Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/ants-2.1.0/Examples/ANTS.cxx
Examining data/ants-2.1.0/Examples/ANTSConformalMapping.cxx
Examining data/ants-2.1.0/Examples/ANTSIntegrateVectorField.cxx
Examining data/ants-2.1.0/Examples/ANTSIntegrateVelocityField.cxx
Examining data/ants-2.1.0/Examples/ANTSJacobian.cxx
Examining data/ants-2.1.0/Examples/ANTSUseDeformationFieldToGetAffineTransform.cxx
Examining data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetAffineTransform.cxx
Examining data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx
Examining data/ants-2.1.0/Examples/ANTsVersion.cxx
Examining data/ants-2.1.0/Examples/ANTsVersion.h
Examining data/ants-2.1.0/Examples/Atropos.cxx
Examining data/ants-2.1.0/Examples/AverageAffineTransform.cxx
Examining data/ants-2.1.0/Examples/AverageAffineTransformNoRigid.cxx
Examining data/ants-2.1.0/Examples/AverageImages.cxx
Examining data/ants-2.1.0/Examples/AverageTensorImages.cxx
Examining data/ants-2.1.0/Examples/CheckTopology.cxx
Examining data/ants-2.1.0/Examples/ClusterImageStatistics.cxx
Examining data/ants-2.1.0/Examples/ComposeMultiTransform.cxx
Examining data/ants-2.1.0/Examples/CompositeTransformUtil.cxx
Examining data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx
Examining data/ants-2.1.0/Examples/ConformalMapping.cxx
Examining data/ants-2.1.0/Examples/ConvertImagePixelType.cxx
Examining data/ants-2.1.0/Examples/ConvertInputImagePixelTypeToFloat.cxx
Examining data/ants-2.1.0/Examples/ConvertScalarImageToRGB.cxx
Examining data/ants-2.1.0/Examples/ConvertToJpg.cxx
Examining data/ants-2.1.0/Examples/ConvertTransformFile.cxx
Examining data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx
Examining data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx
Examining data/ants-2.1.0/Examples/CreateDTICohort.cxx
Examining data/ants-2.1.0/Examples/CreateDisplacementField.cxx
Examining data/ants-2.1.0/Examples/CreateImage.cxx
Examining data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx
Examining data/ants-2.1.0/Examples/CreateTiledMosaic.cxx
Examining data/ants-2.1.0/Examples/CreateWarpedGridImage.cxx
Examining data/ants-2.1.0/Examples/DeNrrd.cxx
Examining data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx
Examining data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx
Examining data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx
Examining data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx
Examining data/ants-2.1.0/Examples/GetConnectedComponentsFeatureImages.cxx
Examining data/ants-2.1.0/Examples/GetMeshAndTopology.cxx
Examining data/ants-2.1.0/Examples/ImageCompare.cxx
Examining data/ants-2.1.0/Examples/ImageIntensityStatistics.cxx
Examining data/ants-2.1.0/Examples/ImageMath.cxx
Examining data/ants-2.1.0/Examples/ImageSetStatistics.cxx
Examining data/ants-2.1.0/Examples/KellyKapowski.cxx
Examining data/ants-2.1.0/Examples/KellySlater.cxx
Examining data/ants-2.1.0/Examples/LabelClustersUniquely.cxx
Examining data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx
Examining data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx
Examining data/ants-2.1.0/Examples/LaplacianThickness.cxx
Examining data/ants-2.1.0/Examples/LesionFilling.cxx
Examining data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx
Examining data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx
Examining data/ants-2.1.0/Examples/MemoryTest.cxx
Examining data/ants-2.1.0/Examples/MultiplyImages.cxx
Examining data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx
Examining data/ants-2.1.0/Examples/N4BiasFieldCorrection.cxx
Examining data/ants-2.1.0/Examples/PasteImageIntoImage.cxx
Examining data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx
Examining data/ants-2.1.0/Examples/PrintHeader.cxx
Examining data/ants-2.1.0/Examples/RebaseTensorImage.cxx
Examining data/ants-2.1.0/Examples/ReorientTensorImage.cxx
Examining data/ants-2.1.0/Examples/ResampleImage.cxx
Examining data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx
Examining data/ants-2.1.0/Examples/ResetDirection.cxx
Examining data/ants-2.1.0/Examples/SetDirectionByMatrix.cxx
Examining data/ants-2.1.0/Examples/SetOrigin.cxx
Examining data/ants-2.1.0/Examples/SetSpacing.cxx
Examining data/ants-2.1.0/Examples/SmoothImage.cxx
Examining data/ants-2.1.0/Examples/StackSlices.cxx
Examining data/ants-2.1.0/Examples/StudentsTestOnImages.cxx
Examining data/ants-2.1.0/Examples/SurfaceBasedSmoothing.cxx
Examining data/ants-2.1.0/Examples/SurfaceCurvature.cxx
Examining data/ants-2.1.0/Examples/TensorDerivedImage.cxx
Examining data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx
Examining data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx
Examining data/ants-2.1.0/Examples/ThresholdImage.cxx
Examining data/ants-2.1.0/Examples/TileImages.cxx
Examining data/ants-2.1.0/Examples/TimeSCCAN.cxx
Examining data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx
Examining data/ants-2.1.0/Examples/WarpTensorImageMultiTransform.cxx
Examining data/ants-2.1.0/Examples/WarpTimeSeriesImageMultiTransform.cxx
Examining data/ants-2.1.0/Examples/WarpVTKPolyDataMultiTransform.cxx
Examining data/ants-2.1.0/Examples/antsAffineInitializer.cxx
Examining data/ants-2.1.0/Examples/antsAlignOrigin.cxx
Examining data/ants-2.1.0/Examples/antsApplyTransforms.cxx
Examining data/ants-2.1.0/Examples/antsApplyTransformsToPoints.cxx
Examining data/ants-2.1.0/Examples/antsDisplacementAndVelocityFieldRegistrationCommandIterationUpdate.h
Examining data/ants-2.1.0/Examples/antsMotionCorr.cxx
Examining data/ants-2.1.0/Examples/antsMotionCorrDiffusionDirection.cxx
Examining data/ants-2.1.0/Examples/antsMotionCorrStats.cxx
Examining data/ants-2.1.0/Examples/antsRegistration.cxx
Examining data/ants-2.1.0/Examples/antsRegistration2DDouble.cxx
Examining data/ants-2.1.0/Examples/antsRegistration2DFloat.cxx
Examining data/ants-2.1.0/Examples/antsRegistration3DDouble.cxx
Examining data/ants-2.1.0/Examples/antsRegistration3DFloat.cxx
Examining data/ants-2.1.0/Examples/antsRegistration4DDouble.cxx
Examining data/ants-2.1.0/Examples/antsRegistration4DFloat.cxx
Examining data/ants-2.1.0/Examples/antsRegistrationCommandIterationUpdate.h
Examining data/ants-2.1.0/Examples/antsRegistrationTemplateHeader.cxx
Examining data/ants-2.1.0/Examples/antsRegistrationTemplateHeader.h
Examining data/ants-2.1.0/Examples/antsSliceRegularizedRegistration.cxx
Examining data/ants-2.1.0/Examples/antsSurf.cxx
Examining data/ants-2.1.0/Examples/antsTransformInfo.cxx
Examining data/ants-2.1.0/Examples/antsUtilities.cxx
Examining data/ants-2.1.0/Examples/antsUtilities.h
Examining data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx
Examining data/ants-2.1.0/Examples/compareTwoTransforms.cxx
Examining data/ants-2.1.0/Examples/include/ANTSConformalMapping.h
Examining data/ants-2.1.0/Examples/include/ANTSIntegrateVectorField.h
Examining data/ants-2.1.0/Examples/include/ANTSIntegrateVelocityField.h
Examining data/ants-2.1.0/Examples/include/ANTSJacobian.h
Examining data/ants-2.1.0/Examples/include/ANTSUseDeformationFieldToGetAffineTransform.h
Examining data/ants-2.1.0/Examples/include/ANTSUseLandmarkImagesToGetAffineTransform.h
Examining data/ants-2.1.0/Examples/include/ANTSUseLandmarkImagesToGetBSplineDisplacementField.h
Examining data/ants-2.1.0/Examples/include/ANTS_.h
Examining data/ants-2.1.0/Examples/include/Atropos.h
Examining data/ants-2.1.0/Examples/include/AverageAffineTransform.h
Examining data/ants-2.1.0/Examples/include/AverageAffineTransformNoRigid.h
Examining data/ants-2.1.0/Examples/include/AverageImages.h
Examining data/ants-2.1.0/Examples/include/AverageTensorImages.h
Examining data/ants-2.1.0/Examples/include/CheckTopology.h
Examining data/ants-2.1.0/Examples/include/ClusterImageStatistics.h
Examining data/ants-2.1.0/Examples/include/ComposeMultiTransform.h
Examining data/ants-2.1.0/Examples/include/CompositeTransformUtil.h
Examining data/ants-2.1.0/Examples/include/ComputeSimilarityMetric.h
Examining data/ants-2.1.0/Examples/include/ConformalMapping.h
Examining data/ants-2.1.0/Examples/include/ConvertImagePixelType.h
Examining data/ants-2.1.0/Examples/include/ConvertInputImagePixelTypeToFloat.h
Examining data/ants-2.1.0/Examples/include/ConvertScalarImageToRGB.h
Examining data/ants-2.1.0/Examples/include/ConvertToJpg.h
Examining data/ants-2.1.0/Examples/include/ConvertTransformFile.h
Examining data/ants-2.1.0/Examples/include/ConvertVectorFieldToVTK.h
Examining data/ants-2.1.0/Examples/include/CopyImageHeaderInformation.h
Examining data/ants-2.1.0/Examples/include/CreateDTICohort.h
Examining data/ants-2.1.0/Examples/include/CreateDisplacementField.h
Examining data/ants-2.1.0/Examples/include/CreateImage.h
Examining data/ants-2.1.0/Examples/include/CreateJacobianDeterminantImage.h
Examining data/ants-2.1.0/Examples/include/CreateTiledMosaic.h
Examining data/ants-2.1.0/Examples/include/CreateWarpedGridImage.h
Examining data/ants-2.1.0/Examples/include/DeNrrd.h
Examining data/ants-2.1.0/Examples/include/ExtractRegionFromImage.h
Examining data/ants-2.1.0/Examples/include/ExtractRegionFromImageByMask.h
Examining data/ants-2.1.0/Examples/include/ExtractSliceFromImage.h
Examining data/ants-2.1.0/Examples/include/FitBSplineCurveToPoints.h
Examining data/ants-2.1.0/Examples/include/GetConnectedComponentsFeatureImages.h
Examining data/ants-2.1.0/Examples/include/GetMeshAndTopology.h
Examining data/ants-2.1.0/Examples/include/ImageCompare.h
Examining data/ants-2.1.0/Examples/include/ImageIntensityStatistics.h
Examining data/ants-2.1.0/Examples/include/ImageMath.h
Examining data/ants-2.1.0/Examples/include/ImageSetStatistics.h
Examining data/ants-2.1.0/Examples/include/KellyKapowski.h
Examining data/ants-2.1.0/Examples/include/KellySlater.h
Examining data/ants-2.1.0/Examples/include/LabelClustersUniquely.h
Examining data/ants-2.1.0/Examples/include/LabelGeometryMeasures.h
Examining data/ants-2.1.0/Examples/include/LabelOverlapMeasures.h
Examining data/ants-2.1.0/Examples/include/LaplacianThickness.h
Examining data/ants-2.1.0/Examples/include/LesionFilling.h
Examining data/ants-2.1.0/Examples/include/MeasureImageSimilarity.h
Examining data/ants-2.1.0/Examples/include/MeasureMinMaxMean.h
Examining data/ants-2.1.0/Examples/include/MemoryTest.h
Examining data/ants-2.1.0/Examples/include/MultiplyImages.h
Examining data/ants-2.1.0/Examples/include/N3BiasFieldCorrection.h
Examining data/ants-2.1.0/Examples/include/N4BiasFieldCorrection.h
Examining data/ants-2.1.0/Examples/include/PasteImageIntoImage.h
Examining data/ants-2.1.0/Examples/include/PermuteFlipImageOrientationAxes.h
Examining data/ants-2.1.0/Examples/include/PrintHeader.h
Examining data/ants-2.1.0/Examples/include/RebaseTensorImage.h
Examining data/ants-2.1.0/Examples/include/ReorientTensorImage.h
Examining data/ants-2.1.0/Examples/include/ResampleImage.h
Examining data/ants-2.1.0/Examples/include/ResampleImageBySpacing.h
Examining data/ants-2.1.0/Examples/include/ResetDirection.h
Examining data/ants-2.1.0/Examples/include/SetDirectionByMatrix.h
Examining data/ants-2.1.0/Examples/include/SetOrigin.h
Examining data/ants-2.1.0/Examples/include/SetSpacing.h
Examining data/ants-2.1.0/Examples/include/SmoothImage.h
Examining data/ants-2.1.0/Examples/include/StackSlices.h
Examining data/ants-2.1.0/Examples/include/StudentsTestOnImages.h
Examining data/ants-2.1.0/Examples/include/SurfaceBasedSmoothing.h
Examining data/ants-2.1.0/Examples/include/SurfaceCurvature.h
Examining data/ants-2.1.0/Examples/include/TensorDerivedImage.h
Examining data/ants-2.1.0/Examples/include/TextureCooccurrenceFeatures.h
Examining data/ants-2.1.0/Examples/include/TextureRunLengthFeatures.h
Examining data/ants-2.1.0/Examples/include/ThresholdImage.h
Examining data/ants-2.1.0/Examples/include/TileImages.h
Examining data/ants-2.1.0/Examples/include/TimeSCCAN.h
Examining data/ants-2.1.0/Examples/include/WarpImageMultiTransform.h
Examining data/ants-2.1.0/Examples/include/WarpTensorImageMultiTransform.h
Examining data/ants-2.1.0/Examples/include/WarpTimeSeriesImageMultiTransform.h
Examining data/ants-2.1.0/Examples/include/WarpVTKPolyDataMultiTransform.h
Examining data/ants-2.1.0/Examples/include/ants.h
Examining data/ants-2.1.0/Examples/include/antsAffineInitializer.h
Examining data/ants-2.1.0/Examples/include/antsAlignOrigin.h
Examining data/ants-2.1.0/Examples/include/antsApplyTransforms.h
Examining data/ants-2.1.0/Examples/include/antsApplyTransformsToPoints.h
Examining data/ants-2.1.0/Examples/include/antsImageRead.h
Examining data/ants-2.1.0/Examples/include/antsImageWrite.h
Examining data/ants-2.1.0/Examples/include/antsMotionCorr.h
Examining data/ants-2.1.0/Examples/include/antsMotionCorrDiffusionDirection.h
Examining data/ants-2.1.0/Examples/include/antsMotionCorrStats.h
Examining data/ants-2.1.0/Examples/include/antsRegistration.h
Examining data/ants-2.1.0/Examples/include/antsSliceRegularizedRegistration.h
Examining data/ants-2.1.0/Examples/include/antsSurf.h
Examining data/ants-2.1.0/Examples/include/antsTransformInfo.h
Examining data/ants-2.1.0/Examples/include/antsUtilitiesTesting.h
Examining data/ants-2.1.0/Examples/include/ants_moco.h
Examining data/ants-2.1.0/Examples/include/compareTwoTransforms.h
Examining data/ants-2.1.0/Examples/include/itkCommandLineParserTest.h
Examining data/ants-2.1.0/Examples/include/sccan.h
Examining data/ants-2.1.0/Examples/include/simpleSynRegistration.h
Examining data/ants-2.1.0/Examples/itkCommandLineParserTest.cxx
Examining data/ants-2.1.0/Examples/itkTestMain.h
Examining data/ants-2.1.0/Examples/itkantsRegistrationHelper.h
Examining data/ants-2.1.0/Examples/sccan.cxx
Examining data/ants-2.1.0/Examples/simpleSynRegistration.cxx
Examining data/ants-2.1.0/Examples/antsRegistrationOptimizerCommandIterationUpdate.h
Examining data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/AdaBoost.h
Examining data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx
Examining data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx
Examining data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/util.h
Examining data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx
Examining data/ants-2.1.0/ExternalApplications/MALF/JointFusion/WeightedVotingLabelFusionImageFilter.h
Examining data/ants-2.1.0/ImageRegistration/ANTS_affine_registration.h
Examining data/ants-2.1.0/ImageRegistration/ANTS_affine_registration2.h
Examining data/ants-2.1.0/ImageRegistration/itkANTSAffine3DTransform.h
Examining data/ants-2.1.0/ImageRegistration/itkANTSCenteredAffine2DTransform.h
Examining data/ants-2.1.0/ImageRegistration/itkANTSImageRegistrationOptimizer.cxx
Examining data/ants-2.1.0/ImageRegistration/itkANTSImageRegistrationOptimizer.h
Examining data/ants-2.1.0/ImageRegistration/itkANTSImageTransformation.cxx
Examining data/ants-2.1.0/ImageRegistration/itkANTSImageTransformation.h
Examining data/ants-2.1.0/ImageRegistration/itkANTSLabeledPointSet.h
Examining data/ants-2.1.0/ImageRegistration/itkANTSSimilarityMetric.h
Examining data/ants-2.1.0/ImageRegistration/itkAvantsMutualInformationRegistrationFunction.cxx
Examining data/ants-2.1.0/ImageRegistration/itkAvantsMutualInformationRegistrationFunction.h
Examining data/ants-2.1.0/ImageRegistration/itkAvantsPDEDeformableRegistrationFunction.h
Examining data/ants-2.1.0/ImageRegistration/itkCrossCorrelationRegistrationFunction.cxx
Examining data/ants-2.1.0/ImageRegistration/itkCrossCorrelationRegistrationFunction.h
Examining data/ants-2.1.0/ImageRegistration/itkExpectationBasedPointSetRegistrationFunction.h
Examining data/ants-2.1.0/ImageRegistration/itkJensenHavrdaCharvatTsallisLabeledPointSetMetric.h
Examining data/ants-2.1.0/ImageRegistration/itkJensenHavrdaCharvatTsallisPointSetMetric.h
Examining data/ants-2.1.0/ImageRegistration/itkJensenTsallisBSplineRegistrationFunction.h
Examining data/ants-2.1.0/ImageRegistration/itkPICSLAdvancedNormalizationToolKit.h
Examining data/ants-2.1.0/ImageRegistration/itkProbabilisticRegistrationFunction.cxx
Examining data/ants-2.1.0/ImageRegistration/itkProbabilisticRegistrationFunction.h
Examining data/ants-2.1.0/ImageRegistration/itkSpatialMutualInformationRegistrationFunction.cxx
Examining data/ants-2.1.0/ImageRegistration/itkSpatialMutualInformationRegistrationFunction.h
Examining data/ants-2.1.0/ImageRegistration/itkSyNDemonsRegistrationFunction.cxx
Examining data/ants-2.1.0/ImageRegistration/itkSyNDemonsRegistrationFunction.h
Examining data/ants-2.1.0/ImageRegistration/itkVectorParameterizedNeighborhoodOperatorImageFilter.h
Examining data/ants-2.1.0/ImageSegmentation/antsAtroposSegmentationImageFilter.h
Examining data/ants-2.1.0/ImageSegmentation/antsBoxPlotQuantileListSampleFilter.h
Examining data/ants-2.1.0/ImageSegmentation/antsGaussianListSampleFunction.h
Examining data/ants-2.1.0/ImageSegmentation/antsGrubbsRosnerListSampleFilter.h
Examining data/ants-2.1.0/ImageSegmentation/antsHistogramParzenWindowsListSampleFunction.h
Examining data/ants-2.1.0/ImageSegmentation/antsJointHistogramParzenShapeAndOrientationListSampleFunction.h
Examining data/ants-2.1.0/ImageSegmentation/antsJointHistogramParzenWindowsListSampleFunction.h
Examining data/ants-2.1.0/ImageSegmentation/antsListSampleFunction.h
Examining data/ants-2.1.0/ImageSegmentation/antsListSampleToListSampleFilter.h
Examining data/ants-2.1.0/ImageSegmentation/antsLogEuclideanGaussianListSampleFunction.h
Examining data/ants-2.1.0/ImageSegmentation/antsManifoldParzenWindowsListSampleFunction.h
Examining data/ants-2.1.0/ImageSegmentation/antsPartialVolumeGaussianListSampleFunction.h
Examining data/ants-2.1.0/ImageSegmentation/antsPassThroughListSampleFilter.h
Examining data/ants-2.1.0/Temporary/antsFastMarchingImageFilter.h
Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangular.cxx
Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangular.h
Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangularLaplaceBeltrami.cxx
Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangularLaplaceBeltrami.h
Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangularMembrane.cxx
Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangularMembrane.h
Examining data/ants-2.1.0/Temporary/itkAddConstantToImageFilter.h
Examining data/ants-2.1.0/Temporary/itkDijkstrasAlgorithm.cxx
Examining data/ants-2.1.0/Temporary/itkDijkstrasAlgorithm.h
Examining data/ants-2.1.0/Temporary/itkDivideByConstantImageFilter.h
Examining data/ants-2.1.0/Temporary/itkFEMConformalMap.cxx
Examining data/ants-2.1.0/Temporary/itkFEMConformalMap.h
Examining data/ants-2.1.0/Temporary/itkFEMDiscConformalMap.cxx
Examining data/ants-2.1.0/Temporary/itkFEMDiscConformalMap.h
Examining data/ants-2.1.0/Temporary/itkFEMElement3DMembrane1DOF.h
Examining data/ants-2.1.0/Temporary/itkManifoldIntegrationAlgorithm.cxx
Examining data/ants-2.1.0/Temporary/itkManifoldIntegrationAlgorithm.h
Examining data/ants-2.1.0/Temporary/itkMultiplyByConstantImageFilter.h
Examining data/ants-2.1.0/Temporary/topological_numbers.h
Examining data/ants-2.1.0/Tensor/TensorFunctions.h
Examining data/ants-2.1.0/Tensor/itkDecomposeTensorFunction2.h
Examining data/ants-2.1.0/Tensor/itkExpTensorImageFilter.h
Examining data/ants-2.1.0/Tensor/itkLogTensorImageFilter.h
Examining data/ants-2.1.0/Tensor/itkPreservationOfPrincipalDirectionTensorReorientationImageFilter.cxx
Examining data/ants-2.1.0/Tensor/itkPreservationOfPrincipalDirectionTensorReorientationImageFilter.h
Examining data/ants-2.1.0/Tensor/itkRotationMatrixFromVectors.h
Examining data/ants-2.1.0/Tensor/itkWarpTensorImageMultiTransformFilter.h
Examining data/ants-2.1.0/Utilities/BinaryImageToMeshFilter.h
Examining data/ants-2.1.0/Utilities/ReadWriteData.cxx
Examining data/ants-2.1.0/Utilities/ReadWriteData.h
Examining data/ants-2.1.0/Utilities/antsAllocImage.h
Examining data/ants-2.1.0/Utilities/antsCommandLineOption.cxx
Examining data/ants-2.1.0/Utilities/antsCommandLineOption.h
Examining data/ants-2.1.0/Utilities/antsCommandLineParser.cxx
Examining data/ants-2.1.0/Utilities/antsCommandLineParser.h
Examining data/ants-2.1.0/Utilities/antsMatrixUtilities.h
Examining data/ants-2.1.0/Utilities/antsSCCANObject.h
Examining data/ants-2.1.0/Utilities/itkAlternatingValueDifferenceImageFilter.h
Examining data/ants-2.1.0/Utilities/itkAlternatingValueSimpleSubtractionImageFilter.h
Examining data/ants-2.1.0/Utilities/itkAverageAffineTransformFunction.h
Examining data/ants-2.1.0/Utilities/itkAverageAffineTransformNoRigidFunction.h
Examining data/ants-2.1.0/Utilities/itkAverageOverDimensionImageFilter.h
Examining data/ants-2.1.0/Utilities/itkComposeDiffeomorphismsImageFilter.h
Examining data/ants-2.1.0/Utilities/itkDecomposeTensorFunction.h
Examining data/ants-2.1.0/Utilities/itkDeformationFieldGradientTensorImageFilter.h
Examining data/ants-2.1.0/Utilities/itkDeterminantTensorImageFilter.h
Examining data/ants-2.1.0/Utilities/itkDiReCTImageFilter.h
Examining data/ants-2.1.0/Utilities/itkDisplacementFieldFromMultiTransformFilter.h
Examining data/ants-2.1.0/Utilities/itkGeneralToBSplineDisplacementFieldFilter.h
Examining data/ants-2.1.0/Utilities/itkGeometricJacobianDeterminantImageFilter.h
Examining data/ants-2.1.0/Utilities/itkLabelOverlapMeasuresImageFilter.h
Examining data/ants-2.1.0/Utilities/itkLabelPerimeterEstimationCalculator.h
Examining data/ants-2.1.0/Utilities/itkLabeledPointSetFileReader.h
Examining data/ants-2.1.0/Utilities/itkLabeledPointSetFileWriter.h
Examining data/ants-2.1.0/Utilities/itkManifoldParzenWindowsPointSetFunction.h
Examining data/ants-2.1.0/Utilities/itkMultiScaleLaplacianBlobDetectorImageFilter.h
Examining data/ants-2.1.0/Utilities/itkMultiplyByConstantVectorImageFilter.h
Examining data/ants-2.1.0/Utilities/itkN3MRIBiasFieldCorrectionImageFilter.h
Examining data/ants-2.1.0/Utilities/itkNeighborhoodFirstOrderStatisticsImageFilter.h
Examining data/ants-2.1.0/Utilities/itkOptimalSharpeningImageFilter.h
Examining data/ants-2.1.0/Utilities/itkPointSetFunction.h
Examining data/ants-2.1.0/Utilities/itkPseudoContinuousArterialSpinLabeledCerebralBloodFlowImageFilter.h
Examining data/ants-2.1.0/Utilities/itkPulsedArterialSpinLabeledCerebralBloodFlowImageFilter.h
Examining data/ants-2.1.0/Utilities/itkSliceTimingCorrectionImageFilter.h
Examining data/ants-2.1.0/Utilities/itkSplitAlternatingTimeSeriesImageFilter.h
Examining data/ants-2.1.0/Utilities/itkSurfaceCurvatureBase.h
Examining data/ants-2.1.0/Utilities/itkSurfaceImageCurvature.h
Examining data/ants-2.1.0/Utilities/itkSurfaceMeshCurvature.h
Examining data/ants-2.1.0/Utilities/itkTextureHistogram.h
Examining data/ants-2.1.0/Utilities/itkVectorFieldGradientImageFunction.h
Examining data/ants-2.1.0/Utilities/itkVectorGaussianInterpolateImageFunction.h
Examining data/ants-2.1.0/Utilities/itkVectorImageFileReader.h
Examining data/ants-2.1.0/Utilities/itkVectorImageFileWriter.h
Examining data/ants-2.1.0/Utilities/itkWarpImageMultiTransformFilter.h
Examining data/ants-2.1.0/Utilities/itkWarpImageWAffineFilter.h
Examining data/ants-2.1.0/Utilities/itkWarpTensorImageMultiTransformFilter.h
Examining data/ants-2.1.0/Utilities/itkantsReadWriteTransform.h
Examining data/ants-2.1.0/antsRegistrationCLP/antsRegistrationCLP.cxx

FINAL RESULTS:

data/ants-2.1.0/Examples/ANTS.cxx:302:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( my_argv[arg_count], arg.c_str() );
data/ants-2.1.0/Examples/ANTS.cxx:311:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy( my_argv[arg_count], arg.c_str() );
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:695:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if( sscanf( lineBuffer, "%s ", filenm) != 1 )
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:724:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if( sscanf( lineBuffer, "%s ", filenm) != 1 )
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:765:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if( sscanf( lineBuffer, "%s ", filenm) != 1 )
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:805:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if( sscanf( lineBuffer, "%s ", filenm) != 1 )
data/ants-2.1.0/Examples/sccan.cxx:547:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if( sscanf( lineBuffer, "%s ", filenm) != 1 )
data/ants-2.1.0/Examples/sccan.cxx:1005:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if( sscanf( lineBuffer, "%s ", filenm) != 1 )
data/ants-2.1.0/Examples/sccan.cxx:1029:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if( sscanf( lineBufferVec, "%s ", filenmVec) != 1 )
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:501:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (fileName, "%s-AdaBoostResults-param-Tlabel%d",p.fnOutput.c_str(),p.targetLabel);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:505:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (fileName, "%s-AdaBoostResults-Tlabel%d",p.fnOutput.c_str(),p.targetLabel);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:200:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(tfn, "%s-AdaBoostResults-param-Tlabel0", argv[2]);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:272:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tfn, "%s-AdaBoostResults-param-Tlabel%d", argv[2], Tlabel);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:287:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tfn, "%s-AdaBoostResults-Tlabel%d", argv[2], Tlabel);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:322:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buffer, featurefn[i0].data(), Tlabel);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:342:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buffer, maskFn.data(), Tlabel);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:536:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buffer, posteriorFn.c_str(), Tlabel);
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:372:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buffer, p.fnPosterior.c_str(), 100);
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:382:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buffer, p.fnWeight.c_str(), 100);
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:549:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buffer, p.fnPosterior.c_str(), (int) it->first);
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:586:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buffer, p.fnWeight.c_str(), (int) it->first);
data/ants-2.1.0/Examples/ANTSUseDeformationFieldToGetAffineTransform.cxx:266:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand( time(ITK_NULLPTR) );
data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:109:16:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    first = 1; srand(time(NULL) );
data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:126:16:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    first = 1; srand(time(NULL) );
data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:172:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(time(NULL) );
data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:215:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(time(NULL) );
data/ants-2.1.0/Examples/antsRegistrationTemplateHeader.h:875:52:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        samplingStrategy = RegistrationHelperType::random;
data/ants-2.1.0/ImageRegistration/ANTS_affine_registration.h:212:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(time_seed);
data/ants-2.1.0/ImageRegistration/ANTS_affine_registration.h:1003:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(time_seed);
data/ants-2.1.0/Examples/ANTS.cxx:122:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ANTS.cxx:166:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    dim = atoi( argv[1] );
data/ants-2.1.0/Examples/ANTS.cxx:180:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( argc == 3 && ( atoi( argv[1] ) != '-' || atoi( argv[1] ) != 2 || atoi( argv[1] ) != 3 ) )
data/ants-2.1.0/Examples/ANTS.cxx:180:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( argc == 3 && ( atoi( argv[1] ) != '-' || atoi( argv[1] ) != 2 || atoi( argv[1] ) != 3 ) )
data/ants-2.1.0/Examples/ANTS.cxx:180:72:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( argc == 3 && ( atoi( argv[1] ) != '-' || atoi( argv[1] ) != 2 || atoi( argv[1] ) != 3 ) )
data/ants-2.1.0/Examples/ANTS.cxx:289:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char * *     my_argv = new char *[my_argc];
data/ants-2.1.0/Examples/ANTSConformalMapping.cxx:481:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ANTSIntegrateVectorField.cxx:408:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ANTSIntegrateVelocityField.cxx:123:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ANTSJacobian.cxx:523:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    uselog = (bool)atoi(argv[3]);
data/ants-2.1.0/Examples/ANTSJacobian.cxx:528:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    norm = (bool)atoi(argv[5]);
data/ants-2.1.0/Examples/ANTSJacobian.cxx:559:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ANTSJacobian.cxx:615:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/ANTSUseDeformationFieldToGetAffineTransform.cxx:426:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetAffineTransform.cxx:378:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:208:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char line[256];
data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:333:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    enforceStationaryBoundary = static_cast<bool>( atoi( argv[7] ) );
data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:373:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int numberOfLevels = atoi( argv[5] );
data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:378:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    splineOrder = atoi( argv[6] );
data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:479:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/Atropos.cxx:1555:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/AverageAffineTransform.cxx:237:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/AverageAffineTransform.cxx:311:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  kImageDim = atoi(argv[1]);
data/ants-2.1.0/Examples/AverageAffineTransformNoRigid.cxx:236:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/AverageAffineTransformNoRigid.cxx:310:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  kImageDim = atoi(argv[1]);
data/ants-2.1.0/Examples/AverageImages.cxx:68:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const bool  normalizei = atoi(argv[3]);
data/ants-2.1.0/Examples/AverageImages.cxx:262:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/AverageImages.cxx:320:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int                 dim = atoi( argv[1] );
data/ants-2.1.0/Examples/AverageTensorImages.cxx:23:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int    mathtype = atoi(argv[3]);
data/ants-2.1.0/Examples/AverageTensorImages.cxx:98:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/AverageTensorImages.cxx:149:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int dim = atoi(argv[1]);
data/ants-2.1.0/Examples/CheckTopology.cxx:273:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ClusterImageStatistics.cxx:297:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ClusterImageStatistics.cxx:354:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/ComposeMultiTransform.cxx:295:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ComposeMultiTransform.cxx:368:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  kImageDim = atoi(argv[1]);
data/ants-2.1.0/Examples/CompositeTransformUtil.cxx:178:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* *      argv = new char *[argc + 1];
data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:50:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int whichmetric = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:166:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    logfile.open(logfilename.c_str(), std::ofstream::app);
data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:224:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:268:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/ConformalMapping.cxx:879:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ConformalMapping.cxx:953:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    fixdir = atoi(argv[5]);
data/ants-2.1.0/Examples/ConvertImagePixelType.cxx:105:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ConvertImagePixelType.cxx:171:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    typeoption = atoi(argv[3]);
data/ants-2.1.0/Examples/ConvertInputImagePixelTypeToFloat.cxx:89:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ConvertInputImagePixelTypeToFloat.cxx:151:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    typeoption = atoi(argv[3]);
data/ants-2.1.0/Examples/ConvertScalarImageToRGB.cxx:337:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ConvertScalarImageToRGB.cxx:387:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/ConvertToJpg.cxx:105:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ConvertTransformFile.cxx:346:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    outputStream.open(outFilename.c_str(), std::ios::out);
data/ants-2.1.0/Examples/ConvertTransformFile.cxx:463:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ConvertTransformFile.cxx:549:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int dimension = atoi( argv[1] );
data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:45:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:125:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( argc > 4 && atoi( argv[5] ) == (int) i )
data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:150:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( ( argc > 4 && idx[atoi( argv[5] )] != atoi( argv[4] ) ) || It.Get() == 0 )
data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:150:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( ( argc > 4 && idx[atoi( argv[5] )] != atoi( argv[4] ) ) || It.Get() == 0 )
data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:53:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( atoi(argv[7]) )
data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:67:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if( atoi(argv[6]) )
data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:74:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if( atoi(argv[5]) )
data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:81:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if( atoi(argv[4]) )
data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:102:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( atoi(argv[6]) )
data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:109:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( atoi(argv[5]) )
data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:116:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( atoi(argv[4]) )
data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:138:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/CreateDTICohort.cxx:1066:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/CreateDisplacementField.cxx:28:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  bool enforceZeroBoundaryFlag = static_cast<bool>( atoi( argv[2] ) );
data/ants-2.1.0/Examples/CreateDisplacementField.cxx:146:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/CreateDisplacementField.cxx:198:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  itk::SizeValueType imageDimension = atoi( argv[1] );
data/ants-2.1.0/Examples/CreateImage.cxx:126:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      switch( atoi( argv[5] ) )
data/ants-2.1.0/Examples/CreateImage.cxx:204:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      switch( atoi( argv[7] ) )
data/ants-2.1.0/Examples/CreateImage.cxx:257:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/CreateImage.cxx:306:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:42:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    calculateLogJacobian = static_cast<bool>( atoi( argv[4] ) );
data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:48:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    calculateGeometricJacobian = static_cast<bool>( atoi( argv[5] ) );
data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:137:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:178:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/CreateTiledMosaic.cxx:1001:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/CreateWarpedGridImage.cxx:146:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/CreateWarpedGridImage.cxx:194:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/DeNrrd.cxx:59:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char * * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/DeNrrd.cxx:159:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  gradientfile.open(output_gradients_filename);
data/ants-2.1.0/Examples/DeNrrd.cxx:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gradKey[20];
data/ants-2.1.0/Examples/DeNrrd.cxx:165:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( gradKey, "DWMRI_gradient_%04d", i );
data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx:65:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    region = stats->GetRegion( atoi( argv[4] ) );
data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx:97:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx:146:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:73:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const unsigned int label = (argc >= 6) ? atoi(argv[5]) : 1;
data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:79:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const unsigned int padWidth = (argc >= 7) ? atoi(argv[6]) : 0;
data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:121:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:171:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:29:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size[atoi( argv[4] )] = 0;
data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:32:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  index[atoi( argv[4] )] = atoi( argv[5] );
data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:32:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  index[atoi( argv[4] )] = atoi( argv[5] );
data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:63:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:110:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:126:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    order[0] = atoi( argv[3] );
data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:133:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    ncps[0] = atoi( argv[5] );
data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:140:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nlevels[0] = atoi( argv[4] );
data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:147:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    close[0] = atoi( argv[7] );
data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:195:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:239:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/GetConnectedComponentsFeatureImages.cxx:156:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/GetConnectedComponentsFeatureImages.cxx:199:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/GetMeshAndTopology.cxx:487:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/GetMeshAndTopology.cxx:586:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    inflate = atoi(argv[8]);
data/ants-2.1.0/Examples/ImageCompare.cxx:34:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ImageIntensityStatistics.cxx:191:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ImageIntensityStatistics.cxx:232:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/ImageMath.cxx:322:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int axis = atoi(argv[argct]);  argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:403:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    smallest = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:549:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    minclustersize = atoi( argv[argct] );
data/ants-2.1.0/Examples/ImageMath.cxx:652:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int slice = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:892:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    numberOfBins = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:1006:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int nx = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:1207:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    xslice = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:1213:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    yslice = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:1219:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    zslice = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:1516:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    usephyspace = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:1607:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    bins = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:1613:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    points = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:1716:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const unsigned int whichStat = static_cast<unsigned int>( atoi( argv[5] ) );
data/ants-2.1.0/Examples/ImageMath.cxx:1717:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const unsigned int rad = static_cast<unsigned int>( atoi( argv[6] ) );
data/ants-2.1.0/Examples/ImageMath.cxx:2268:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int n_sub_vols = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:2346:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( atoi(argv[argct++]) > 0 )
data/ants-2.1.0/Examples/ImageMath.cxx:2442:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( atoi(argv[argct++]) > 0 )
data/ants-2.1.0/Examples/ImageMath.cxx:2587:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        sincRadius = atoi( argv[argct++] );
data/ants-2.1.0/Examples/ImageMath.cxx:2600:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        order = atoi( argv[argct++] );
data/ants-2.1.0/Examples/ImageMath.cxx:2682:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int dim = atoi( argv[argct++] );
data/ants-2.1.0/Examples/ImageMath.cxx:2909:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    minRegionSize = atoi( argv[argct++] );
data/ants-2.1.0/Examples/ImageMath.cxx:3207:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int k_neighbors = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:3303:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  logfile.open(outname.c_str() );
data/ants-2.1.0/Examples/ImageMath.cxx:3499:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  bool        firstiscontrol = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:3692:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  bool        firstiscontrol = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:3944:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    n_comp_corr_vecs = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:4235:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    csflabel = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:4240:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    wmlabel = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:4715:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int sizevalx = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:4719:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    sizevaly = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:4724:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    sizevalz = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:4730:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    sizevalt = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:5743:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    whichvec = atoi(fn2.c_str() );
data/ants-2.1.0/Examples/ImageMath.cxx:7568:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    topocheck = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:7847:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    topocheck = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:8341:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    normalize = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:8393:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    normalize = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:8581:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    maximumNumberOfIterations = atoi( argv[8] );
data/ants-2.1.0/Examples/ImageMath.cxx:9071:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  logfile.open(outname.c_str() );
data/ants-2.1.0/Examples/ImageMath.cxx:9169:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  logfile.open(outname.c_str() );
data/ants-2.1.0/Examples/ImageMath.cxx:9307:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char LabelNumberAsString[50];
data/ants-2.1.0/Examples/ImageMath.cxx:9308:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(LabelNumberAsString, "%.2d", LabelNumber);
data/ants-2.1.0/Examples/ImageMath.cxx:9347:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char LabelNumberAsString[50];
data/ants-2.1.0/Examples/ImageMath.cxx:9348:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(LabelNumberAsString, "%.2d", LabelNumber);
data/ants-2.1.0/Examples/ImageMath.cxx:9545:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int whichvec = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:9697:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int timedims = atoi(argv[argct]);  argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:9782:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    shiftamount = atoi( argv[argct] );  argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:9787:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    shiftdim = atoi( argv[argct] );  argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:9825:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int timedims = atoi(argv[argct]);  argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:9940:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  logfile.open(outname.c_str() );
data/ants-2.1.0/Examples/ImageMath.cxx:10042:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         str[2000];
data/ants-2.1.0/Examples/ImageMath.cxx:10376:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  logfile.open(outname.c_str() );
data/ants-2.1.0/Examples/ImageMath.cxx:10653:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    dof = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:10712:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int rowcoloption = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:10896:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int n_samples = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:10990:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int n_evecs = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:11193:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  logfile.open(outname.c_str() );
data/ants-2.1.0/Examples/ImageMath.cxx:11240:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    radius = atoi(argv[argct]);
data/ants-2.1.0/Examples/ImageMath.cxx:11478:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char num[5];
data/ants-2.1.0/Examples/ImageMath.cxx:11479:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( num, "%04d", label );
data/ants-2.1.0/Examples/ImageMath.cxx:11560:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char num[5];
data/ants-2.1.0/Examples/ImageMath.cxx:11561:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( num, "%04d", label );
data/ants-2.1.0/Examples/ImageMath.cxx:11595:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    radius = atoi( argv[5 + 2 * nImages] );
data/ants-2.1.0/Examples/ImageMath.cxx:11775:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      r = atoi( argv[6] );
data/ants-2.1.0/Examples/ImageMath.cxx:11863:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      bins = atoi( argv[6] );
data/ants-2.1.0/Examples/ImageMath.cxx:11978:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int axis = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:11979:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int which = atoi(argv[argct]);   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:12992:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int nblobs = atoi( argv[argct] );   argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:13009:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    radval = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/ImageMath.cxx:14353:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ImageMath.cxx:14926:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int imageDimension = atoi(argv[1]);
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:638:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int whichstat = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:681:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               lineBuffer[maxChar];
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:682:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               filenm[maxChar];
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:796:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    inputStreamA.open( simimagelist.c_str() );
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:975:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:1036:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/KellyKapowski.cxx:601:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/KellySlater.cxx:523:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    alltheits = atoi(argv[argct]);
data/ants-2.1.0/Examples/KellySlater.cxx:1047:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/KellySlater.cxx:1100:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int dim = atoi(argv[1]);
data/ants-2.1.0/Examples/LabelClustersUniquely.cxx:127:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/LabelClustersUniquely.cxx:174:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx:225:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    doReflections = static_cast<bool>( atoi( argv[4] ) );
data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx:324:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx:379:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx:33:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( argc == 5 && atoi( argv[4] ) == 1 )
data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx:154:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx:202:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/LaplacianThickness.cxx:954:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/LesionFilling.cxx:224:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/LesionFilling.cxx:272:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:45:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int whichmetric = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:233:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    logfile.open(logfilename.c_str(), std::ofstream::app);
data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:306:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:366:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:43:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    takeabsval = atoi(argv[4]);
data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:120:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    logfile.open(argv[3], std::ofstream::app);
data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:145:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:192:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int                       dim = atoi( argv[1] );
data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:200:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/MemoryTest.cxx:42:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int whichmetric = atoi(argv[argct]); argct++;
data/ants-2.1.0/Examples/MemoryTest.cxx:48:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    numberoffields = atoi(argv[argct]);
data/ants-2.1.0/Examples/MemoryTest.cxx:132:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/MemoryTest.cxx:182:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/MultiplyImages.cxx:141:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/MultiplyImages.cxx:188:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int                       dim = atoi( argv[1] );
data/ants-2.1.0/Examples/MultiplyImages.cxx:196:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:96:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    shrinker->SetShrinkFactors( atoi( argv[4] ) );
data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:97:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    maskshrinker->SetShrinkFactors( atoi( argv[4] ) );
data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:110:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    correcter->SetMaximumNumberOfIterations( atoi( argv[6] ) );
data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:114:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    correcter->SetNumberOfFittingLevels( atoi( argv[7] ) );
data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:120:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    verbose = atoi( argv[8] );
data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:211:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:259:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/N4BiasFieldCorrection.cxx:727:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/PasteImageIntoImage.cxx:42:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    writeOver = static_cast<unsigned int>( atoi( argv[7] ) );
data/ants-2.1.0/Examples/PasteImageIntoImage.cxx:101:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/PasteImageIntoImage.cxx:159:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:65:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      upperFactors[0] = atoi(argv[3]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:69:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      upperFactors[1] = atoi(argv[4]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:73:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      lowerFactors[0] = atoi(argv[5]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:77:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      lowerFactors[1] = atoi(argv[6]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:81:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      flipaboutorigin = atoi(argv[7]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:88:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      upperFactors[0] = atoi(argv[3]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:92:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      upperFactors[1] = atoi(argv[4]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:96:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      upperFactors[2] = atoi(argv[5]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:100:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      lowerFactors[0] = atoi(argv[6]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:104:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      lowerFactors[1] = atoi(argv[7]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:108:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      lowerFactors[2] = atoi(argv[8]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:112:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      flipaboutorigin = atoi(argv[9]);
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:148:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:209:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/PrintHeader.cxx:134:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    switch( atoi( argv[2] ) )
data/ants-2.1.0/Examples/PrintHeader.cxx:404:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/RebaseTensorImage.cxx:41:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char * * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/RebaseTensorImage.cxx:88:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int dim = atoi(argv[1]);
data/ants-2.1.0/Examples/ReorientTensorImage.cxx:166:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ReorientTensorImage.cxx:216:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  dim = atoi(argv[1]);
data/ants-2.1.0/Examples/ResampleImage.cxx:94:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( argc <= 5 || atoi( argv[5] ) == 0 )
data/ants-2.1.0/Examples/ResampleImage.cxx:152:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( argc > 6 && atoi( argv[6] ) )
data/ants-2.1.0/Examples/ResampleImage.cxx:154:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    switch( atoi( argv[6] ) )
data/ants-2.1.0/Examples/ResampleImage.cxx:225:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if( argc > 7 && atoi( argv[7] ) >= 0 && atoi( argv[7] ) <= 5 )
data/ants-2.1.0/Examples/ResampleImage.cxx:225:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if( argc > 7 && atoi( argv[7] ) >= 0 && atoi( argv[7] ) <= 5 )
data/ants-2.1.0/Examples/ResampleImage.cxx:227:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          bs_interpolator->SetSplineOrder( atoi( argv[7] ) );
data/ants-2.1.0/Examples/ResampleImage.cxx:261:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ResampleImage.cxx:314:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:38:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:87:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int Dimension = atoi(argv[1]);
data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:123:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      dosmooth = atoi(argv[6]);
data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:128:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      addvox = atoi(argv[7]);
data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:133:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      nn = atoi(argv[7]);
data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:261:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      dosmooth = atoi(argv[7]);
data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:266:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      addvox = atoi(argv[8]);
data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:271:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      nn = atoi(argv[9]);
data/ants-2.1.0/Examples/ResetDirection.cxx:93:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/SetDirectionByMatrix.cxx:112:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/SetOrigin.cxx:101:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/SetOrigin.cxx:149:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/SetSpacing.cxx:103:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/SetSpacing.cxx:151:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/SmoothImage.cxx:47:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    usespacing = atoi(argv[5]);
data/ants-2.1.0/Examples/SmoothImage.cxx:52:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    usemedian = atoi(argv[6]);
data/ants-2.1.0/Examples/SmoothImage.cxx:125:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/SmoothImage.cxx:177:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/StackSlices.cxx:51:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/StackSlices.cxx:120:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  dimVars[0] = atoi( argv[2] );
data/ants-2.1.0/Examples/StackSlices.cxx:121:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  dimVars[1] = atoi( argv[3] );
data/ants-2.1.0/Examples/StackSlices.cxx:122:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  dimVars[2] = atoi( argv[4] );
data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:433:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int numSubjectsA = atoi(argv[3]);
data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:434:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int numSubjectsB = atoi(argv[4]);
data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:573:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:636:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/SurfaceBasedSmoothing.cxx:22:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/SurfaceBasedSmoothing.cxx:85:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    numrepeats = atoi(argv[5]);
data/ants-2.1.0/Examples/SurfaceCurvature.cxx:61:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/SurfaceCurvature.cxx:138:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    opt = (int) atoi(argv[4]);
data/ants-2.1.0/Examples/TensorDerivedImage.cxx:46:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/TensorDerivedImage.cxx:159:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int idx = atoi(outType.c_str() );
data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:58:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      label = static_cast<PixelType>( atoi( argv[5] ) );
data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:66:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    numberOfBins = static_cast<PixelType>( atoi( argv[3] ) );
data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:166:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:206:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:46:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      label = static_cast<PixelType>( atoi( argv[5] ) );
data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:55:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    numberOfBins = static_cast<PixelType>( atoi( argv[3] ) );
data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:137:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:182:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi( argv[1] ) )
data/ants-2.1.0/Examples/ThresholdImage.cxx:189:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    thresh = OtsuThreshold<FixedImageType>(atoi(argv[5]), fixed );
data/ants-2.1.0/Examples/ThresholdImage.cxx:224:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/ThresholdImage.cxx:277:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/TileImages.cxx:177:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/TileImages.cxx:249:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int ImageDimension = static_cast<int>( atoi( argv[1] ) );
data/ants-2.1.0/Examples/TimeSCCAN.cxx:786:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:639:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:803:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int  kImageDim = atoi(argv[1]);
data/ants-2.1.0/Examples/WarpTensorImageMultiTransform.cxx:493:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/WarpTensorImageMultiTransform.cxx:590:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int  kImageDim = atoi(argv[1]);
data/ants-2.1.0/Examples/WarpTimeSeriesImageMultiTransform.cxx:652:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/WarpTimeSeriesImageMultiTransform.cxx:748:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  kImageDim = atoi(argv[1]);
data/ants-2.1.0/Examples/WarpVTKPolyDataMultiTransform.cxx:500:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/WarpVTKPolyDataMultiTransform.cxx:551:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int  kImageDim = atoi(argv[1]);
data/ants-2.1.0/Examples/antsAffineInitializer.cxx:221:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    useprincaxis = atoi( argv[argct] );   argct++;
data/ants-2.1.0/Examples/antsAffineInitializer.cxx:225:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    localoptimizeriterations = atoi( argv[argct] );   argct++;
data/ants-2.1.0/Examples/antsAffineInitializer.cxx:538:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsAffineInitializer.cxx:593:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  switch( atoi(argv[1]) )
data/ants-2.1.0/Examples/antsAlignOrigin.cxx:227:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsApplyTransforms.cxx:783:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsApplyTransformsToPoints.cxx:366:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsMotionCorr.cxx:1701:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsMotionCorrDiffusionDirection.cxx:540:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsMotionCorrStats.cxx:109:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    transformIndex = atoi( transformOption->GetFunction(0)->GetName().c_str() );
data/ants-2.1.0/Examples/antsMotionCorrStats.cxx:490:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsRegistration.cxx:500:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsSliceRegularizedRegistration.cxx:1180:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsSurf.cxx:465:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char currentColor[3];
data/ants-2.1.0/Examples/antsSurf.cxx:999:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsTransformInfo.cxx:40:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:35:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:110:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int numberOfIterations = atoi( argv[3] );
data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:127:69:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  unsigned int rotationNumberOfSamples = static_cast<unsigned int>( atoi( argv[5] ) );
data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:332:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( static_cast<bool>( atoi( argv[6] ) ) )
data/ants-2.1.0/Examples/itkCommandLineParserTest.cxx:21:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/Examples/itkTestMain.h:130:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int numThreads = atoi(av[2]);
data/ants-2.1.0/Examples/itkTestMain.h:149:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        numberOfPixelsTolerance = atoi( av[2] );
data/ants-2.1.0/Examples/itkTestMain.h:155:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        radiusTolerance = atoi( av[2] );
data/ants-2.1.0/Examples/sccan.cxx:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               lineBuffer[maxChar];
data/ants-2.1.0/Examples/sccan.cxx:535:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               filenm[maxChar];
data/ants-2.1.0/Examples/sccan.cxx:992:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               lineBuffer[maxChar], lineBufferVec[maxChar];
data/ants-2.1.0/Examples/sccan.cxx:993:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               filenm[maxChar], filenmVec[maxChar];
data/ants-2.1.0/Examples/sccan.cxx:1045:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  myfile.open(fnmp.c_str(), std::ios::out );
data/ants-2.1.0/Examples/sccan.cxx:1614:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        myfile.open(fnmp.c_str(), std::ios::out );
data/ants-2.1.0/Examples/sccan.cxx:2447:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char* * argv = new char *[args.size() + 1];
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:145:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        p.targetLabel=atoi(argv[++j]);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:149:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        p.featureChannel=atoi(argv[++j]);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:154:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      p.DilateR = atoi(argv[++j]);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:162:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      p.iteration = atoi(argv[++j]);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:172:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      p.DX=atoi(t.c_str());
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:174:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      p.DY=atoi(t.c_str());
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:176:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      p.DZ=atoi(t.c_str());
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:500:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileName[1024];
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:520:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int dim = atoi(argv[1]);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             buffer[4096];
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:110:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int    label = atoi(argv[++j]);
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:199:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tfn[1024];
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:273:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ifs.open( tfn, ifstream::in );
data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:288:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ifs.open( tfn, ifstream::in );
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:162:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    s[i++] = atoi(t);
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:186:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  p.modality=atoi(argv[2]);
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:203:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        p.AtlasGroupID.push_back(atoi(argv[++j]));
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:237:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int label = atoi(argv[++j]);
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:367:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4096];
data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:617:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int dim = atoi(argv[1]);
data/ants-2.1.0/ImageRegistration/itkANTSImageRegistrationOptimizer.h:1445:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        bool use_all_metrics = (atoi(regularizationOption->GetFunction()->GetName().c_str() ) > 0);
data/ants-2.1.0/Temporary/itkFEMConformalMap.cxx:994:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f.open(filename);
data/ants-2.1.0/Temporary/itkFEMDiscConformalMap.cxx:1387:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f.open(filename);
data/ants-2.1.0/Temporary/topological_numbers.h:38:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char TOPOLOGICAL_NEIGHBORHOOD[3][3][3];
data/ants-2.1.0/Examples/ANTS.cxx:127:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ANTSConformalMapping.cxx:486:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ANTSIntegrateVectorField.cxx:413:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ANTSIntegrateVelocityField.cxx:128:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ANTSJacobian.cxx:564:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ANTSUseDeformationFieldToGetAffineTransform.cxx:431:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetAffineTransform.cxx:383:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:484:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/Atropos.cxx:1560:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/AverageAffineTransform.cxx:242:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/AverageAffineTransformNoRigid.cxx:241:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/AverageImages.cxx:267:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/AverageTensorImages.cxx:103:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/CheckTopology.cxx:278:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ClusterImageStatistics.cxx:302:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ComposeMultiTransform.cxx:300:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/CompositeTransformUtil.cxx:183:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:229:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ConformalMapping.cxx:884:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ConvertImagePixelType.cxx:110:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ConvertInputImagePixelTypeToFloat.cxx:94:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ConvertScalarImageToRGB.cxx:342:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ConvertToJpg.cxx:110:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ConvertTransformFile.cxx:468:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:50:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:143:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/CreateDTICohort.cxx:1071:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/CreateDisplacementField.cxx:151:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/CreateImage.cxx:262:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:142:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/CreateTiledMosaic.cxx:1006:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/CreateWarpedGridImage.cxx:151:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/DeNrrd.cxx:64:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx:102:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:126:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:68:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:200:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/GetConnectedComponentsFeatureImages.cxx:161:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/GetMeshAndTopology.cxx:492:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ImageCompare.cxx:39:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ImageIntensityStatistics.cxx:196:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ImageMath.cxx:14358:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ImageSetStatistics.cxx:980:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/KellyKapowski.cxx:606:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/KellySlater.cxx:1052:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/LabelClustersUniquely.cxx:132:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx:329:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx:159:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/LaplacianThickness.cxx:959:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/LesionFilling.cxx:229:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:311:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:150:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/MemoryTest.cxx:137:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/MultiplyImages.cxx:146:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:216:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/N4BiasFieldCorrection.cxx:732:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/PasteImageIntoImage.cxx:106:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:153:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/PrintHeader.cxx:409:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/RebaseTensorImage.cxx:46:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ReorientTensorImage.cxx:171:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ResampleImage.cxx:266:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:42:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ResetDirection.cxx:98:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/SetDirectionByMatrix.cxx:117:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/SetOrigin.cxx:106:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/SetSpacing.cxx:108:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/SmoothImage.cxx:130:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/StackSlices.cxx:56:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:578:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/SurfaceBasedSmoothing.cxx:27:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/SurfaceCurvature.cxx:66:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/TensorDerivedImage.cxx:51:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:171:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:142:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/ThresholdImage.cxx:229:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/TileImages.cxx:182:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/TimeSCCAN.cxx:791:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:76:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( strlen(s) > 3 && strcmp(s + strlen(s) - 3, "vox") == 0 )
data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:76:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( strlen(s) > 3 && strcmp(s + strlen(s) - 3, "vox") == 0 )
data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:79:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s[strlen(s) - 3] = 0;
data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:81:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      else if( strlen(s) > 2 && strcmp(s + strlen(s) - 2, "mm") == 0 )
data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:81:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      else if( strlen(s) > 2 && strcmp(s + strlen(s) - 2, "mm") == 0 )
data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:84:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s[strlen(s) - 2] = 0;
data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:644:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/WarpTensorImageMultiTransform.cxx:498:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/WarpTimeSeriesImageMultiTransform.cxx:657:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/WarpVTKPolyDataMultiTransform.cxx:505:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsAffineInitializer.cxx:543:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsAlignOrigin.cxx:232:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsApplyTransforms.cxx:788:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsApplyTransformsToPoints.cxx:371:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsMotionCorr.cxx:1706:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsMotionCorrDiffusionDirection.cxx:545:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsMotionCorrStats.cxx:495:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsRegistration.cxx:505:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsSliceRegularizedRegistration.cxx:1185:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsSurf.cxx:1004:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsTransformInfo.cxx:45:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:40:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/itkCommandLineParserTest.cxx:26:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );
data/ants-2.1.0/Examples/sccan.cxx:2452:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    std::strncpy( argv[i], args[i].c_str(), args[i].length() );

ANALYSIS SUMMARY:

Hits = 496
Lines analyzed = 112818 in approximately 2.65 seconds (42637 lines/second)
Physical Source Lines of Code (SLOC) = 84137
Hits@level = [0]   9 [1] 102 [2] 365 [3]   8 [4]  21 [5]   0
Hits@level+ = [0+] 505 [1+] 496 [2+] 394 [3+]  29 [4+]  21 [5+]   0
Hits/KSLOC@level+ = [0+] 6.00212 [1+] 5.89515 [2+] 4.68284 [3+] 0.344676 [4+] 0.249593 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.