:13592:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		    if(as.adrbks[booknum].access != ReadWrite) return TCL_ERROR;
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:13646:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		    if(as.adrbks[booknum].access != ReadWrite) return TCL_ERROR;
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:471:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(_nfcolor, s);
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:487:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(_nbcolor, s);
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:502:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(_rfcolor, s);
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:505:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(the_rev_color->fg, _rfcolor);
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:522:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(_rbcolor, s);
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:525:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(the_rev_color->bg, _rbcolor);
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:607:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(_last_fg_color, s);
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:636:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(_last_bg_color, s);
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:663:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ret, _last_fg_color);
data/alpine-2.24+dfsg1/web/src/alpined.d/color.c:675:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ret, _last_bg_color);
data/alpine-2.24+dfsg1/web/src/alpined.d/imap.c:265:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(peCredentialRequestor, mb->orighost);
data/alpine-2.24+dfsg1/web/src/alpined.d/imap.c:279:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(pwd, "%s@%s", ps_global->VAR_USER_ID,
data/alpine-2.24+dfsg1/web/src/alpined.d/imap.c:305:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(user, mb->user);
data/alpine-2.24+dfsg1/web/src/alpined.d/imap.c:311:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(user, cmb.user);
data/alpine-2.24+dfsg1/web/src/alpined.d/wpcomm.c:85:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(name.sun_path, fname);
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:45:25:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
#define SERVER_LOG(x,y) syslog (LOG_ALERT,x,y)
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:66:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"host@%s",mylocalhost ());
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:139:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (user,mb->user[0] ? mb->user : myusername ());
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:143:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (err,"auth_gss_proxy: create pipe error: %s",strerror(errno));
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:145:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (err,"auth_gss_proxy: create pipe error: %s",strerror(errno));
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:149:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (err,"auth_gss_proxy: fork error: %s",strerror(errno));
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:164:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (err,"%s@%s",service,mb->host);
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:165:5:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execlp(AUTH_GSS_PROXY_PATH,AUTH_GSS_PROXY_PATH,err,user,0);
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:179:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (err,"auth_gss_proxy: read error: %s",strerror(errno));
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:195:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (err,"auth_gss_proxy: read error: %s",strerror(errno));
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:211:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (err,"auth_gss_proxy: write error: %s",strerror(errno));
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:214:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (err,"auth_gss_proxy: write error: %s",strerror(errno));
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:227:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (err,"auth_gss_proxy: read error: %s",strerror(errno));
data/alpine-2.24+dfsg1/web/src/pubcookie/auth_gss_proxy.c:282:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmp,"%s@%s",(char *) mail_parameters (NIL,GET_SERVICENAME,NIL),
data/alpine-2.24+dfsg1/web/src/pubcookie/id_table.c:221:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(path + 6,de->d_name);
data/alpine-2.24+dfsg1/web/src/pubcookie/wp_uidmapper.c:137:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sun.sun_path,socketname);  
data/alpine-2.24+dfsg1/web/src/pubcookie/wp_uidmapper.c:243:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sbuf,"id_table_create_id(%s,[",rbuf);
data/alpine-2.24+dfsg1/web/src/pubcookie/wp_uidmapper.c:247:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sbuf + strlen(sbuf) - 1, "]): %s\n",sep);
data/alpine-2.24+dfsg1/web/src/pubcookie/wp_uidmapper.c:248:2:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
	syslog(LOG_ERR,sbuf);
data/alpine-2.24+dfsg1/web/src/pubcookie/wp_uidmapper_lib.c:36:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sun.sun_path,sockname);
data/alpine-2.24+dfsg1/alpine/alpine.c:213:5:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srandom(getpid() + time(0));
data/alpine-2.24+dfsg1/alpine/alpine.c:785:54:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    printf(_("Terminal type \"%s\" is unknown.\n"), getenv("TERM"));
data/alpine-2.24+dfsg1/alpine/alpine.c:791:102:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            printf(_("Your terminal, of type \"%s\", is lacking functions needed to run alpine.\n"), getenv("TERM"));
data/alpine-2.24+dfsg1/alpine/busy.c:270:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	    pick_this_one = random() % eligible;
data/alpine-2.24+dfsg1/alpine/dispfilt.c:373:46:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	snprintf(tmp_20k_buf, SIZEOF_20KBUF, "%ld", random());
data/alpine-2.24+dfsg1/alpine/help.c:1298:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    i = (int)(random() % 36L);
data/alpine-2.24+dfsg1/alpine/help.c:1299:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    j = (int)(random() % 36L);
data/alpine-2.24+dfsg1/alpine/help.c:1300:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    k = (int)(random() % 36L);
data/alpine-2.24+dfsg1/alpine/help.c:1301:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    l = (int)(random() % 36L);
data/alpine-2.24+dfsg1/alpine/help.c:1306:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	    (int)(random() % 10L),
data/alpine-2.24+dfsg1/alpine/imap.c:4294:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        hmod = LoadLibrary(TEXT("advapi32.dll"));
data/alpine-2.24+dfsg1/alpine/osdep/execview.c:142:5:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if(CreateProcess(NULL, cmd_lpt, NULL, NULL, FALSE,
data/alpine-2.24+dfsg1/alpine/osdep/execview.c:142:5:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if(CreateProcess(NULL, cmd_lpt, NULL, NULL, FALSE,
data/alpine-2.24+dfsg1/alpine/osdep/termout.unx.c:344:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if(F_ON(F_ENABLE_XTERM_NEWMAIL, ps_global) && getenv("DISPLAY"))
data/alpine-2.24+dfsg1/alpine/osdep/termout.unx.c:978:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      xterm = (getenv("DISPLAY") != NULL) ? yes : no;
data/alpine-2.24+dfsg1/alpine/reply.c:2631:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(!getenv("HOME")){
data/alpine-2.24+dfsg1/alpine/send.c:3215:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if(!getenv("HOME")){
data/alpine-2.24+dfsg1/alpine/signal.c:817:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!((shell = getenv("SHELL")) || (shell = getenv("COMSPEC"))))
data/alpine-2.24+dfsg1/alpine/signal.c:817:46:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!((shell = getenv("SHELL")) || (shell = getenv("COMSPEC"))))
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:37:53:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:40:53:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:43:53:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:46:53:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:49:53:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1795:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	       (unsigned long) random (),(unsigned long) time (0),
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1863:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	       (unsigned long) random (),(unsigned long) time (0),
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1918:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	       (unsigned long) random (),(unsigned long) time (0),
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:673:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		((s = getenv ("HOME")) && *s && (strlen (s) < NETMAXMBX) &&
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:177:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    i = strlen (myHomeDir = cpystr ((s = getenv ("HOME")) ? s : ""));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:226:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random ()
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.c:228:14:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  if (!rndm) srand (rndm = (unsigned) time (0L));
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.h:40:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random (void);
data/alpine-2.24+dfsg1/imap/src/osdep/dos/env_dos.h:42:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define getpid random
data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dbw.c:64:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (!((s = getenv ("DISPLAY")) || (s = getenv ("display")))) {
data/alpine-2.24+dfsg1/imap/src/osdep/dos/os_dbw.c:64:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (!((s = getenv ("DISPLAY")) || (s = getenv ("display")))) {
data/alpine-2.24+dfsg1/imap/src/osdep/mac/env_mac.c:211:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random ()
data/alpine-2.24+dfsg1/imap/src/osdep/mac/os_mac.h:69:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random (void);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:244:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random (void)
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:246:14:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  if (!rndm) srand (rndm = (unsigned) time (0L));
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:491:33:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  else if ((netapi || (netapi = LoadLibrary ("netapi32.dll"))) &&
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:503:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  else if ((s = getenv ("USERPROFILE")) && (t = strrchr (s,'\\'))) {      
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:519:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *s = getenv ("SystemDrive");
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:544:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (p = getenv ("HOMEPATH"))
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:546:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	       (d = getenv ("HOMEDRIVE")) ? d : defaultDrive (),p);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:547:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    else if (!(path = getenv ("HOME")))
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:701:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!((s = lockdir (lock,getenv ("windir"),"TEMP")) ||
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:703:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	(s = lockdir (lock,getenv ("TEMP"),NIL)) ||
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:704:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	(s = lockdir (lock,getenv ("TMP"),NIL)) ||
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.c:705:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	(s = lockdir (lock,getenv ("TMPDIR"),NIL)) ||
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.h:68:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random (void);
data/alpine-2.24+dfsg1/imap/src/osdep/nt/env_nt.h:71:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define getpid random
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_win.c:115:17:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    if (((lib = LoadLibrary ("schannel.dll")) ||
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_win.c:116:10:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	 (lib = LoadLibrary ("security.dll"))) &&
data/alpine-2.24+dfsg1/imap/src/osdep/nt/ssl_win.c:127:13:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	if ((lib = LoadLibrary ("crypt32.dll")) &&
data/alpine-2.24+dfsg1/imap/src/osdep/nt/yunchan.c:303:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *s = _tempnam (getenv ("TEMP"),"msg");
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:166:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((s = getenv ("PINEHOME")) || (s = getenv ("HOME")) ||
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:166:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((s = getenv ("PINEHOME")) || (s = getenv ("HOME")) ||
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:167:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	(s = getenv ("ETC"))) {
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:210:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!((s = lockdir (lock,getenv ("TEMP"),NIL)) ||
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:211:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	(s = lockdir (lock,getenv ("TMP"),NIL)) ||
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:212:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	(s = lockdir (lock,getenv ("TMPDIR"),NIL)) ||
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:292:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random ()
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.c:294:14:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  if (!rndm) srand (rndm = (unsigned) time (0L));
data/alpine-2.24+dfsg1/imap/src/osdep/os2/env_os2.h:34:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random (void);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:806:27:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
      if (chdir (home) || chroot (home))
data/alpine-2.24+dfsg1/imap/src/osdep/unix/env_unix.c:943:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		((s = getenv ("HOME")) && *s && (strlen (s) < NETMAXMBX) &&
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_aos.h:37:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv (char *name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_art.h:47:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_art.h:47:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_art.h:59:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv (char *name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_asv.h:50:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_asv.h:50:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_asv.h:56:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv (char *name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_bsd.h:38:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv (char *name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_drs.h:42:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random rand
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_hpp.h:44:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_hpp.h:44:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_isc.h:54:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_isc.h:54:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_ptx.h:52:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_ptx.h:52:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_qnx.h:62:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long random (void);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sco.h:62:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random rand
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_shp.h:44:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_shp.h:44:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_soln.h:63:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_soln.h:63:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_solo.h:63:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_solo.h:63:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv2.h:55:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv2.h:55:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv2.h:93:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv (char *name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv4.h:59:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_sv4.h:59:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random lrand48
data/alpine-2.24+dfsg1/imap/src/osdep/unix/os_vu2.h:65:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv (char *name);
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:871:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if ((s = getenv (t = "SSH_CLIENT")) ||
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:872:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	  (s = getenv (t = "KRB5REMOTEADDR")) ||
data/alpine-2.24+dfsg1/imap/src/osdep/unix/tcp_unix.c:873:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	  (s = getenv (t = "SSH2_CLIENT"))) {
data/alpine-2.24+dfsg1/imap/src/osdep/vms/os_vms.h:47:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random rand
data/alpine-2.24+dfsg1/imap/src/osdep/vms/tcp_vmsn.c:196:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!myLocalHost) myLocalHost = cpystr (getenv ("SYS$NODE"));
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:175:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random ()
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:177:14:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  if (!rndm) srand (rndm = (unsigned) time (0L));
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:188:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  return ((s = getenv ("SystemDrive")) && *s) ? s : "C:";
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:199:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  return ((s = getenv ("HOMEDRIVE")) && *s) ? s : defaultDrive ();
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.c:212:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!((s = getenv ("HOMEPATH")) && (i = strlen (s)))) return NIL;
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.h:40:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random (void);
data/alpine-2.24+dfsg1/imap/src/osdep/wce/env_wce.h:44:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define getpid random
data/alpine-2.24+dfsg1/ldap/inckit/proto-lb.h:101:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt( int nargc, char **nargv, char *ostr );
data/alpine-2.24+dfsg1/ldap/kbind.c:291:25:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        	instKrbv4DLL = LoadLibrary("Krbv4win.DLL");
data/alpine-2.24+dfsg1/mapi/instmapi.c:201:14:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
      hDll = LoadLibrary(mapifile);
data/alpine-2.24+dfsg1/mapi/pmapi.c:1206:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if((p3 = getenv(p1+2)) && *p3)
data/alpine-2.24+dfsg1/mapi/pmapi.c:1624:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(tmpdir = getenv("TEMP")){
data/alpine-2.24+dfsg1/mapi/pmapi.c:1628:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    else if(tmpdir = getenv("TMP")){
data/alpine-2.24+dfsg1/mapi/pmapi.c:1884:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(penv = getenv("PINERC")){
data/alpine-2.24+dfsg1/mapi/pmapi.c:1892:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(penv = getenv("PINECONF")){
data/alpine-2.24+dfsg1/mapi/pmapi.c:1903:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(penv = getenv("PINERCEX")){
data/alpine-2.24+dfsg1/pico/browse.c:718:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if((envp = (char *) getenv("EDITOR")) != NULL)
data/alpine-2.24+dfsg1/pico/browse.c:1553:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			    (envp = (char *) getenv("PAGER"))
data/alpine-2.24+dfsg1/pico/osdep/altedit.c:124:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		    if(!(path = getenv("PATH")))
data/alpine-2.24+dfsg1/pico/osdep/altedit.c:149:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    if(getenv("EDITOR")){
data/alpine-2.24+dfsg1/pico/osdep/altedit.c:150:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	      strncpy(eb, (char *)getenv("EDITOR"), sizeof(eb));
data/alpine-2.24+dfsg1/pico/osdep/altedit.c:418:5:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if(getenv("EDITOR")){
data/alpine-2.24+dfsg1/pico/osdep/altedit.c:419:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	  strncpy(eb, (char *)getenv("EDITOR"), sizeof(eb));
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:495:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    if (!(home = (char *) getenv("HOME")))
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:510:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if(!(home = (char *) getenv("HOME"))
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:511:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   && getenv("HOMEDRIVE") && getenv("HOMEPATH"))
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:511:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   && getenv("HOMEDRIVE") && getenv("HOMEPATH"))
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:513:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		  (char *) getenv("HOMEDRIVE"), (char *) getenv("HOMEPATH"));
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:513:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		  (char *) getenv("HOMEDRIVE"), (char *) getenv("HOMEPATH"));
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:721:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	 (dir = getenv("TMPDIR")) ||
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:722:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	 (dir = getenv("TMP")) ||
data/alpine-2.24+dfsg1/pico/osdep/filesys.c:723:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	 (dir = getenv("TEMP"))))
data/alpine-2.24+dfsg1/pico/osdep/mouse.c:63:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(getenv("DISPLAY")){
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10353:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    brc = CreateProcess(NULL, exec_data.lptstr_command, NULL, NULL,
data/alpine-2.24+dfsg1/pico/osdep/mswin.c:10353:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    brc = CreateProcess(NULL, exec_data.lptstr_command, NULL, NULL,
data/alpine-2.24+dfsg1/pico/osdep/mswin_aspell.c:133:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    mod_aspell = LoadLibrary(aspell_fullname);
data/alpine-2.24+dfsg1/pico/osdep/mswin_tw.c:87:9:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        LoadLibrary(TEXT("riched20.dll"));
data/alpine-2.24+dfsg1/pico/osdep/newmail.c:49:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if((p = (char *)getenv("MAIL")) != NULL)
data/alpine-2.24+dfsg1/pico/osdep/shell.c:108:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	system((shell = (char *)getenv("SHELL")) ? shell : "/bin/csh");
data/alpine-2.24+dfsg1/pico/osdep/spell.c:109:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if((sp = (char *)getenv("SPELL")) == NULL)
data/alpine-2.24+dfsg1/pico/osdep/spell.c:128:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    if(!(path = getenv("PATH")))
data/alpine-2.24+dfsg1/pico/osdep/terminal.c:313:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	ttnm = getenv("TERM");
data/alpine-2.24+dfsg1/pico/osdep/terminal.c:397:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	er = getenv("LINES");
data/alpine-2.24+dfsg1/pico/osdep/terminal.c:408:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	ec = getenv("COLUMNS");
data/alpine-2.24+dfsg1/pico/osdep/terminal.c:1072:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (!(tv_stype = getenv("TERM")) || !strncpy(term_name, tv_stype, sizeof(term_name))){
data/alpine-2.24+dfsg1/pico/osdep/terminal.c:1172:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	er = getenv("LINES");
data/alpine-2.24+dfsg1/pico/osdep/terminal.c:1183:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	ec = getenv("COLUMNS");
data/alpine-2.24+dfsg1/pico/osdep/terminal.c:1709:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char *getenv();
data/alpine-2.24+dfsg1/pico/osdep/terminal.c:1711:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((cp = getenv("TERM")) == NULL) {
data/alpine-2.24+dfsg1/pith/charconv/filesys.c:682:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if((p = getenv(env_variable)) != NULL){
data/alpine-2.24+dfsg1/pith/conf.c:1058:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(!ps->prc && (p = getenv("PINERC")) && *p){
data/alpine-2.24+dfsg1/pith/conf.c:1384:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(!ps->pconf && (p = getenv("PINECONF"))){
data/alpine-2.24+dfsg1/pith/conf.c:1438:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(!ps->exceptions && (p = getenv("PINERCEX")) && *p){
data/alpine-2.24+dfsg1/pith/conf.c:5051:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    if((p = getenv(word)) != NULL){ /* check for word in environment */
data/alpine-2.24+dfsg1/pith/conf.c:6069:5:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if(realpath(filename, realfilename) == NULL)
data/alpine-2.24+dfsg1/pith/conf.c:6424:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if(p = getenv("PINERC")){
data/alpine-2.24+dfsg1/pith/mailcap.c:158:58:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    pathcopy = mc_conf_path(ps_global->VAR_MAILCAP_PATH, getenv("MAILCAPS"),
data/alpine-2.24+dfsg1/pith/mailcap.c:541:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if(can_access_in_path(getenv("PATH"), command,  EXECUTE_ACCESS) >= 0)
data/alpine-2.24+dfsg1/pith/mimetype.c:152:59:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    pathcopy = mc_conf_path(ps_global->VAR_MIMETYPE_PATH, getenv("MIMETYPES"),
data/alpine-2.24+dfsg1/pith/newmail.c:683:70:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	snprintf(subj_leadin, sizeof(subj_leadin), " %s ", carray[(unsigned)random()%12]);
data/alpine-2.24+dfsg1/pith/osdep/creatdir.c:96:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	   sprintf(s, "%x%x%x", (unsigned int)(random() % 256), (unsigned int)(random() % 256),
data/alpine-2.24+dfsg1/pith/osdep/creatdir.c:96:73:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	   sprintf(s, "%x%x%x", (unsigned int)(random() % 256), (unsigned int)(random() % 256),
data/alpine-2.24+dfsg1/pith/osdep/creatdir.c:97:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			     (unsigned int)(random() % 256));
data/alpine-2.24+dfsg1/pith/osdep/fnexpand.c:45:5:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if(getenv("HOME") != NULL)
data/alpine-2.24+dfsg1/pith/osdep/fnexpand.c:46:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	  temp_home_str = getenv("HOME");
data/alpine-2.24+dfsg1/pith/osdep/fnexpand.c:51:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    if((p = (char *) getenv("HOMEDRIVE"))
data/alpine-2.24+dfsg1/pith/osdep/fnexpand.c:52:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	       && (q = (char *) getenv("HOMEPATH")))
data/alpine-2.24+dfsg1/pith/osdep/pipe.c:301:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if(can_access_in_path(getenv("PATH"), syspipe->argv[0],
data/alpine-2.24+dfsg1/pith/osdep/pipe.c:381:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if((env = getenv("SHELL")) && (sh = strrchr(env, '/'))){
data/alpine-2.24+dfsg1/pith/osdep/temp_nam.c:247:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(!dir && (f = getenv("TMPDIR")) && !our_stat(f, &buf) &&
data/alpine-2.24+dfsg1/pith/osdep/temp_nam.c:255:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(!dir && (f = getenv("TMP")) && !our_stat(f, &buf) &&
data/alpine-2.24+dfsg1/pith/osdep/temp_nam.c:263:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(!dir && (f = getenv("TEMP")) && !our_stat(f, &buf) &&
data/alpine-2.24+dfsg1/pith/remote.c:1740:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	  r = random();
data/alpine-2.24+dfsg1/pith/send.c:2849:62:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	  snprintf (tmp,sizeof(tmp),"%ld-%ld-%ld=:%ld",gethostid (),random (),(long) time (0),
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:556:5:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srandom(getpid() + time(0));
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:584:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(buf = getenv("REMOTE_USER"))
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:618:38:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    for(argerr = 0; !argerr && ((n = getopt(argc,argv,"d")) != -1); ) {
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:10808:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    pine_state->home_dir = cpystr((getenv("HOME") != NULL)
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:10809:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				    ? getenv("HOME")
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:15845:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	n = random();
data/alpine-2.24+dfsg1/web/src/alpined.d/alpined.c:15858:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		if(random() % 2){
data/alpine-2.24+dfsg1/web/src/pubcookie/wp_tclsh.c:88:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  user = getenv("REMOTE_USER");
data/alpine-2.24+dfsg1/web/src/pubcookie/wp_tclsh.c:89:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if(!((((cookie = getenv("QUERY_STRING"))
data/alpine-2.24+dfsg1/web/src/pubcookie/wp_tclsh.c:91:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	|| ((cookie = getenv("HTTP_COOKIE"))
data/alpine-2.24+dfsg1/web/src/pubcookie/wp_uidmapper.c:77:36:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  for(is_err = 0; !is_err && ((i = getopt(argc,argv,"dlrm:s:u:")) != -1); ) {
data/alpine-2.24+dfsg1/alpine/addrbook.c:417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           lbuf[6*MAX_SCREEN_COLS + 1];
data/alpine-2.24+dfsg1/alpine/addrbook.c:533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           special[6*MAX_SCREEN_COLS-1];
data/alpine-2.24+dfsg1/alpine/addrbook.c:1588:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1606:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1629:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1646:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1669:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1686:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1711:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1729:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1754:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1777:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1802:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1821:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1844:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1861:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1884:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1902:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1928:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1953:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1976:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:1993:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/addrbook.c:2281:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[80], *bp;
data/alpine-2.24+dfsg1/alpine/addrbook.c:3136:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		      char nickbuf[MAX_NICKNAME + 1];
data/alpine-2.24+dfsg1/alpine/addrbook.c:5170:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char bb[100];
data/alpine-2.24+dfsg1/alpine/addrbook.c:5497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         sstring[80+1], prompt[80];
data/alpine-2.24+dfsg1/alpine/addrbook.c:6311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         search_string[MAX_SEARCH + 1];
data/alpine-2.24+dfsg1/alpine/addrbook.c:6312:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         prompt[MAX_SEARCH + 50], nsearch_string[MAX_SEARCH+1], *p;
data/alpine-2.24+dfsg1/alpine/addrbook.c:6868:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/alpine-2.24+dfsg1/alpine/addrbook.c:6883:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[4];
data/alpine-2.24+dfsg1/alpine/addrbook.c:7099:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unambig[1000];
data/alpine-2.24+dfsg1/alpine/addrbook.c:7231:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        b[500];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:564:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         fakeaddrpmt[500];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:914:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char titlebar[40];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:915:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nickpmt[100], fullpmt[100], fccpmt[100], cmtpmt[100], addrpmt[100]; 
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:1373:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[MAX_NICKNAME + 80];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:1466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:1507:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:1555:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[90];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:1694:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char titlebar[100];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:1696:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         tmp[1000+MAXFOLDER];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:1698:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char servpmt[100], foldpmt[100], nickpmt[100];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2106:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  local_file[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  rem_abook[MAILTMPLEN+3], prompt[MAILTMPLEN], old_nick[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2369:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        prompt[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2629:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       rem_pinerc_prefix[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2647:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:2737:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       prompt[MAILTMPLEN], rem_pinerc[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3034:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         tmp[200];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char warning[800];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3276:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char prompt[100];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     tmp[200];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:3753:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   tmp[200];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:4166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     filename[MAXPATH+1], full_filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:4957:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   eol[3];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:5237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           warn[2][MAX_NICKNAME+1];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:5238:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           warning[MAX_NICKNAME+1];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:5239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           tmp[MAX(200,2*MAX_NICKNAME+80)];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:5736:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char           spaces[100];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:5737:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char           more_spaces[100];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:5738:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char           b[500];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:5981:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char         lbuf[6*MAX_SCREEN_COLS + 1];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:6153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[80];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:6345:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   prompt[200];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:6597:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fbuf[FILTSIZE+1];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:6877:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[200];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:7163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        obuf[W+10];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:7164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        hdr[6*INDENTHERE+1], hdr2[6*INDENTHERE+1];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:7226:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char      buf[20];
data/alpine-2.24+dfsg1/alpine/adrbkcmd.c:7565:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ebuf[300];
data/alpine-2.24+dfsg1/alpine/alpine.c:895:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char       filename[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/alpine.c:1070:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char             int_mail[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/alpine.c:1125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  char buf1[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/alpine.c:1126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  char buf2[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/alpine.c:1174:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char buf1[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/alpine.c:1175:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char buf2[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/alpine.c:1206:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char       foldername[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/alpine.c:2184:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char label[LONGEST_LABEL + 2 + 1], /* label + brackets + \0 */
data/alpine-2.24+dfsg1/alpine/alpine.c:2254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/alpine.c:2255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[4*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/alpine.c:2698:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char sig_path[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/alpine.c:3057:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    v = atoi((*p)+1);
data/alpine-2.24+dfsg1/alpine/alpine.c:3259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  msg[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/alpine.c:3456:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/alpine-2.24+dfsg1/alpine/arg.c:235:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	      strcat(options[nlines++], " \\");
data/alpine-2.24+dfsg1/alpine/arg.c:830:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			      char path[MAXPATH], dir[MAXPATH];
data/alpine-2.24+dfsg1/alpine/arg.c:876:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			      char path[MAXPATH], dir[MAXPATH];
data/alpine-2.24+dfsg1/alpine/arg.c:911:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			  pine_state->init_context = (short) atoi(str);
data/alpine-2.24+dfsg1/alpine/arg.c:924:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			  pine_state->start_entry = atoi(str);
data/alpine-2.24+dfsg1/alpine/arg.c:991:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   list[500];
data/alpine-2.24+dfsg1/alpine/arg.c:1059:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rev[128];
data/alpine-2.24+dfsg1/alpine/arg.c:1136:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			i = atoi(q+1);
data/alpine-2.24+dfsg1/alpine/arg.c:1157:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		      debug = atoi(q+1);
data/alpine-2.24+dfsg1/alpine/arg.c:1169:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			i = atoi(q+1);
data/alpine-2.24+dfsg1/alpine/arg.c:1183:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			i = atoi(q+1);
data/alpine-2.24+dfsg1/alpine/arg.c:1198:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			i = atoi(q+1);
data/alpine-2.24+dfsg1/alpine/arg.c:1215:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    debug = atoi(debug_str);
data/alpine-2.24+dfsg1/alpine/arg.c:1299:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *pp[2];
data/alpine-2.24+dfsg1/alpine/arg.c:1340:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  errstr[256], *errp;
data/alpine-2.24+dfsg1/alpine/arg.c:1411:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char buf[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/arg.c:1449:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/arg.c:1518:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char buf[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/busy.c:47:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char      busy_message[MAX_BM + 1];
data/alpine-2.24+dfsg1/alpine/busy.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *bars[MAX_SPINNER_ELEMENTS];
data/alpine-2.24+dfsg1/alpine/busy.c:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char progress[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/busy.c:218:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[sizeof(progress) + 30];
data/alpine-2.24+dfsg1/alpine/busy.c:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dbuf[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/busy.c:396:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char b[MAX_SPINNER_WIDTH + 2];
data/alpine-2.24+dfsg1/alpine/busy.c:440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char progress[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/colorconf.c:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  tmp[1200];
data/alpine-2.24+dfsg1/alpine/colorconf.c:659:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char tmp[2000];
data/alpine-2.24+dfsg1/alpine/colorconf.c:754:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	     tmp[100+1];
data/alpine-2.24+dfsg1/alpine/colorconf.c:828:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	    tmp[100+1];
data/alpine-2.24+dfsg1/alpine/colorconf.c:1069:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[256];
data/alpine-2.24+dfsg1/alpine/colorconf.c:1085:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *starting_val, *val, tmp[100], ***alval, **apval;
data/alpine-2.24+dfsg1/alpine/colorconf.c:1258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             prompt[100], sval[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/colorconf.c:2680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             tmp[1200+1], name[1200], *p;
data/alpine-2.24+dfsg1/alpine/confscroll.c:225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[100];
data/alpine-2.24+dfsg1/alpine/confscroll.c:467:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	  tmp[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/confscroll.c:1058:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     char *p, last[64];
data/alpine-2.24+dfsg1/alpine/confscroll.c:1557:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	     prompt[81], *sval, *tmp, *swap_val, **newval = NULL;
data/alpine-2.24+dfsg1/alpine/confscroll.c:1714:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmpval[101];
data/alpine-2.24+dfsg1/alpine/confscroll.c:1922:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char tmpval[101];
data/alpine-2.24+dfsg1/alpine/confscroll.c:1946:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		      numval = atoi(sval);
data/alpine-2.24+dfsg1/alpine/confscroll.c:1949:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			numval = atoi(pval);
data/alpine-2.24+dfsg1/alpine/confscroll.c:1975:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		      numval = atoi(sval);
data/alpine-2.24+dfsg1/alpine/confscroll.c:1978:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			numval = atoi(pval);
data/alpine-2.24+dfsg1/alpine/confscroll.c:2010:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char pmt[80];
data/alpine-2.24+dfsg1/alpine/confscroll.c:2024:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char pmt[80];
data/alpine-2.24+dfsg1/alpine/confscroll.c:2290:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    numval = atoi(sval);
data/alpine-2.24+dfsg1/alpine/confscroll.c:2311:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    numval = atoi(sval);
data/alpine-2.24+dfsg1/alpine/confscroll.c:3754:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    line[500];
data/alpine-2.24+dfsg1/alpine/confscroll.c:3848:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  tmp[6*MAX_SCREEN_COLS+20], *pvalnorm, **lvalnorm, *pvalexc, **lvalexc;
data/alpine-2.24+dfsg1/alpine/confscroll.c:4054:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             tmp[6*MAXPATH];
data/alpine-2.24+dfsg1/alpine/confscroll.c:4133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  tmp[6*MAXPATH], *pvalnorm, *pvalexc;
data/alpine-2.24+dfsg1/alpine/confscroll.c:4223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  tmp[6*MAXPATH];
data/alpine-2.24+dfsg1/alpine/confscroll.c:4331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             tmp[6*MAXPATH];
data/alpine-2.24+dfsg1/alpine/confscroll.c:4373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  tmp[6*MAXPATH];
data/alpine-2.24+dfsg1/alpine/confscroll.c:4874:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             prompt[300];
data/alpine-2.24+dfsg1/alpine/confscroll.c:5738:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	score = atoi(var->current_val.p);
data/alpine-2.24+dfsg1/alpine/conftype.h:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   char	      address[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/context.c:579:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      prompt[256];
data/alpine-2.24+dfsg1/alpine/context.c:726:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            *raw_ctxt, tpath[MAILTMPLEN], *p, **lval;
data/alpine-2.24+dfsg1/alpine/context.c:789:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/dispfilt.c:62:49:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if((cmd = expand_filter_tokens(rawcmd,NULL,&tmpfile,&resultf,NULL,&key,NULL, &silent)) != NULL){
data/alpine-2.24+dfsg1/alpine/dispfilt.c:79:5:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	if(tmpfile){
data/alpine-2.24+dfsg1/alpine/dispfilt.c:87:37:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	    if((tmpf_so = so_get(FileStar, tmpfile, WRITE_ACCESS|OWNER_ONLY|WRITE_TO_LOCALE)) != NULL){
data/alpine-2.24+dfsg1/alpine/dispfilt.c:110:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
			    if((fp = our_fopen(tmpfile, "rb")) != NULL){
data/alpine-2.24+dfsg1/alpine/dispfilt.c:131:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		our_unlink(tmpfile);
data/alpine-2.24+dfsg1/alpine/flagmaint.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	  tmp[1200], **p, *spacer;
data/alpine-2.24+dfsg1/alpine/flagmaint.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char keyword[500];
data/alpine-2.24+dfsg1/alpine/flagmaint.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nickname[500];
data/alpine-2.24+dfsg1/alpine/flagmaint.c:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[500];
data/alpine-2.24+dfsg1/alpine/folder.c:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	     first_folder[MAXFOLDER];
data/alpine-2.24+dfsg1/alpine/folder.c:283:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char	tmp[MAILTMPLEN], *p, *q;
data/alpine-2.24+dfsg1/alpine/folder.c:363:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char title[50], htitle[50];
data/alpine-2.24+dfsg1/alpine/folder.c:711:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path_in_context[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:800:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path_in_context[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:815:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char  tmp[MAX(MAILTMPLEN,NETMAXMBX)];
data/alpine-2.24+dfsg1/alpine/folder.c:910:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       servpart[MAILTMPLEN], new_cntxt[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:911:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       pathpart[MAILTMPLEN], allbutnick[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:912:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       tmp[MAILTMPLEN], *nick, *serv, *path, *view,
data/alpine-2.24+dfsg1/alpine/folder.c:914:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       nickpmt[100], servpmt[100], pathpmt[100], viewpmt[100];
data/alpine-2.24+dfsg1/alpine/folder.c:1147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     prompt[256], tmp[MAILTMPLEN], tmpnodel[MAILTMPLEN], *server, *path,
data/alpine-2.24+dfsg1/alpine/folder.c:1286:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char rbuf[20];
data/alpine-2.24+dfsg1/alpine/folder.c:1287:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[256];
data/alpine-2.24+dfsg1/alpine/folder.c:1483:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(&keys[0], fs->km->keys,
data/alpine-2.24+dfsg1/alpine/folder.c:1583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       lbuf[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/folder.c:1638:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[6*MAX_SCREEN_COLS + 1];
data/alpine-2.24+dfsg1/alpine/folder.c:1700:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[6*MAX_SCREEN_COLS + 1];
data/alpine-2.24+dfsg1/alpine/folder.c:1942:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      buf[256];
data/alpine-2.24+dfsg1/alpine/folder.c:2042:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/alpine-2.24+dfsg1/alpine/folder.c:2086:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/alpine-2.24+dfsg1/alpine/folder.c:2275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      tmp_output[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:2357:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char       new_file[2*MAXFOLDER+10];
data/alpine-2.24+dfsg1/alpine/folder.c:2427:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char       new_file[2*MAXFOLDER+10];
data/alpine-2.24+dfsg1/alpine/folder.c:2467:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char new_file[MAXFOLDER+1];
data/alpine-2.24+dfsg1/alpine/folder.c:2506:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char next_folder[MAILTMPLEN+1];
data/alpine-2.24+dfsg1/alpine/folder.c:2747:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char          mailbox_name[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/folder.c:2913:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       addname[MAXFOLDER+1];
data/alpine-2.24+dfsg1/alpine/folder.c:3524:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, oldir[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:3574:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[2*MAILTMPLEN], tmp2[2*MAILTMPLEN], *p;
data/alpine-2.24+dfsg1/alpine/folder.c:3633:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        expanded_file[MAILTMPLEN], *p,
data/alpine-2.24+dfsg1/alpine/folder.c:3867:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        filename[MAXPATH+1], full_filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/folder.c:3914:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char       newfolder[MAILTMPLEN], nmsgs[32];
data/alpine-2.24+dfsg1/alpine/folder.c:4038:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 tmp[MAX(MAXFOLDER,6*MAX_SCREEN_COLS)+1], nickname[32], 
data/alpine-2.24+dfsg1/alpine/folder.c:4052:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         mdmbox[MAILTMPLEN], ctmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:4064:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inbox_host[MAXPATH], *beg, *end = NULL;
data/alpine-2.24+dfsg1/alpine/folder.c:5060:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:5303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        *folder, prompt[64], *name_p = NULL;
data/alpine-2.24+dfsg1/alpine/folder.c:5575:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       *folder, ques_buf[MAX_SCREEN_COLS+1], *target = NULL,
data/alpine-2.24+dfsg1/alpine/folder.c:5893:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[256];
data/alpine-2.24+dfsg1/alpine/folder.c:5928:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	     pattern[MAILTMPLEN], type = '\0';
data/alpine-2.24+dfsg1/alpine/folder.c:5962:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	  tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:6104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	  tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:6142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	number[32], prompt[128];
data/alpine-2.24+dfsg1/alpine/folder.c:6162:24:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    else if((*count = atol(number)) < 0L)
data/alpine-2.24+dfsg1/alpine/folder.c:6242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	    msg_buf[MAX_BM+1];
data/alpine-2.24+dfsg1/alpine/folder.c:6385:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      prompt[128];
data/alpine-2.24+dfsg1/alpine/folder.c:6387:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/folder.c:6408:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char        msg_buf[MAX_BM+1];
data/alpine-2.24+dfsg1/alpine/folder.c:6543:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf1[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/folder.c:6596:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      tmp[200];
data/alpine-2.24+dfsg1/alpine/folder.c:6899:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN+1];
data/alpine-2.24+dfsg1/alpine/help.c:280:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&keys[0], help_keymenu.keys,
data/alpine-2.24+dfsg1/alpine/help.c:431:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[64];
data/alpine-2.24+dfsg1/alpine/help.c:451:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{char help_name[40];
data/alpine-2.24+dfsg1/alpine/help.c:507:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   *error, buf[256];
data/alpine-2.24+dfsg1/alpine/help.c:603:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/alpine-2.24+dfsg1/alpine/help.c:707:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            debugkeylabel[20];
data/alpine-2.24+dfsg1/alpine/help.c:1048:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         tmp[MAILTMPLEN], *p;
data/alpine-2.24+dfsg1/alpine/help.c:1321:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       buf[256+1];
data/alpine-2.24+dfsg1/alpine/imap.c:346:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[1024];
data/alpine-2.24+dfsg1/alpine/imap.c:395:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char prompt[1024];
data/alpine-2.24+dfsg1/alpine/imap.c:396:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char reply[1024];
data/alpine-2.24+dfsg1/alpine/imap.c:403:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(s, _("Please select below the authorization flow you would like to follow:"));
data/alpine-2.24+dfsg1/alpine/imap.c:404:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(s + strlen(s), _("Please select the client-id to use from the following list.\n\n"));
data/alpine-2.24+dfsg1/alpine/imap.c:408:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	       sprintf(s + strlen(s), " %d) %.70s\n", j++, oa2list->name);
data/alpine-2.24+dfsg1/alpine/imap.c:416:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         sel = atoi(reply);
data/alpine-2.24+dfsg1/alpine/imap.c:467:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:567:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[MAILTMPLEN], token[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:653:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:766:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[MAILTMPLEN], token[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:890:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      *token, tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:891:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      prompt[4*MAILTMPLEN], value[4*MAILTMPLEN], *last;
data/alpine-2.24+dfsg1/alpine/imap.c:892:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      defuser[NETMAXUSER];
data/alpine-2.24+dfsg1/alpine/imap.c:893:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      hostleadin[80], hostname[200], defubuf[200];
data/alpine-2.24+dfsg1/alpine/imap.c:894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      logleadin[80], pwleadin[50];
data/alpine-2.24+dfsg1/alpine/imap.c:1198:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(tmp, "%lu", SaveExpirationTime);
data/alpine-2.24+dfsg1/alpine/imap.c:1349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        message[sizeof(ps_global->c_client_error)];
data/alpine-2.24+dfsg1/alpine/imap.c:1458:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:1459:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      prompt[1000], *last;
data/alpine-2.24+dfsg1/alpine/imap.c:1460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      port[20], non_def_port[20], insecure[20];
data/alpine-2.24+dfsg1/alpine/imap.c:1461:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      defuser[NETMAXUSER];
data/alpine-2.24+dfsg1/alpine/imap.c:1462:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      hostleadin[80], hostname[200], defubuf[200];
data/alpine-2.24+dfsg1/alpine/imap.c:1463:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      logleadin[80], pwleadin[50];
data/alpine-2.24+dfsg1/alpine/imap.c:1464:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      hostlist0[MAILTMPLEN], hostlist1[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:2302:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char full_filename[MAXPATH+1], filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/imap.c:2344:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pmt[128];
data/alpine-2.24+dfsg1/alpine/imap.c:2497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      tmp[500];
data/alpine-2.24+dfsg1/alpine/imap.c:2676:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:2748:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buf[500], buf2[500];
data/alpine-2.24+dfsg1/alpine/imap.c:3008:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char token[MAILTMPLEN], prompt[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:3240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *ui[5];
data/alpine-2.24+dfsg1/alpine/imap.c:3282:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		blob = (char *) pcred[k]->CredentialBlob;
data/alpine-2.24+dfsg1/alpine/imap.c:3301:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    flags = sflags ? atoi(tmp ? ++tmp : sflags) : 0;
data/alpine-2.24+dfsg1/alpine/imap.c:3332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  target[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:3334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *ui[5];
data/alpine-2.24+dfsg1/alpine/imap.c:3453:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			flags = sflags ? atoi(tmp ? ++tmp : sflags) : 0;
data/alpine-2.24+dfsg1/alpine/imap.c:3497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  tmp[MAILTMPLEN], *ui[5];
data/alpine-2.24+dfsg1/alpine/imap.c:3503:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp2[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:3648:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    int	  flags = ui[3] ? atoi(s ? ++s : ui[3]) : 0;
data/alpine-2.24+dfsg1/alpine/imap.c:3685:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  target[10*MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:3686:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  blob[10*MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:3704:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(blob, "%d", l->altflag);
data/alpine-2.24+dfsg1/alpine/imap.c:3736:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  target[10*MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:3737:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  blob[10*MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:3754:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(blob, "%d", l->altflag);
data/alpine-2.24+dfsg1/alpine/imap.c:3804:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  tmp[10*MAILTMPLEN], blob[10*MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/imap.c:3837:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(blob, "%d", l->altflag);
data/alpine-2.24+dfsg1/alpine/imap.c:4056:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/init.c:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 tmp[50], **p;
data/alpine-2.24+dfsg1/alpine/init.c:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         path2[MAXPATH+1],  prompt[128], tmp[21];
data/alpine-2.24+dfsg1/alpine/init.c:362:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  prompt[150];
data/alpine-2.24+dfsg1/alpine/kblock.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char inpasswd[80], passwd[80], pw[80];
data/alpine-2.24+dfsg1/alpine/kblock.c:104:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    times = atoi(ps->VAR_KBLOCK_PASSWD_COUNT);
data/alpine-2.24+dfsg1/alpine/kblock.c:117:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char prompt[50];
data/alpine-2.24+dfsg1/alpine/keymenu.c:2976:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		 keystr[6*MAX_KEYNAME + 6*MAX_LABEL + 2];
data/alpine-2.24+dfsg1/alpine/keymenu.c:3049:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  temp[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/keymenu.c:3050:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  temp2[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/keymenu.c:3051:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  this_label[6*MAX_LABEL+1];
data/alpine-2.24+dfsg1/alpine/keymenu.c:3103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp_label[6*MAX_LABEL+1];
data/alpine-2.24+dfsg1/alpine/keymenu.c:3411:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(km->bitmap, bm, BM_SIZE);
data/alpine-2.24+dfsg1/alpine/keymenu.c:3468:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp_label[6*MAX_LABEL+1];
data/alpine-2.24+dfsg1/alpine/keymenu.c:3487:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp_label[6*MAX_LABEL+1];
data/alpine-2.24+dfsg1/alpine/keymenu.c:3691:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(km_state.bitmap, bitmap, BM_SIZE);
data/alpine-2.24+dfsg1/alpine/keymenu.c:4014:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     prename[100];
data/alpine-2.24+dfsg1/alpine/keymenu.c:4015:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     namepart[100];
data/alpine-2.24+dfsg1/alpine/keymenu.c:4016:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     labelpart[100];
data/alpine-2.24+dfsg1/alpine/ldapconf.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ee[200];
data/alpine-2.24+dfsg1/alpine/ldapconf.c:374:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char tmp[200];
data/alpine-2.24+dfsg1/alpine/ldapconf.c:923:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     tmp[200];
data/alpine-2.24+dfsg1/alpine/ldapconf.c:1171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            tmp[MAXPATH+1], custom_scope[MAXPATH], **apval;
data/alpine-2.24+dfsg1/alpine/ldapconf.c:1808:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir_tmp[2200], *p;
data/alpine-2.24+dfsg1/alpine/ldapconf.c:1881:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      portval = atoi(port);
data/alpine-2.24+dfsg1/alpine/ldapconf.c:1903:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      timeval = atoi(ttime);
data/alpine-2.24+dfsg1/alpine/ldapconf.c:1909:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      sizeval = atoi(ssize);
data/alpine-2.24+dfsg1/alpine/ldapconf.c:2058:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    prompt[81];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:359:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prompt[128];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:426:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         *newfolder, prompt[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:699:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char nextfolder[MAXPATH];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:1063:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	    nextfolder[MAXPATH];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:1125:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		     char *front, type[80], cnt[CNTLEN], fbuf[MAX_SCREEN_COLS/2+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:1586:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char  buf[10];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:1716:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	  *flagit, *seq, *screen_text[20], **exp, **p, *answer = NULL;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:1717:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          *keyword_array[2];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:2477:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	      newfolder[MAILTMPLEN], nmsgs[32], *nick;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:2764:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	      prompt[6*MAX_SCREEN_COLS+1], *p, expanded[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:2766:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              shortbuf[200];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:2991:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	   tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:3259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:3449:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  prompt_b[MAX_SCREEN_COLS+1], temp[MAILTMPLEN+1], buff[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:3493:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[100];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:3587:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      filename[MAXPATH+1], full_filename[MAXPATH+1], *err;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:3588:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      nmsgs[80];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:3700:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     cmd[MAXPATH], *tfp = NULL;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:3842:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char dir[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:3843:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char  lfile[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4052:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     filename[MAXPATH+1], full_filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      dir[MAXPATH+1], dir2[MAXPATH+1], orig_dir[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      precolon[MAXPATH+1], postcolon[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      filename2[MAXPATH+1], tmp[MAXPATH+1], *fn, *ill;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4221:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      prompt_buf[400];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4222:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      def[500];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4377:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirb[50], fileb[50];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:4379:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *p, p1[100], p2[100], *p3, p4[100], p5[100];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     jump_num_string[80], *j, prompt[70];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5189:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char warning[100];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char warning[100];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5233:16:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		  jump_num = atol(jump_num_string);
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5289:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char nextfolder[MAXPATH];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5378:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char        pmt[128];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5444:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     debug_num_string[80], *j, prompt[70];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5452:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	debug_num = atol(debug_num_string);
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5487:15:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		debug_num = atol(debug_num_string);
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5524:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5607:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char newfolder[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5608:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        expanded[MAXPATH+1],
data/alpine-2.24+dfsg1/alpine/mailcmd.c:5848:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	   tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:6202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:6223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      prompt[250];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:6236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m[10];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:6378:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           pipe_command[MAXPATH];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:6701:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      *h, *hdrs[MLCMD_COUNT + 1];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:7390:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[80];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:7663:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char number1[16], number2[16], numbers[80], *p, *t;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:7739:16:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	else if((n1 = atol(number1)) < 1L || n1 > mn_get_total(msgmap)){
data/alpine-2.24+dfsg1/alpine/mailcmd.c:7779:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    else if((n2 = atol(number2)) < 1L || n2 > mn_get_total(msgmap)){
data/alpine-2.24+dfsg1/alpine/mailcmd.c:7787:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char t[20];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:7834:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char number1[16], number2[16], numbers[80], *p, *t;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:7913:16:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	else if((n1 = atol(number1)) < 1L || n1 > msgmap->max_thrdno){
data/alpine-2.24+dfsg1/alpine/mailcmd.c:7956:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    else if((n2 = atol(number2)) < 1L || n2 > msgmap->max_thrdno){
data/alpine-2.24+dfsg1/alpine/mailcmd.c:7964:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char t[20];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:8008:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       date[100], defdate[100], prompt[128];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:8074:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char seq[20];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:8200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         tmp[128];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:8201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         namehdr[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:8270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         sstring[80], tmp[128];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:8272:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         buftmp[MAILTMPLEN], namehdr[80];
data/alpine-2.24+dfsg1/alpine/mailcmd.c:8603:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       size[16], numbers[80], *p, *t;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:8848:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       rulenick[1000], *nick;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:9041:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       keyword[MAXUSERFLAG+1], *kword;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:9337:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf[1024], *folded;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:9600:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      prompt[200], tmp[3], *p;
data/alpine-2.24+dfsg1/alpine/mailcmd.c:9841:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buf[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/mailindx.c:394:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char        db[200];
data/alpine-2.24+dfsg1/alpine/mailindx.c:1648:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        draw[MAX_SCREEN_COLS*6+1], *p;
data/alpine-2.24+dfsg1/alpine/mailindx.c:2959:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        prompt[MAX_SEARCH+50], new_string[MAX_SEARCH+1];
data/alpine-2.24+dfsg1/alpine/mailindx.c:2960:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf[MAX_SCREEN_COLS+1], *p;
data/alpine-2.24+dfsg1/alpine/mailindx.c:2962:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        search_string[MAX_SEARCH+1];
data/alpine-2.24+dfsg1/alpine/mailindx.c:3664:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              title[GETTEXT_TITLELEN+1];
data/alpine-2.24+dfsg1/alpine/mailpart.c:300:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char numbuf[50];
data/alpine-2.24+dfsg1/alpine/mailpart.c:301:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char description[1000];
data/alpine-2.24+dfsg1/alpine/mailpart.c:317:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buftmp[1000];
data/alpine-2.24+dfsg1/alpine/mailpart.c:734:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     static char last[64], tmp[64];
data/alpine-2.24+dfsg1/alpine/mailpart.c:1138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cbuf[MAXCOLORLEN+1];
data/alpine-2.24+dfsg1/alpine/mailpart.c:1303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	filename[MAXPATH+1], full_filename[MAXPATH+1],
data/alpine-2.24+dfsg1/alpine/mailpart.c:1366:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     cmd[MAXPATH], *tfp = NULL;
data/alpine-2.24+dfsg1/alpine/mailpart.c:1371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     prompt_buf[256];
data/alpine-2.24+dfsg1/alpine/mailpart.c:1454:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       *l_string, sbuf[256], *err;
data/alpine-2.24+dfsg1/alpine/mailpart.c:1578:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	  newfolder[MAILTMPLEN], *save_folder, *flags = NULL;
data/alpine-2.24+dfsg1/alpine/mailpart.c:1579:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          date[64], nmsgs[80];
data/alpine-2.24+dfsg1/alpine/mailpart.c:1643:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 newfolder[MAILTMPLEN], *save_folder,
data/alpine-2.24+dfsg1/alpine/mailpart.c:1738:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      filename[MAXPATH+1], full_filename[MAXPATH+1], *err;
data/alpine-2.24+dfsg1/alpine/mailpart.c:1816:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      filename[MAXPATH+1], full_filename[MAXPATH+1], *err = NULL;
data/alpine-2.24+dfsg1/alpine/mailpart.c:1909:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[250];
data/alpine-2.24+dfsg1/alpine/mailpart.c:2002:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    dir_path[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/mailpart.c:2076:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_buf[128];
data/alpine-2.24+dfsg1/alpine/mailpart.c:2164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     sender_filename[1000];
data/alpine-2.24+dfsg1/alpine/mailpart.c:2170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     prefix[70];
data/alpine-2.24+dfsg1/alpine/mailpart.c:2171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     ext[32];
data/alpine-2.24+dfsg1/alpine/mailpart.c:2172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     mtype[128];
data/alpine-2.24+dfsg1/alpine/mailpart.c:2245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[256];
data/alpine-2.24+dfsg1/alpine/mailpart.c:2348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_buf[128];
data/alpine-2.24+dfsg1/alpine/mailpart.c:3319:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf1[100], *folded;
data/alpine-2.24+dfsg1/alpine/mailpart.c:3379:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buftmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/mailpart.c:4023:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     pipe_command[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/mailpart.c:4375:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     prefix[8];
data/alpine-2.24+dfsg1/alpine/mailview.c:510:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/mailview.c:723:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[256], tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/mailview.c:874:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char tmp[128];
data/alpine-2.24+dfsg1/alpine/mailview.c:1492:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*cmdp, *p, cmd[URL_MAX_LAUNCH + 4];
data/alpine-2.24+dfsg1/alpine/mailview.c:2050:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char folder[2*MAILTMPLEN], *group;
data/alpine-2.24+dfsg1/alpine/mailview.c:2094:27:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	       && (article_num = atol(&group[group_len]))){
data/alpine-2.24+dfsg1/alpine/mailview.c:2122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       folder[MAILTMPLEN], *p;
data/alpine-2.24+dfsg1/alpine/mailview.c:2279:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     *p, *hdrp, *hdrs[MLCMD_COUNT + 1],
data/alpine-2.24+dfsg1/alpine/mailview.c:2423:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bitmap, sparms->keys.bitmap, sizeof(bitmap_t));
data/alpine-2.24+dfsg1/alpine/mailview.c:2569:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bitmap, sparms->keys.bitmap, sizeof(bitmap_t));
data/alpine-2.24+dfsg1/alpine/mailview.c:3632:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[64];
data/alpine-2.24+dfsg1/alpine/mailview.c:3706:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        prompt[MAX_SEARCH+50], nsearch_string[MAX_SEARCH+1], *p;
data/alpine-2.24+dfsg1/alpine/mailview.c:3710:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char search_string[MAX_SEARCH+1];
data/alpine-2.24+dfsg1/alpine/mailview.c:3870:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cbuf[MAXCOLORLEN+1];
data/alpine-2.24+dfsg1/alpine/mailview.c:4606:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *ngp, tmp[MAILTMPLEN+10];
data/alpine-2.24+dfsg1/alpine/mailview.c:4659:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *ngp, tmp[MAILTMPLEN+10];
data/alpine-2.24+dfsg1/alpine/mailview.c:4727:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            *ngp, *ngname, handle_str[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/mailview.c:4899:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  buf[1000];
data/alpine-2.24+dfsg1/alpine/mailview.c:5086:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[512], *msg_p[4];
data/alpine-2.24+dfsg1/alpine/mailview.c:5179:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char     title_buf[64];
data/alpine-2.24+dfsg1/alpine/mailview.c:5565:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	  message[64];
data/alpine-2.24+dfsg1/alpine/newmail.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      subject[MAILTMPLEN+1], subjtext[MAILTMPLEN+1], from[MAILTMPLEN+1],
data/alpine-2.24+dfsg1/alpine/newmail.c:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_SCREEN_COLS+1], buf2[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/newmail.c:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf3[MAX_SCREEN_COLS+1], buf4[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/newuser.c:125:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&keys[0], nuov_keymenu.keys,
data/alpine-2.24+dfsg1/alpine/osdep/chnge_pw.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd_buf[100];
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nbuf[5];
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char newfname[MAXPATH+1], filename[MAXPATH+1], *dfile = NULL;
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:103:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fd = open(filename, O_TRUNC|O_RDWR|O_CREAT, 0600)) >= 0)
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rev[128];
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:155:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nbuf[5], crashfile[MAXPATH+1], filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  cstr[256];
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:217:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  buf[1025];
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:317:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char b[64000];
data/alpine-2.24+dfsg1/alpine/osdep/debuging.c:359:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       quotes[3], tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/osdep/execview.c:391:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/alpine-2.24+dfsg1/alpine/osdep/fltrname.c:57:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char error[ERRORLEN];
data/alpine-2.24+dfsg1/alpine/osdep/fltrname.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ill_file[MAXPATH+1], *ill_char, *ptr, e2[20];
data/alpine-2.24+dfsg1/alpine/osdep/print.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char command[201], prompt[200];
data/alpine-2.24+dfsg1/alpine/osdep/print.c:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aname[100], wname[100];
data/alpine-2.24+dfsg1/alpine/osdep/print.c:471:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char obuf[MAX(MB_LEN_MAX,32)];
data/alpine-2.24+dfsg1/alpine/osdep/print.c:523:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64000];
data/alpine-2.24+dfsg1/alpine/osdep/termin.gen.c:92:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char utf8buf[7];
data/alpine-2.24+dfsg1/alpine/osdep/termin.gen.c:1104:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char inputbuf[20];
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:333:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[PUTLINE_BUFLEN];
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[PUTLINE_BUFLEN];
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:375:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[PUTLINE_BUFLEN];
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[PUTLINE_BUFLEN];
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:420:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[PUTLINE_BUFLEN];
data/alpine-2.24+dfsg1/alpine/osdep/termout.gen.c:519:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static   unsigned char  cbuf[6];
data/alpine-2.24+dfsg1/alpine/osdep/termout.unx.c:774:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char obuf[MAX(MB_LEN_MAX,32)];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fontName[LF_FACESIZE+1];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fontSize[12];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fontStyle[64];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        fontCharSet[256];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:204:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	windowPosition[32], windowPositionReg[32];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:205:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	foreColor[64], backColor[64];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:207:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	cursorStyle[32];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:679:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *tstrlist[2];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:962:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR tcbuf[1024];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:1282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2*MAXPATH+1], *p;
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:1285:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR tcbuf[TCBUFLEN+1];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:1318:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char srvbuf[MAXPATH+1], tuser[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:1461:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char tsrvr[4*MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:1697:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		TCHAR fn[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:1730:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		TCHAR lptstr_buf[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/osdep/termout.wnt.c:1804:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		TCHAR lptstr_fn[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/pine-use.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        filename[100], buf[100], *p;
data/alpine-2.24+dfsg1/alpine/pine-use.c:60:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        core_id = atoi(argv[1]);
data/alpine-2.24+dfsg1/alpine/pine-use.c:66:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            core = fopen("pine-core-collect.sh", "w");
data/alpine-2.24+dfsg1/alpine/pine-use.c:109:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if((f = fopen(filename, "r")) != NULL) {
data/alpine-2.24+dfsg1/alpine/pine-use.c:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[20480];
data/alpine-2.24+dfsg1/alpine/pine-use.c:169:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(buf, "r");
data/alpine-2.24+dfsg1/alpine/pipe.c:137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    err[200];
data/alpine-2.24+dfsg1/alpine/print.c:578:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char aname[100], wname[100];
data/alpine-2.24+dfsg1/alpine/print.c:713:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	     prompt[81], sval[MAXPATH+1], name[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/print.c:918:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char pmt[80];
data/alpine-2.24+dfsg1/alpine/radio.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rep[WANT_TO_BUF], *p;
data/alpine-2.24+dfsg1/alpine/remote.c:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      tmp[2000];
data/alpine-2.24+dfsg1/alpine/remote.c:264:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         path[MAXPATH], pinerc_dir[MAXPATH];
data/alpine-2.24+dfsg1/alpine/reply.c:755:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            prompt[80], *prompt_fodder;
data/alpine-2.24+dfsg1/alpine/reply.c:846:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[100];
data/alpine-2.24+dfsg1/alpine/reply.c:938:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[80];
data/alpine-2.24+dfsg1/alpine/reply.c:1181:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[64];
data/alpine-2.24+dfsg1/alpine/reply.c:2085:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     sig_path[MAXPATH+1], errbuf[2000], *errstr = NULL;
data/alpine-2.24+dfsg1/alpine/reply.c:2277:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char datebuf[200];
data/alpine-2.24+dfsg1/alpine/roleconf.c:283:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         title[100];
data/alpine-2.24+dfsg1/alpine/roleconf.c:469:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        *s, title[100], specific_fldr[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/roleconf.c:684:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char msg[60];
data/alpine-2.24+dfsg1/alpine/roleconf.c:853:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   buf[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/roleconf.c:961:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      title[80];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1029:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char title[80];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1030:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char add[80];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1085:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      exitpmt[80];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        title[80];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1295:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        title[80];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        title[80];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1542:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[80];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1543:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[100];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1671:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     tmp[200];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1880:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        filename[MAXPATH+1], full_filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/roleconf.c:1881:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        dir2[MAXPATH+1], pdir[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/roleconf.c:2049:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        prompt[100];
data/alpine-2.24+dfsg1/alpine/roleconf.c:2563:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   {char tmp[MAXPATH+1];						\
data/alpine-2.24+dfsg1/alpine/roleconf.c:2632:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   {char tmp[MAXPATH+1];						\
data/alpine-2.24+dfsg1/alpine/roleconf.c:2791:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             tmp[MAXPATH+1], **apval, **lval, ***alval, *p;
data/alpine-2.24+dfsg1/alpine/roleconf.c:2794:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             mstr[50];
data/alpine-2.24+dfsg1/alpine/roleconf.c:2907:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/roleconf.c:5356:37:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      (*result)->patgrp->cat_lim = atol(cat_lim);
data/alpine-2.24+dfsg1/alpine/roleconf.c:5718:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if(score_act && (j = atoi(score_act)) >= SCORE_MIN && j <= SCORE_MAX)
data/alpine-2.24+dfsg1/alpine/roleconf.c:5953:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    tmp[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/roleconf.c:6006:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    tmp[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/roleconf.c:6184:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char    *str, *astr, *lc, pdir[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/roleconf.c:6324:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       *cur_fn, wt_res, prompt[MAX_SCREEN_COLS];
data/alpine-2.24+dfsg1/alpine/roleconf.c:6327:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        nbuf1[MAX_SCREEN_COLS], nbuf2[MAX_SCREEN_COLS];
data/alpine-2.24+dfsg1/alpine/roleconf.c:6451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      name[MAILTMPLEN], nname[32];
data/alpine-2.24+dfsg1/alpine/roleconf.c:6452:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      nbuf1[MAX_SCREEN_COLS], nbuf2[MAX_SCREEN_COLS];
data/alpine-2.24+dfsg1/alpine/roleconf.c:6453:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      prompt[MAX_SCREEN_COLS];
data/alpine-2.24+dfsg1/alpine/roleconf.c:7124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *file, *err, title[20], *newfile, *lc, *addr, *fldr = NULL, *tmpfldr;
data/alpine-2.24+dfsg1/alpine/roleconf.c:7125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  dir2[MAXPATH+1], pdir[MAXPATH+1], *p;
data/alpine-2.24+dfsg1/alpine/roleconf.c:7126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  full_filename[MAXPATH+1], filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/roleconf.c:7127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  tmp[MAXPATH+1], **spec_fldr, **apval;
data/alpine-2.24+dfsg1/alpine/roleconf.c:7606:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char prompt[60];
data/alpine-2.24+dfsg1/alpine/rpdump.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf[10000];
data/alpine-2.24+dfsg1/alpine/rpdump.c:126:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    if(((fd = open(local, O_CREAT|O_EXCL|O_WRONLY,0600)) < 0)
data/alpine-2.24+dfsg1/alpine/rpdump.c:170:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fp = fopen(local, "w")) == NULL){
data/alpine-2.24+dfsg1/alpine/rpdump.c:555:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[100], *last, tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/rpdump.c:803:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rep[1000], *p;
data/alpine-2.24+dfsg1/alpine/rpload.c:143:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fp = fopen(local, "r")) == NULL){
data/alpine-2.24+dfsg1/alpine/rpload.c:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sequence[20];
data/alpine-2.24+dfsg1/alpine/rpload.c:441:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *trimsize = atoi(str);
data/alpine-2.24+dfsg1/alpine/rpload.c:493:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          buf[20000];
data/alpine-2.24+dfsg1/alpine/rpload.c:559:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          buf[20000], *sto, *p;
data/alpine-2.24+dfsg1/alpine/rpload.c:643:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sequence[20];
data/alpine-2.24+dfsg1/alpine/rpload.c:663:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      date[200], vers[10];
data/alpine-2.24+dfsg1/alpine/rpload.c:794:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[100], *last, tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/send.c:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	     file_path[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/send.c:324:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char     prompt[80];
data/alpine-2.24+dfsg1/alpine/send.c:325:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 	char     letters[30];
data/alpine-2.24+dfsg1/alpine/send.c:469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	     file_path[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/send.c:1047:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     **tobufp, *p, tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/send.c:1127:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(tmp, _("FORWARD (as e-mail) to : "));
data/alpine-2.24+dfsg1/alpine/send.c:1332:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char dsn_string[30];
data/alpine-2.24+dfsg1/alpine/send.c:1597:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char label[50];
data/alpine-2.24+dfsg1/alpine/send.c:1932:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[200], news_group[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/send.c:3151:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char       folder[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/send.c:3153:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char       label[50];
data/alpine-2.24+dfsg1/alpine/send.c:3238:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  char filename[MAXPATH+1], newfname[MAXPATH+1], nbuf[5];
data/alpine-2.24+dfsg1/alpine/send.c:3355:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char uidbuf[MAILTMPLEN], *p;
data/alpine-2.24+dfsg1/alpine/send.c:3393:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char curposbuf[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/send.c:3913:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			    char label[50];
data/alpine-2.24+dfsg1/alpine/send.c:4008:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char label[50];
data/alpine-2.24+dfsg1/alpine/send.c:4372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  fbuf[MAILTMPLEN+1];
data/alpine-2.24+dfsg1/alpine/send.c:4512:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       dsn_string[30];
data/alpine-2.24+dfsg1/alpine/send.c:5177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     cmd[MAXPATH+1], *fnp = NULL;
data/alpine-2.24+dfsg1/alpine/send.c:5440:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char  buf[MAILTMPLEN], *s;
data/alpine-2.24+dfsg1/alpine/send.c:6368:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/send.c:6495:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/send.c:6565:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/send.c:6838:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/send.c:6931:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        prompt[100], answer[80];
data/alpine-2.24+dfsg1/alpine/setup.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	    tmp[MAXPATH+1], *pval, **lval;
data/alpine-2.24+dfsg1/alpine/setup.c:619:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             new_inbox_path[2*MAXFOLDER+1];
data/alpine-2.24+dfsg1/alpine/setup.c:1057:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char vbuf[100];
data/alpine-2.24+dfsg1/alpine/setup.c:1100:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char fbuf[100];
data/alpine-2.24+dfsg1/alpine/setup.c:1125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *p, gbuf[100];
data/alpine-2.24+dfsg1/alpine/signal.c:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/alpine-2.24+dfsg1/alpine/signal.c:264:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[80];
data/alpine-2.24+dfsg1/alpine/signal.c:394:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        c, *mbox, mboxbuf[20];
data/alpine-2.24+dfsg1/alpine/smime.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[500];
data/alpine-2.24+dfsg1/alpine/smime.c:373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    buf[256];
data/alpine-2.24+dfsg1/alpine/smime.c:424:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char iobuf[4096];
data/alpine-2.24+dfsg1/alpine/smime.c:484:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char space[256];
data/alpine-2.24+dfsg1/alpine/smime.c:490:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char buf[256];
data/alpine-2.24+dfsg1/alpine/smime.c:553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/alpine-2.24+dfsg1/alpine/smime.c:584:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    buf_l[256];
data/alpine-2.24+dfsg1/alpine/smime.c:585:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    buf_r[256];
data/alpine-2.24+dfsg1/alpine/smime.c:758:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            tmp[200];
data/alpine-2.24+dfsg1/alpine/smime.c:1112:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char  path[MAXPATH];
data/alpine-2.24+dfsg1/alpine/smime.c:1181:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  unsigned char ch[2];
data/alpine-2.24+dfsg1/alpine/smime.c:1280:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char pathdir[MAXPATH+1], filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/smime.c:1301:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(filename, ".crt");
data/alpine-2.24+dfsg1/alpine/smime.c:1337:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/smime.c:1338:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char passwd[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/smime.c:1339:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char prompt[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/smime.c:1513:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     tmp[200];
data/alpine-2.24+dfsg1/alpine/smime.c:1520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[MAXPATH+1];
data/alpine-2.24+dfsg1/alpine/smime.c:1570:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char u[MAILTMPLEN], *t;
data/alpine-2.24+dfsg1/alpine/smime.c:1640:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            tmp[200];
data/alpine-2.24+dfsg1/alpine/smime.c:1685:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char u[MAILTMPLEN], *t;
data/alpine-2.24+dfsg1/alpine/status.c:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   prevstatusbuf[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/status.c:571:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char   buf[1000];
data/alpine-2.24+dfsg1/alpine/status.c:868:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char newstatusbuf[6*MAX_SCREEN_COLS + 1];
data/alpine-2.24+dfsg1/alpine/status.c:1281:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         edit_buf[MAX_NICKNAME + 1];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:292:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     new_fullname[6*MAX_FULLNAME + 1], new_address[6*MAX_ADDRESS + 1];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:306:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char old_fullname[6*MAX_FULLNAME + 1];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(save_jmp_buf, addrbook_changed_unexpectedly, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/takeaddr.c:432:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrbook_changed_unexpectedly, save_jmp_buf, sizeof(jmp_buf));
data/alpine-2.24+dfsg1/alpine/takeaddr.c:460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          new_nickname[6*MAX_NICKNAME + 1], exist_nick[6*MAX_NICKNAME + 1];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:461:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          prompt[200], **p;
data/alpine-2.24+dfsg1/alpine/takeaddr.c:952:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       addrbook[MAX_ABOOK + 1],
data/alpine-2.24+dfsg1/alpine/takeaddr.c:1020:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char capcmd[50];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:1194:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char tbuf[40];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:1557:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char last[MAX_SEARCH+1];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:1722:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   buf1[6*MAX_SCREEN_COLS + 30];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:1723:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   buf2[6*MAX_SCREEN_COLS + 30];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:2043:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[200];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:2077:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           warn[2][MAX_NICKNAME+1];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:2078:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           tmp[OURTMPBUFLEN];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:2197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char abuf[MAX_ADDRESS + 1];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:2418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char capcmd[CAPCMDLEN];
data/alpine-2.24+dfsg1/alpine/takeaddr.c:3154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  buf[MAILTMPLEN+1];
data/alpine-2.24+dfsg1/alpine/titlebar.c:423:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    version[50], fold_tmp[6*MAXPATH+1], *titlebar_line,
data/alpine-2.24+dfsg1/alpine/titlebar.c:920:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf[50];
data/alpine-2.24+dfsg1/alpine/titlebar.c:1099:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf[50];
data/alpine-2.24+dfsg1/alpine/titlebar.c:1144:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char percent[4];
data/alpine-2.24+dfsg1/alpine/titlebar.h:27:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       titlebar_line[6*MAX_SCREEN_COLS+1];
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[1024];
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reply[1024];
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:190:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(s + strlen(s), _("Please select the client-id to use from the following list.\n\n"));
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:192:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(s + strlen(s), " %d) %.70s\n", i+1, xinfo[i]->client_id);
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:202:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	   sel = atoi(reply) - 1;
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:211:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[1024];
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:606:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[1024], tmp2[16];
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:608:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(tmp2, "%d", key);
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:788:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	    tmp[MAXPATH+1], *pval, **lval, ***alval;
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:945:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		{char service[MAILTMPLEN+1];
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:946:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char prompt[MAILTMPLEN+1];
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:984:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  char question[MAILTMPLEN];
data/alpine-2.24+dfsg1/alpine/xoauth2conf.c:995:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		   key = atoi(varlist[i]->dname);	/* this hack avoids we rebuild varlist again */
data/alpine-2.24+dfsg1/imap/src/ansilib/memmove.c:38:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  bcopy (ct,s,n);		/* they should have this one */
data/alpine-2.24+dfsg1/imap/src/ansilib/memmove2.c:43:61:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      ((dest > src) && ((src + n) < dest))) return (void *) memcpy (s,ct,n);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_bea.c:115:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ports[10];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_bea.c:119:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(ports, "%lu", port);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:207:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (tmp,resp.value,4);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:324:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:368:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (resp.value = tmp,(void *) &maxsize,resp.length = 4);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_gss.c:378:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (tmp,chal.value,chal.length) &&
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:39:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[MD5BLKLEN];	/* input buffer */
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:116:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[128];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:117:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"%.65s %.33s",user,hmac_md5 (hshbuf,challenge,clen,
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *p,*u,*user,*authuser,*hash,chal[MAILTMPLEN],hshbuf[2*MD5DIGLEN + 1];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:196:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open (MD5ENABLE,O_RDONLY,NIL);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*authuser,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:242:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[MD5DIGLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:251:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"%.128s%.128s",chal,s);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:291:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[MD5DIGLEN],k_ipad[MD5BLKLEN+1],k_opad[MD5BLKLEN+1];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:299:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (k_ipad,key,kl);	/* store key in pads */
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:301:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (k_opad,k_ipad,MD5BLKLEN+1);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:379:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (ctx->ptr,data,i);	/* fill up 64 byte chunk */
data/alpine-2.24+dfsg1/imap/src/c-client/auth_md5.c:383:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (ctx->ptr,data,len);	/* copy final bit of data in buffer */
data/alpine-2.24+dfsg1/imap/src/c-client/auth_ntl.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_ntl.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ubuf[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/auth_ntl.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (ubuf, sep + 1, ulen);
data/alpine-2.24+dfsg1/imap/src/c-client/auth_ntl.c:86:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (ubuf + ulen + 1, user, dlen);
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:856:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(s + strlen(s), "%c", *t);
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:858:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(s + strlen(s), "%%%X", *t);
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:873:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(s + strlen(s), "%c", '+');
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:876:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(s + strlen(s), "%c", *t);
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:878:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(s + strlen(s), "%%%X", *t);
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:904:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(mb->service, "http");
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:1098:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char length[20];
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:1100:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(length, "%lu", strlen(req->body));
data/alpine-2.24+dfsg1/imap/src/c-client/http.c:1190:13:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     size = atol(stream->header->content_length->p->vp->value);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[IMAPTMPLEN];		/* temporary buffer */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:511:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,mbx[MAILTMPLEN],tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,prefix[MAILTMPLEN],mbx[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:693:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mbx[MAILTMPLEN],mbx2[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:739:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:759:30:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (flags & SA_MESSAGES) strcat (tmp," MESSAGES");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:760:28:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (flags & SA_RECENT) strcat (tmp," RECENT");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:761:28:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (flags & SA_UNSEEN) strcat (tmp," UNSEEN");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:762:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (flags & SA_UIDNEXT) strcat (tmp," UIDNEXT");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:763:33:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (flags & SA_UIDVALIDITY) strcat (tmp," UIDVALIDITY");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:822:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN],usr[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1005:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp + strlen (tmp),":%lu",i);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1006:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (tmp,"/imap");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1007:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->tlsflag) strcat (tmp,"/starttls");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1008:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->tls1) strcat (tmp,"/tls1");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1009:24:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->tls1_1) strcat (tmp,"/tls1_1");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1010:24:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->tls1_2) strcat (tmp,"/tls1_2");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1011:24:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->tls1_3) strcat (tmp,"/tls1_3");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1012:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->tlssslv23) strcat (tmp,"/tls-sslv23");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1013:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->notlsflag) strcat (tmp,"/nostarttls");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1014:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->sslflag) strcat (tmp,"/ssl");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1015:28:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->novalidate) strcat (tmp,"/novalidate-cert");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1016:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (LOCAL->loser) strcat (tmp,"/loser");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1017:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (stream->secure) strcat (tmp,"/secure");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1018:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (stream->rdonly) strcat (tmp,"/readonly");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1019:28:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (stream->anonymous) strcat (tmp,"/anonymous");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1063:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (tmp,"<no_mailbox>");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1088:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[2];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tag[16];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1132:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tag,"%08lx",0xffffffff & (stream->gensym++));
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[16];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1205:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tag,"%08lx",0xffffffff & (stream->gensym++));
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1249:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Can not authenticate to IMAP server: %.80s",lsterr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1255:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     if(!uasaved) sprintf (tmp,"Client does not support AUTH=%.80s authenticator",mb->auth);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1256:25:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     else if (!atsaved) sprintf (tmp,"IMAP server does not support AUTH=%.80s authenticator",mb->auth);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1328:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1341:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"IMAP SERVER BUG (invalid challenge): %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1495:25:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    if (last != start) sprintf (t,":%lu,%lu",last,i);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1496:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    else sprintf (t,",%lu",i);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1506:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (s,"%lu",start = last = i);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1512:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (last != start) sprintf (t,":%lu",last);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1547:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,seq[MAILTMPLEN],tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1564:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (s = seq,"%lu",msgno);/* initial sequence */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1623:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (s += strlen (s),",%lu",i++);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1627:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (s += strlen (s),",%lu:%lu",i,x);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1641:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (s += strlen (s),",%lu",i);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1651:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (s,",%lu",i);	/* append message */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1656:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  if (i != --j) sprintf (s + strlen (s),":%lu",i = j);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1670:51:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if (!elt->private.uid && LEVELIMAP4 (stream)) strcpy (tmp," UID");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1674:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (tmp," ENVELOPE");	/* yes, get it and possible extra poop */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1686:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (!elt->day) strcat (tmp," INTERNALDATE");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1687:28:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (!elt->rfc822_size) strcat (tmp," RFC822.SIZE");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1690:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (tmp," FLAGS)");	/* always get current flags */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1738:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *t,tmp[MAILTMPLEN],partial[40],seq[40];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1747:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (seq,"%lu:%lu",msgno,
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1782:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if (first || last) sprintf (partial,"<%lu.%lu>",first,last ? last:-1);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1813:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (tmp+(t-section),".0");
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1888:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	text.data = memcpy (fs_get (text.size+1),
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1963:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    text.data = memcpy (fs_get (text.size+1),elt->private.msg.text.text.data,
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1982:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,seq[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1991:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (seq,"%lu",msgno);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:1997:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (s,",%lu",i);	/* append message */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2002:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  if (i != --j) sprintf (s + strlen (s),":%lu",i = j);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2022:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seq[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2040:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (seq,"%lu",uid);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2198:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (s,"%lu",j = i);/* output message number */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2206:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (s,":%lu",i);	/* output delimiter and end of range */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2330:27:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      if (last != start) sprintf (t,":%lu,%lu",last,i);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2331:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      else sprintf (t,",%lu",i);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2341:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (s,"%lu",start = last = i);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2347:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if (last != start) sprintf (t,":%lu",last);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2515:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (s,"%lu",mail_uid (stream,j = i));
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2520:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (s,":%lu",mail_uid (stream,i));
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2595:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2668:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Can't access referral server: %.80s",mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2714:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2959:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2982:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(tmp,"ID value not found for name %.80s, at %.80s", ret->name, s);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:2989:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(tmp,"ID name \"%.80s\" has no value", ret->name);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,*t,tag[10];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3106:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tag,"%08lx",0xffffffff & (stream->gensym++));
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3126:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (s,"%lu",(unsigned long) arg->text);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3263:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char datetmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3308:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (s," %lu",list->text.size);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3388:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (*s,"{%lu}",i);	/* write literal count */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3440:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *t, s[MAILTMPLEN+1], u[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3499:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(v, "%d/%d/%d", BASEYEAR + (date >> 9),
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3506:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(v, "%d/%d/%d", BASEYEAR + (date >> 9),
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3513:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(v, "%d/%d/%d", BASEYEAR + (date >> 9),
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3520:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(v, "%d/%d/%d", BASEYEAR + (date >> 9),
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3526:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(v, "%dd", pgm->older/86400);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3531:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(v, "%dd", pgm->younger/86400);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3628:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf (t,"%lu",j = i);/* output message number */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3636:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf (t,":%lu",i); /* output delimiter and end of range */
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3688:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (*s," LARGER %lu",pgm->larger);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3692:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (*s," SMALLER %lu",pgm->smaller);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3725:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (*s," OLDER %lu",pgm->older);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3729:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (*s," YOUNGER %lu",pgm->younger);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3854:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (*s,"%lu",set->first);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3862:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (*s,"%lu",set->last);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3869:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (start," OR",3);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:3989:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Unexpected tagged response: %.80s %.80s %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4030:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Missing IMAP reply key: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4091:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"IMAP protocol error: %.80s",(char *) reply->text);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4094:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    else sprintf (LOCAL->tmp,"Unexpected IMAP response: %.80s %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4116:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Unexpected untagged message: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4163:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (LOCAL->tmp,"Bogus date: %.80s",(char *) s);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4191:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (LOCAL->tmp,"Body received for %lu but current is %lu",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4220:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (LOCAL->tmp,"Unterminated section: %.80s",md.what);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4223:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (LOCAL->tmp,"Bogus header field list: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4226:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (LOCAL->tmp,"Unterminated header section: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4236:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		  sprintf (LOCAL->tmp,"Unterminated partial data: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4240:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (LOCAL->tmp,"Junk after section: %.80s",(char *) s);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4261:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (LOCAL->tmp,"Unknown body message property: %.80s",prop);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4292:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (LOCAL->tmp,"Unknown RFC822 message property: %.80s",prop);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4298:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (LOCAL->tmp,"Unknown message property: %.80s",prop);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4305:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Missing data for property: %.80s",prop);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4314:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Unknown message data: %lu %.80s",msgno,(char *) s);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4327:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Too many server flags, discarding: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4357:19:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      do if ((i = atol (t)) && (LOCAL->filter ?
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4374:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Junk at end of thread: %.80s",(char *) s);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4484:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Junk after namespace list: %.80s",(char *) s);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4507:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Invalid ACL identifier/rights for %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4535:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (LOCAL->tmp,"Invalid optional LISTRIGHTS for %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4549:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Missing LISTRIGHTS rights for %.80s",(char *) t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4556:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Missing LISTRIGHTS identifier for %.80s",(char *) t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4569:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Junk after MYRIGHTS for %.80s",(char *) t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4577:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Missing MYRIGHTS for %.80s",(char *) t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4588:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Bad quota resource list for %.80s",(char *) t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4631:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Bad quota root list for %.80s",(char *) t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4675:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Unexpected untagged message: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4826:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (LOCAL->tmp,"Missing delimiter in namespace: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4851:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (LOCAL->tmp,
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4862:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (LOCAL->tmp,"Missing values for namespace attribute %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4871:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (LOCAL->tmp,"Junk at end of namespace: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4883:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Not a namespace: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4935:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:4936:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Bogus thread member: %.80s",s);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5033:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Junk at end of envelope: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5045:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Not an envelope: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5073:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Junk at end of address list: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5086:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Not an address: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5122:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Junk at end of address: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5153:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (LOCAL->tmp,"Junk in start of group: pn=%.80s al=%.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5179:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Not an address: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5295:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Not an atom: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5342:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Invalid CHAR in quoted string: %x",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5381:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Invalid server literal length %.80s",*txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5388:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Absurd server literal length %lu",i);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5425:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Not a string: %c%.80s",c,(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5446:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *t,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5487:61:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    for (t = seg; *t && !((*t == '.') && (isalpha(t[1]) || !atol (t+1))); t++);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5490:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Unknown section number: %.80s",seg);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5520:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Unknown section specifier: %.80s.%.80s",seg,t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5591:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Junk at end of multipart body: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5694:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (LOCAL->tmp,"Junk at end of body part: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5708:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Bogus body structure: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5743:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Missing value for parameter %.80s",par->attribute);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5760:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Junk at end of parameter: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5771:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Bogus body parameter: %c%.80s",c,
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5797:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Junk at end of disposition: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5811:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Unknown body disposition: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5862:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (LOCAL->tmp,"Bogus string list member: %.80s",(char *) t);
data/alpine-2.24+dfsg1/imap/src/c-client/imap4r1.c:5919:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (LOCAL->tmp,"Unknown extension token: %.80s",(char *) *txtptr);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:309:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:310:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"c-client library version skew, app=%.100s library=%.100s",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:369:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (stream && stream->dtb && (stream != ((*stream->dtb->open) (NIL))))
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:725:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:795:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,*t,*v,tmp[MAILTMPLEN],arg[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:905:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  strcpy (mb->service,"imap");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:907:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  strcpy (mb->service,"pop3");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:916:22:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if (!*mb->mailbox) strcpy (mb->mailbox,"INBOX");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:936:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:937:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Invalid LIST reference specification: %.80s",ref);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:942:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:943:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Invalid LIST pattern specification: %.80s",pat);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:971:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:972:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Invalid LIST reference specification: %.80s",ref);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:977:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:978:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Invalid LIST pattern specification: %.80s",pat);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1004:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1005:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Invalid LSUB reference specification: %.80s",ref);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1010:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1011:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Invalid LSUB pattern specification: %.80s",pat);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1064:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*t,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1103:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Can't create mailbox %.80s: bad driver syntax",mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1110:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Can't create mailbox %.80s: unknown driver",mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1122:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Can't create mailbox %.80s: indeterminate format",mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1160:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1170:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Can't rename %.80s: mailbox %.80s already exists",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1272:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1300:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"{%.255s",mb.host);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1301:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	if (mb.port) sprintf (tmp + strlen (tmp),":%lu",mb.port);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1302:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	if (mb.user[0]) sprintf (tmp + strlen (tmp),"/user=%.64s",mb.user);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1303:18:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.dbgflag) strcat (tmp,"/debug");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1304:18:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.secflag) strcat (tmp,"/secure");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1305:18:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.tlsflag) strcat (tmp,"/starttls");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1306:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.notlsflag) strcat (tmp,"/notls");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1307:18:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.sslflag) strcat (tmp,"/ssl");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1308:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.tls1) strcat (tmp,"/tls1");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1309:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.tls1_1) strcat (tmp,"/tls1_1");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1310:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.tls1_2) strcat (tmp,"/tls1_2");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1311:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.tls1_3) strcat (tmp,"/tls1_3");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1312:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.trysslflag) strcat (tmp,"/tryssl");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1313:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (mb.novalidate) strcat (tmp,"/novalidate-cert");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1314:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat (tmp,"/pop3/loser}");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1328:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"%.80s",name+8);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1332:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Can't resolve mailbox %.80s: bad driver syntax",name);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1337:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (d) return (*d->open) (NIL);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1338:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Can't resolve mailbox %.80s: unknown driver",name);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1362:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1364:43:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (options & OP_PROTOTYPE) return (*d->open) (NIL);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1386:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Closing connection to %.80s",mb.host);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1425:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ((*d->open) (stream)) ? stream : mail_close (stream);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1523:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Bad msgno %lu in mail_elt, nmsgs = %lu, mbx=%.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1664:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      hdr = (char *) memcpy (fs_get ((size_t) hdrsize+1),s,(size_t) hdrsize);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1702:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sequence[20];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1720:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (sequence,"%lu",elt->msgno);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1769:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  s = (char *) memcpy (fs_get ((size_t) i),u,(size_t) i);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1776:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1777:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Calculated RFC822.SIZE (%lu) != reported size (%lu)",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1781:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (t->data,s,(size_t) i);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1783:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (u,bs.curpos,bs.cursize);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1818:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1844:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      else strcpy (tmp,"HEADER");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1907:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1928:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (tmp,"TEXT");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:1964:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2028:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2042:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ht.data = (unsigned char *) mail_fetch_header (stream,msgno,
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2124:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (tmp,"TEXT");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2253:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (&md->stream->private.string,bs,sizeof (STRING));
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2277:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (buffer,s->curpos,i = min (s->cursize,size));
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2357:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2366:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (t = tmp,"%.256s@%.256s",adr->mailbox,adr->host);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2367:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (s,t,(size_t) min (length,(long) strlen (t)));
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2508:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*f,tmp[MAILTMPLEN],flags[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2529:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (tmp,"%lu",n);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2535:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    if (elt->seen) strcat (flags," \\Seen");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2536:24:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    if (elt->flagged) strcat (flags," \\Flagged");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2537:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    if (elt->answered) strcat (flags," \\Answered");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2538:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    if (elt->draft) strcat (flags," \\Draft");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2560:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (tmp,"%lu",i);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2682:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2698:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Can't append to mailbox %.80s: bad driver syntax",mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2704:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Can't append to mailbox %.80s: unknown driver",mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:2950:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3227:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Mailbox has more messages (%lu) exist than maximum (%lu)",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3251:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Non-existent recent message(s) %lu, nmsgs=%lu",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3265:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3268:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Expunge of non-existent message %lu, nmsgs=%lu",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3303:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Lock when already locked, mbx=%.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3467:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,*e,*t,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3527:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3581:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if (i == elt->msgno) sprintf (tmp,"%lu",elt->msgno);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3582:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    else sprintf (tmp,"%lu:%lu",elt->msgno,i);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3828:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*t,sect[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:3989:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[SENDBUFLEN + 1];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4011:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (txt.data + txt.size,tmp,k);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4043:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN+SEARCHSLOP+1];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4088:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *criterion,*r,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4164:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Unknown search criterion: %.30s",criterion);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4400:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *t,*v,*x,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4423:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (tmp,"%lu",i);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4434:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (tmp,"%lu",i);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4466:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp,"%lu",i);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:4983:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *t,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5009:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"%lu",mail_uid (stream,s->num));
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5011:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp + strlen (tmp),":%lu",mail_uid (stream,sc[j]->num));
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5036:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (tmp,"%lu",s->num);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5545:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *t,*n,*s,tmp[MAILTMPLEN],msg[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5569:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (msg,"Unsupported system flag: %.80s",t);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5590:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (msg,"Invalid flag: %.80s",t);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5602:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    if (*t) sprintf (msg,"Unknown flag: %.80s",t);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:5603:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    else strcpy (msg,"Empty flag invalid");
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:6276:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:6283:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Invalid host name: %.80s",mb->host);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.c:6331:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((tstream = (*dv->open) (host,service,port | flags)) != NULL){
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:700:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[NETMAXHOST];	/* host name (may be canonicalized) */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:701:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char orighost[NETMAXHOST];	/* host name before canonicalization */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:702:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char user[NETMAXUSER];	/* user name */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:703:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char auth[NETMAXAUTH];	/* authenticator name (PLAIN, etc.) */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:704:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char authuser[NETMAXUSER];	/* authentication user name */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:705:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mailbox[NETMAXMBX];	/* mailbox name */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:706:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char service[NETMAXSRV];	/* service name */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:1190:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *user_flags[NUSERFLAGS];	/* pointers to user flags in bit order */
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:1265:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  void *(*open) (char *host,char *service,unsigned long port);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:1540:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  MAILSTREAM *(*open) (MAILSTREAM *stream);
data/alpine-2.24+dfsg1/imap/src/c-client/mail.h:1983:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *host[OAUTH2_TOT_EQUIV];	/* servers for which this data applies  */
data/alpine-2.24+dfsg1/imap/src/c-client/misc.c:90:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (dst->data = (unsigned char *)
data/alpine-2.24+dfsg1/imap/src/c-client/misc.c:107:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (dst->data = (unsigned char *)
data/alpine-2.24+dfsg1/imap/src/c-client/misc.c:214:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char mask[256];
data/alpine-2.24+dfsg1/imap/src/c-client/misc.c:215:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static unsigned char alphatab[256] = {
data/alpine-2.24+dfsg1/imap/src/c-client/misc.c:264:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char mask[256];
data/alpine-2.24+dfsg1/imap/src/c-client/netmsg.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*t,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/netmsg.c:61:13:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  FILE *f = tmpfile ();
data/alpine-2.24+dfsg1/imap/src/c-client/netmsg.c:63:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,".%lx.%lx",(unsigned long) time (0),(unsigned long)getpid ());
data/alpine-2.24+dfsg1/imap/src/c-client/netmsg.c:64:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen (tmp,"wb+")) != NULL) unlink (tmp);
data/alpine-2.24+dfsg1/imap/src/c-client/netmsg.c:66:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Unable to create scratch file: %.80s",strerror (errno));
data/alpine-2.24+dfsg1/imap/src/c-client/netmsg.c:91:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Error writing scratch file at byte %lu",*size);
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:83:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen (newsrc,"wb");
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:132:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  if(j == k) sprintf (tmp, "%c%ld",c,j);
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:133:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  else sprintf (tmp, "%c%ld-%ld",c,j,k);
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:141:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if(j == k) sprintf (tmp, "%c%ld",c,j);
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:142:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      else sprintf (tmp,"%c%ld-%ld",c,j,k);
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*t,*lcl,name[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:161:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen ((char *) mail_parameters (stream,GET_NEWSRC,stream),"rb");
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:198:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen (newsrc,"r+b");
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *s,nl[3];
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:260:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:264:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen ((char *) mail_parameters (stream,GET_NEWSRC,stream),"rb");
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:298:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (tmp,"Bogus character 0x%x in news state",(unsigned int)c);
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:315:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"No state for newsgroup %.80s found, reading as new",group);
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:329:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"[UNSEEN] %lu is first unseen message in %.80s",unseen,group);
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:346:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN],backup[MAILTMPLEN],nl[3];
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:349:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen (newsrc,"rb")) != NULL) {/* have existing newsrc file? */
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:350:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!(bf = fopen ((strcat (strcpy (backup,newsrc),OLDFILESUFFIX)),"wb"))) {
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:381:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    else if (!(bf = fopen (backup,"rb")))
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:385:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    else if (!(f = fopen (newsrc,"wb"))) {
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:455:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:458:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen ((char *) mail_parameters (stream,GET_NEWSRC,stream),"rb");
data/alpine-2.24+dfsg1/imap/src/c-client/newsrc.c:483:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"No state for newsgroup %.80s found",group);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:227:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:322:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:337:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*t,*lcl,pattern[MAILTMPLEN],name[MAILTMPLEN],wildmat[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:388:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,mbx[MAILTMPLEN],tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:448:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mbx[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:461:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mbx[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:513:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*name,*state,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:545:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"NNTP SERVER BUG (impossible message count): %lu > %lu",
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:570:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  if (((k = atol (s)) >= i) && (k < status.uidnext)) {
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:626:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"%lu-%lu",first,last);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:651:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*mbx,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:688:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *hostlist[2];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:691:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp + strlen (tmp),":%lu",mb.port ? mb.port : nntp_port);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:692:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.tlsflag) strcat (tmp,"/starttls");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:693:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.tlssslv23) strcat (tmp,"/tls-sslv23");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:694:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.notlsflag) strcat (tmp,"/nostarttls");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:695:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.sslflag) strcat (tmp,"/ssl");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:696:18:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.tls1) strcat (tmp,"/tls1");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:697:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.tls1_1) strcat (tmp,"/tls1_1");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:698:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.tls1_2) strcat (tmp,"/tls1_2");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:699:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.tls1_3) strcat (tmp,"/tls1_3");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:700:24:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.novalidate) strcat (tmp,"/novalidate-cert");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:701:19:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.loser) strcat (tmp,"/loser");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:702:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (mb.secflag) strcat (tmp,"/secure");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:723:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"NNTP SERVER BUG (impossible message count): %lu > %lu",
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:765:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->tlsflag) strcat (tmp,"/starttls");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:766:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->tlssslv23) strcat (tmp,"/tls-sslv23");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:767:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->notlsflag) strcat (tmp,"/nostarttls");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:768:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->sslflag) strcat (tmp,"/ssl");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:769:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->tls1) strcat (tmp,"/tls1");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:770:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->tls1_1) strcat (tmp,"/tls1_1");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:771:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->tls1_2) strcat (tmp,"/tls1_2");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:772:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->tls1_3) strcat (tmp,"/tls1_3");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:773:26:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->novalidate) strcat (tmp,"/novalidate-cert");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:774:33:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (LOCAL->nntpstream->loser) strcat (tmp,"/loser");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:775:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (stream->secure) strcat (tmp,"/secure");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:776:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (stream->rdonly) strcat (tmp,"/readonly");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:778:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (stream->halfopen) strcat (tmp,"}<no_mailbox>");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:799:11:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((k = atol (s)) > j){/* discard too high article numbers */
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:800:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"NNTP SERVER BUG (out of range article ID): %lu > %lu",
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:931:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,*t,*v,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:943:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if(i == (j - 1)) sprintf (tmp, "%lu", mail_uid (stream,i));
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:944:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      else sprintf (tmp, "%lu-%lu",mail_uid (stream,i), mail_uid (stream,j - 1));
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:955:15:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  if ((uid = atol (s)) && (k = mail_msgno (stream,uid)) &&
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:962:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (tmp,"Server returned data for unknown UID %lu",uid);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:986:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"Unable to parse overview for UID %lu: %.500s",uid,s);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1082:28:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    ov->optional.octets = atol (t);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1086:29:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      ov->optional.lines = atol (++t);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1117:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"%lu",mail_uid (stream,msgno));
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1170:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"%lu",elt->private.uid);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1503:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,*t,*v,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1529:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if (start != last) sprintf (tmp,"%lu-%lu",start,last);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1530:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    else sprintf (tmp,"%lu",start);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1538:35:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if ((i = mail_msgno (stream,atol (s))) &&
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1555:18:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      r->size = atol (++v);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1685:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1691:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"{%.200s/%.20s}",*hostlist,service ? service : "nntp");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1693:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Invalid host specifier: %.80s",*hostlist);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1748:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Unable to negotiate TLS with this server: %.80s",mb.host);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1912:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,path[MAILTMPLEN],tmp[SENDBUFLEN+1];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:1956:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Unexpected NNTP posting reply code %ld",ret);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2006:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (s,"\015\012");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2024:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2026:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"{%.200s/nntp",(long) mail_parameters (NIL,GET_TRUSTDNS,NIL) ?
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2032:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (tmp,"/ssl");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2033:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat (tmp,"}<none>");
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2049:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN],usr[MAILTMPLEN], *pwd2 = NIL, *base;
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2096:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Can not authenticate to NNTP server: %.80s",lsterr);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2158:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"NNTP SERVER BUG (invalid challenge): %.80s",stream->reply+4);
data/alpine-2.24+dfsg1/imap/src/c-client/nntp.c:2210:30:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  return stream->replycode = atol (stream->reply);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rv[37];
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:37:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:38:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(rv + strlen(rv), "%c", '-');
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:40:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:41:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(rv + strlen(rv), "%c", '-');
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:43:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:44:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(rv + strlen(rv), "%c", '-');
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:46:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:47:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(rv + strlen(rv), "%c", '-');
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:49:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(rv + strlen(rv), "%x", (unsigned int) (random() % 256));
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:175:54:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      case JString: oauth2->devicecode.expires_in = atoi((char *) jx->value);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:183:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      case JString: oauth2->devicecode.interval = atoi((char *) jx->value);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:221:55:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			      case JString: oauth2->expiration = time(0) + atol((char *) jx->value);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:229:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     default :  { char tmp[100];
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:230:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			  sprintf(tmp, "Oauth2 client Received Code %d", status);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:279:50:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				case JString: oauth2->expiration = time(0) + atol((char *) jx->value);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:287:42:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			       oauth2->expiration = time(0) + atol((char *) jx->value);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:295:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		default   :  { char tmp[100];
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:296:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			       sprintf(tmp, "Oauth2 Client Received Code %d", status);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:357:50:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				case JString: oauth2->expiration = time(0) + atol((char *) jx->value);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:368:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     default :  { char tmp[100];
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:369:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			  sprintf(tmp, "Oauth device Received Code %d", status);
data/alpine-2.24+dfsg1/imap/src/c-client/oauth2_aux.c:428:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char user[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:245:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:248:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (strchr (strcpy (tmp,ref),'}')+1,"INBOX");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:253:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (strchr (strcpy (tmp,pat),'}')+1,"INBOX");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:267:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,mbx[MAILTMPLEN],tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:383:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*t,tmp[MAILTMPLEN],usr[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:420:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"{%.200s:%lu/pop3",
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:424:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (mb.tlsflag) strcat (tmp,"/starttls");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:425:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (mb.tlssslv23) strcat (tmp,"/tls-sslv23");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:426:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (mb.tls1) strcat (tmp,"/tls1");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:427:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (mb.tls1_1) strcat (tmp,"/tls1_1");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:428:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (mb.tls1_2) strcat (tmp,"/tls1_2");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:429:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (mb.tls1_3) strcat (tmp,"/tls1_3");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:430:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (mb.notlsflag) strcat (tmp,"/nostarttls");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:431:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (mb.sslflag) strcat (tmp,"/ssl");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:432:26:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (mb.novalidate) strcat (tmp,"/novalidate-cert");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:433:43:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if ((LOCAL->loser = mb.loser) != 0) strcat (tmp,"/loser");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:434:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (stream->secure) strcat (tmp,"/secure");
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:521:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  ((s && !compare_cstring (s,"USER")) ? -atoi (args) : atoi (args));
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:521:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  ((s && !compare_cstring (s,"USER")) ? -atoi (args) : atoi (args));
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:532:3:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	-atoi (args) : atoi (args);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:532:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	-atoi (args) : atoi (args);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:627:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (pwd,"Retrying using %.80s authentication after %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:664:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (pwd,"Can not authenticate to POP3 server: %.80s",t);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:670:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if(!authsaved) sprintf (pwd,"Client does not support AUTH=%.80s authenticator",mb->auth);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:671:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      else if (!atsaved) sprintf (pwd,"POP server does not support AUTH=%.80s authenticator",mb->auth);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:724:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:731:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"POP3 SERVER BUG (invalid challenge): %.80s",LOCAL->reply);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:869:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:878:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"TOP %lu 0",mail_uid (stream,msgno));
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:984:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:1010:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Expunged %lu messages",n);
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:1063:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:1064:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"%lu",mail_uid (stream,n));
data/alpine-2.24+dfsg1/imap/src/c-client/pop3.c:1087:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (s,"\015\012");
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:66:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *body_types[TYPEMAX+1] = {
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:72:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *body_encodings[ENCMAX+1] = {
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:608:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*t,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:670:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"MIME type table overflow: %.100s",s);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:679:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"Unknown MIME type: %.100s",s);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:711:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"MIME encoding table overflow: %.100s",s);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:720:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"Unknown MIME transfer encoding: %.100s",s);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:740:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:766:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Missing parameter value: %.80s",param->attribute);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:774:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Unexpected characters at end of parameters: %.80s",text);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:828:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      if (!*string) strcpy (tmp,"Missing address after comma");
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:829:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      else sprintf (tmp,"Invalid mailbox list: %.80s",string);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:880:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:916:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"Unexpected characters after address in group: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:927:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Invalid group mailbox list: %.80s",*string);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1008:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1036:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Unterminated at-domain-list: %.80s%.80s",adl,t);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1054:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"Unterminated mailbox: %.80s@%.80s",adr->mailbox,
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1373:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *ret,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1396:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Unterminated comment: %.80s",*s);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1438:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (buf->cur,string,i);
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1793:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[MAILTMPLEN];	/* make cookie not in BASE64 or QUOTEPRINT*/
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1794:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"%lu-%lu-%lu=:%lu",(unsigned long) gethostid (),
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1861:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[MAILTMPLEN];	/* make cookie not in BASE64 or QUOTEPRINT*/
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1862:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"%lu-%lu-%lu=:%lu",(unsigned long) gethostid (),
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1909:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *cookie,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1917:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (cookie = tmp,"%lu-%lu-%lu=:%lu",(unsigned long) gethostid (),
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1960:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:1964:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char decode[256] = {
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:2025:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Possible data truncation in rfc822_base64(): %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:2107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:2144:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (tmp,"Invalid quoted-printable sequence: =%.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:2409:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[SENDBUFLEN+1];	/*  client to give us a big enough one */
data/alpine-2.24+dfsg1/imap/src/c-client/rfc822.c:2430:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[SENDBUFLEN+1];
data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,db[MAILTMPLEN],tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c:44:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen (db,"r")) != NULL) {	/* make sure not already there */
data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c:48:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Already subscribed to mailbox %.80s",mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c:56:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (!(f = fopen (db,"a"))) {	/* append new entry */
data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN],old[MAILTMPLEN],newname[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c:78:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (!(f = fopen (old,"r")))	/* open subscription database */
data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c:80:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (!(tf = fopen (newname,"w"))) {
data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c:94:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Not subscribed to mailbox %.80s",mailbox);
data/alpine-2.24+dfsg1/imap/src/c-client/smanager.c:116:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen (sbname,"r")) != NULL) *sdb = (void *) f;
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:153:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"{%.1000s}",*hostlist);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:156:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Invalid host specifier: %.80s",*hostlist);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:166:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (mb.service,"submission");
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:188:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"SMTP greeting failure: %.80s",stream->reply);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:195:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"SMTP hello failure: %.80s",stream->reply);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:213:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (tmp,"Unable to negotiate TLS with this server: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:223:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (tmp,"SMTP EHLO failure after STARTTLS: %.80s",
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:231:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (tmp,"TLS unavailable with this server: %.80s",mb.host);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char usr[MAILTMPLEN], *base;
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:343:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"Can not authenticate to SMTP server: %.80s",lsterr);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:349:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if(!authsaved) sprintf (tmp, "Client does not support AUTH=%.80s authenticator",mb->auth);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:350:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      else if (!atsaved) sprintf (tmp,"SMTP server does not support AUTH=%.80s authenticator",mb->auth);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:364:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:370:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"SMTP SERVER BUG (invalid challenge, continuing): %.80s",stream->reply+4);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:440:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[SENDBUFLEN+1], smtpserver[SENDBUFLEN+1], *error_string;
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:474:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (tmp,"FROM:<");	/* compose "MAIL FROM:<return-path>" */
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:493:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat (tmp," BODY=8BITMIME");
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:497:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp + strlen (tmp)," ENVID=%.100s",ESMTP.dsn.envid);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:575:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char *s,tmp[2*MAILTMPLEN],orcpt[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:597:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (tmp,"TO:<");	/* compose "RCPT TO:<return-path>" */
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:608:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	  strcat (tmp," NOTIFY=");
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:610:34:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	  if (ESMTP.dsn.notify.failure) strcat (s,"FAILURE,");
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:611:32:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	  if (ESMTP.dsn.notify.delay) strcat (s,"DELAY,");
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:612:34:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	  if (ESMTP.dsn.notify.success) strcat (s,"SUCCESS,");
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:615:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	  else strcat (tmp,"NEVER");
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:617:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (orcpt,"%.498s;%.498s",
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:620:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (tmp + strlen (tmp)," ORCPT=%.500s",orcpt);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:656:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat (s,"\015\012");
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:684:13:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    reply = atol (stream->reply);
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:703:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*t,*r,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/c-client/smtp.c:709:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat (tmp,"\015\012");
data/alpine-2.24+dfsg1/imap/src/c-client/sslio.h:32:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  SSLSTREAM *(*open) (char *host,char *service,unsigned long port);
data/alpine-2.24+dfsg1/imap/src/c-client/sslio.h:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char obuf[SSLBUFLEN];		/* output buffer */
data/alpine-2.24+dfsg1/imap/src/c-client/utf8.c:2270:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char mark[6] = {0x00,0xc0,0xe0,0xf0,0xf8,0xfc};
data/alpine-2.24+dfsg1/imap/src/c-client/utf8aux.c:145:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (dst->data = (unsigned char *) fs_get (dsize),src->data,
data/alpine-2.24+dfsg1/imap/src/charset/widths.c:39:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char ucs4_widthtab[32768] = {
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:77:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char chunk[CHUNKLEN];
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:161:65:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (s[2] && ((s[2] == '-') || isdigit (s[2]))) precedence = atol (s + 2);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:163:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      precedence = atol (s);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:171:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  else if (!(f = tmpfile ())) _exit(fail ("can't make temp file",EX_TEMPFAIL));
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:224:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*mailbox,tmp[MAILTMPLEN],path[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:236:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"delivering to %.80s+%.80s",user,mailbox ? mailbox : "INBOX");
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:250:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"invalid mailbox name %.80s+%.80s",user,mailbox);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:271:35:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  (s = strstr (path,"&&&&&")) && strcpy (s,"INBOX") &&
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:304:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"attempting to create mailbox %.80s path %.80s",mailbox,path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:308:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"created %.80s",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:323:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:338:39:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	      (s = strstr (path,"&&&&&")) && strcpy (s,"INBOX")) ? T : NIL;
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:365:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"WARNING: directory %.80s is listable",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:371:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"WARNING: multiple links to file %.80s",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:375:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"WARNING: file %.80s is executable",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:380:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"WARNING: file %.80s is publicly-writable",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:384:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"WARNING: file %.80s is publicly-readable",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:396:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if (flagseen) sprintf (flags = tmp,"\\Seen %.1000s",keywords);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:402:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"message delivery failed to %.80s",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:406:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"delivered to %.80s",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:422:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"Verifying safe delivery to %.80s",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:425:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"delivery to %.80s unsafe: ",path);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:433:34:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (sbuf->st_mode & S_ISUID) strcat (tmp,"setuid file");
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:435:39:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    else if (sbuf->st_mode & S_ISGID) strcat (tmp,"setgid file");
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:438:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  case S_IFCHR: strcat (tmp,"character special"); break;
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:439:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  case S_IFBLK: strcat (tmp,"block special"); break;
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:440:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  case S_IFLNK: strcat (tmp,"symbolic link"); break;
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:441:18:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  case S_IFSOCK: strcat (tmp,"socket"); break;
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:443:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp + strlen (tmp),"file type %07o",(unsigned int) type);
data/alpine-2.24+dfsg1/imap/src/dmail/dmail.c:564:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:246:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char cmdbuf[CMDLEN];	/* command buffer */
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:261:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *litstk[LITSTKLEN];	/* stack to hold literals */
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:304:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char *s,*t,*u,*v,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:333:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char proxy[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:334:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *nntp = fopen (NNTPFILE,"r");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:672:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	      strcpy (tmp,"\\Answered \\Flagged \\Deleted \\Draft \\Seen");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1067:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (tmp,"{%.300s/nntp}%.300s",nntpproxy,(char *) s+6);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1235:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp + strlen (tmp)," MESSAGES %lu",stream->nmsgs);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1237:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp + strlen (tmp)," RECENT %lu",stream->recent);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1241:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp + strlen (tmp)," UNSEEN %lu",unseen);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1244:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp + strlen (tmp)," UIDNEXT %lu",stream->uid_last+1);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1246:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp + strlen(tmp)," UIDVALIDITY %lu",
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1249:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	      strcat (tmp,")\015\012");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1255:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (tmp,"{%.300s/nntp}%.300s",nntpproxy,(char *) s+6);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1415:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp,"* OK Timeout in %lu minutes\015\012",
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1421:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp,"* %lu EXISTS\015\012* %lu RECENT\015\012",
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1443:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf (tmp,"* %lu EXPUNGE\015\012",donefake--);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1446:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		  sprintf (tmp,"* %lu EXISTS\015\012* %lu RECENT\015\012",
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1528:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"[%.80sUID %lu ",(char *)
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1599:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1669:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"1:%lu",nmsgs);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1718:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      !(alf = fopen (file,"r"))) return oldtime;
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1932:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,buf[8*MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:1938:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open (buf,O_WRONLY | O_CREAT | O_TRUNC,0666)) >= 0) {
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:2007:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stack[256];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:2101:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char msg[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:2247:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char base64mask[256] = {
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:2330:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (cur->text.data,t,i);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:2704:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy ((*string)->text.data,s,i);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:2756:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (t,"(FLAGS INTERNALDATE RFC822.SIZE ENVELOPE)");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:2758:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (t,"(FLAGS INTERNALDATE RFC822.SIZE ENVELOPE BODY)");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:2759:32:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  else if (!strcmp (t,"FAST")) strcpy (t,"(FLAGS INTERNALDATE RFC822.SIZE)");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3120:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (cst.data) memcpy ((void *) &st,(void *) &cst,sizeof (SIZEDTEXT));
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3141:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	if (st.size) sprintf (tmp + strlen (tmp),"{%lu}\015\012",st.size);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3142:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	else strcat (tmp,"\"\"");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3214:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    else strcpy (tmp,"BODY[TEXT]");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3247:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (fs_get (st->size + 1),st->data,st->size);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3272:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *t,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3276:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"%lu",i);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3330:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3333:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"%lu",i);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3372:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    hdr.data = (unsigned char *) memcpy (fs_get (hdr.size),s,hdr.size);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3409:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3412:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"%lu",i);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3504:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      pstring ((char *) body_types[body->type]);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3514:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      pstring ((char *) body_encodings[body->encoding]);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3573:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      pstring ((char *) body_types[body->type]);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3583:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      pstring ((char *) body_encodings[body->encoding]);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3677:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3678:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"%lu",i);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:3845:32:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if (ta->first || ta->last) sprintf (id + strlen (id),"<%lu>",ta->first);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4044:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (pattern,"Invalid reference specification: %.80s",ref);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4049:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (pattern,"Invalid pattern specification: %.80s",pat);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4054:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (pattern,"{%.300s/nntp}",nntpproxy);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4082:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char *t,resp[RESPBUFLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4159:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Cross-format (%.80s -> %.80s) COPY completed",
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4181:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*t,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4190:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"%lu",md->msgno);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4195:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (elt->seen) strcat (s," \\Seen");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4196:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (elt->deleted) strcat (s," \\Deleted");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4197:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (elt->flagged) strcat (s," \\Flagged");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4198:26:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (elt->answered) strcat (s," \\Answered");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4199:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (elt->draft) strcat (s," \\Draft");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4435:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4438:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp + strlen (tmp)," MESSAGES %lu",status->messages);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4440:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp + strlen (tmp)," RECENT %lu",status->recent);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4442:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp + strlen (tmp)," UNSEEN %lu",status->unseen);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4444:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp + strlen (tmp)," UIDNEXT %lu",status->uidnext);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4446:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp + strlen(tmp)," UIDVALIDITY %lu",status->uidvalidity);
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4467:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4478:42:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (attributes & LATT_NOINFERIORS) strcat (tmp," \\NoInferiors");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4479:39:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (attributes & LATT_NOSELECT) strcat (tmp," \\NoSelect");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4480:37:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (attributes & LATT_MARKED) strcat (tmp," \\Marked");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4481:39:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (attributes & LATT_UNMARKED) strcat (tmp," \\UnMarked");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4482:42:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (attributes & LATT_HASCHILDREN) strcat (tmp," \\HasChildren");
data/alpine-2.24+dfsg1/imap/src/imapd/imapd.c:4483:44:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (attributes & LATT_HASNOCHILDREN) strcat (tmp," \\HasNoChildren");
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:68:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char status[MAILTMPLEN];	/* space for status string */
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmdbuf[TMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:128:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (logout = cmdbuf,"%.80s while reading line",e);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[TMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:314:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"{%.128s/user=%.128s}INBOX",u,user);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:359:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"1:%lu",j);	/* fetch fast information for all messages */
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:452:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[TMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:458:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"%lu",msg[current++]);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:471:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[TMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:477:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"%lu",msg[current]);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:617:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop2d.c:620:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (logout = tmp,"Mailbox closed (%.80s)",string);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:72:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char challenge[128];		/* challenge */
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:132:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (challenge,"<%lx.%lx@%.64s>",(unsigned long) getpid (),
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:169:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (logout = tmp,"%.80s, while reading line",e);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:316:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"+OK %lu %lu\015\012",j,k);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:323:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (tmp,"+OK %lu %lu\015\012",i,
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:333:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp,"%lu %lu\015\012",i,
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:345:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (tmp,"+OK %lu %08lx%08lx\015\012",i,stream->uid_validity,
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:355:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (tmp,"%lu %08lx%08lx\015\012",i,stream->uid_validity,
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:371:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (tmp,"+OK %lu octets\015\012",
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:427:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tmp,"+OK %lu\015\012",last);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:506:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	if (k) sprintf (s,",%lu:%lu",i,k);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:507:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	else sprintf (s,",%lu",i);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:521:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	if (k) sprintf (s,",%lu:%lu",i,k);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:522:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	else sprintf (s,",%lu",i);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:654:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:681:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"{%.128s/user=%.128s}INBOX",host,user);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:704:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char *t,resp[RESPBUFLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:705:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:731:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (logout = tmp,"%.80s, while reading authentication",e);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:747:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (logout = tmp,"%.80s, while reading auth char",e);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:770:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:781:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"1:%lu",j);	/* fetch fast information for all messages */
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:795:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"+OK Mailbox open, %lu messages\015\012",nmsgs);
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:982:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/ipopd/ipop3d.c:985:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (logout = tmp,"Mailbox closed (%.80s)",string);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,*dp,*t,*t1,tmp[MAILTMPLEN],mbx[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:333:27:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      if (last != start) sprintf (t,":%lu,%lu",last,m);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:335:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      else sprintf (t,",%lu",m);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:346:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (s,"%lu",start = last = m);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:351:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if (last != start) sprintf (t,":%lu",last);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:372:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    else if (!(f = tmpfile ())) puts ("can't open temporary file");
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:479:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:599:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *criterion,*r,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:692:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"Unknown search criterion: %.30s",criterion);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:736:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:813:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"1:%lu",ap.msgmax);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:819:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmp,"1:%lu",ap.msgno);
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:850:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *t,*t1,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:862:56:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if ((elt = mail_elt (ap->stream,ap->msgno))->seen) strcat (t," \\Seen");
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:863:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (elt->deleted) strcat (t," \\Deleted");
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:864:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (elt->flagged) strcat (t," \\Flagged");
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:865:24:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (elt->answered) strcat (t," \\Answered");
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:866:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (elt->draft) strcat (t," \\Draft");
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1040:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1045:18:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (*mb->user) strcat (s = tmp,"} password:");
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1061:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mailutil/mailutil.c:1065:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (*mb->user) strcat (s = tmp,"} access token: ");
data/alpine-2.24+dfsg1/imap/src/mlock/mlock.c:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*dir,*file,*lock,*hitch,tmp[1024];
data/alpine-2.24+dfsg1/imap/src/mlock/mlock.c:98:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (fstat (atoi (argv[1]),&fsb)) return die ("fstat failure",errno);
data/alpine-2.24+dfsg1/imap/src/mlock/mlock.c:129:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ld = open (hitch,O_WRONLY|O_CREAT|O_EXCL,LOCKPROTECTION)) >= 0) {
data/alpine-2.24+dfsg1/imap/src/mlock/mlock.c:149:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((ld = open (lock,O_WRONLY|O_CREAT|O_EXCL,LOCKPROTECTION)) >= 0) {
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:60:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char personalname[MAILTMPLEN];	/* user's personal name */
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN],tmpx[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[MAILTMPLEN],tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:164:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (arg) last = atoi (arg);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:181:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (arg) last = atoi (arg);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:188:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (arg,"%lu",last);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:219:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (!(last = atoi (arg))) {
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:234:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (arg) last = atoi (arg);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:284:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (arg) last = atoi (arg);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:319:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (arg) last = atoi (arg);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:326:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (arg,"%lu",last);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *t,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:387:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp+5,"%4lu) ",elt->msgno);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:398:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (tmp+18,t,(size_t) min (20,(long) strlen (t)));
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:407:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (tmp,"} ");
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:409:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp + strlen (tmp),"%.25s (%lu chars)",
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:424:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:433:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp+5,"%4lu) ",cache->msgno);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:445:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (tmp,"} ");
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:448:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (t += strlen (t)," (%lu chars)",cache->rfc822_size);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:460:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:483:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (s += strlen (s)," (%lu lines)",body->size.lines);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:486:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (s += strlen (s)," (%lu bytes)",body->size.bytes);
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:509:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,date[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:710:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:717:18:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (*mb->user) strcat (s = tmp,"} password:");
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:769:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/mtest/mtest.c:811:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (text,"\015\012");
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,test[MAILTMPLEN],file[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,*t,test[MAILTMPLEN],tmp[MAILTMPLEN],tmpx[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:249:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (tmp,"CLIENT BUG DETECTED: subscribe of non-mailbox directory %.80s",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:255:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"Can't subscribe %.80s: not a mailbox",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:276:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN],path[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:286:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dt = mail_parameters ((*drivers->open) (NIL),GET_DIRFMTTEST,NIL);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:376:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open (name,O_RDONLY,NIL)) >= 0) {
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:384:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (buf,buf+BUFSIZE,ssiz);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:413:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:421:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dt = mail_parameters ((*d->open) (NIL),GET_DIRFMTTEST,NIL);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:453:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:457:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Can't create %.80s: invalid name",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:476:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:499:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if ((fd = open (path,O_WRONLY|O_CREAT|O_EXCL,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:503:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Can't create mailbox node %.80s: %.80s",path,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:519:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s,tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:521:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Can't delete - invalid name: %.80s",s);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:528:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Can't delete mailbox %.80s: %.80s",mailbox,strerror (errno));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:545:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,*s,tmp[MAILTMPLEN],mbx[MAILTMPLEN],oldname[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:550:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (mbx,"Can't rename %.80s to %.80s: invalid name",old,newname);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:569:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"Can't rename mailbox %.80s to %.80s: %.80s",old,newname,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:585:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char err[MAILTMPLEN],tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:592:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (err,"Can't open this name: %.80s",stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:593:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if ((fd = open (tmp,O_RDONLY,NIL)) < 0) {
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:596:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (err,"%.80s: %.80s",strerror (errno),stream->mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:602:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (err,"Can't open %.80s: not a selectable mailbox",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:605:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (err,"Can't open %.80s (file %.80s): not in valid mailbox format",
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:654:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (fs_get (sizeof (MAILSTREAM)),stream,
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:657:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (stream,test,sizeof (MAILSTREAM));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:721:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:729:47:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if (dummy_file (tmp,mailbox) && ((fd = open (tmp,O_RDONLY,NIL)) < 0)) {
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:732:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (tmp,"%.80s: %.80s",strerror (e),mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/dummy.c:742:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tmp,"Indeterminate mailbox format: %.80s",mailbox);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:83:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *userFlags[NUSERFLAGS] = {NIL};
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:608:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAILTMPLEN];
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:638:36:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (!myNewsrc) myNewsrc = cpystr(strcat (strcpy (tmp,myHomeDir),"/.newsrc"));
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:645:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  (*createProto->dtb->open) (NIL);
data/alpine-2.24+dfsg1/imap/src/osdep/amiga/env_ami.c:694:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size