Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/ants-2.1.0/Examples/ANTS.cxx Examining data/ants-2.1.0/Examples/ANTSConformalMapping.cxx Examining data/ants-2.1.0/Examples/ANTSIntegrateVectorField.cxx Examining data/ants-2.1.0/Examples/ANTSIntegrateVelocityField.cxx Examining data/ants-2.1.0/Examples/ANTSJacobian.cxx Examining data/ants-2.1.0/Examples/ANTSUseDeformationFieldToGetAffineTransform.cxx Examining data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetAffineTransform.cxx Examining data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx Examining data/ants-2.1.0/Examples/ANTsVersion.cxx Examining data/ants-2.1.0/Examples/ANTsVersion.h Examining data/ants-2.1.0/Examples/Atropos.cxx Examining data/ants-2.1.0/Examples/AverageAffineTransform.cxx Examining data/ants-2.1.0/Examples/AverageAffineTransformNoRigid.cxx Examining data/ants-2.1.0/Examples/AverageImages.cxx Examining data/ants-2.1.0/Examples/AverageTensorImages.cxx Examining data/ants-2.1.0/Examples/CheckTopology.cxx Examining data/ants-2.1.0/Examples/ClusterImageStatistics.cxx Examining data/ants-2.1.0/Examples/ComposeMultiTransform.cxx Examining data/ants-2.1.0/Examples/CompositeTransformUtil.cxx Examining data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx Examining data/ants-2.1.0/Examples/ConformalMapping.cxx Examining data/ants-2.1.0/Examples/ConvertImagePixelType.cxx Examining data/ants-2.1.0/Examples/ConvertInputImagePixelTypeToFloat.cxx Examining data/ants-2.1.0/Examples/ConvertScalarImageToRGB.cxx Examining data/ants-2.1.0/Examples/ConvertToJpg.cxx Examining data/ants-2.1.0/Examples/ConvertTransformFile.cxx Examining data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx Examining data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx Examining data/ants-2.1.0/Examples/CreateDTICohort.cxx Examining data/ants-2.1.0/Examples/CreateDisplacementField.cxx Examining data/ants-2.1.0/Examples/CreateImage.cxx Examining data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx Examining data/ants-2.1.0/Examples/CreateTiledMosaic.cxx Examining data/ants-2.1.0/Examples/CreateWarpedGridImage.cxx Examining data/ants-2.1.0/Examples/DeNrrd.cxx Examining data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx Examining data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx Examining data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx Examining data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx Examining data/ants-2.1.0/Examples/GetConnectedComponentsFeatureImages.cxx Examining data/ants-2.1.0/Examples/GetMeshAndTopology.cxx Examining data/ants-2.1.0/Examples/ImageCompare.cxx Examining data/ants-2.1.0/Examples/ImageIntensityStatistics.cxx Examining data/ants-2.1.0/Examples/ImageMath.cxx Examining data/ants-2.1.0/Examples/ImageSetStatistics.cxx Examining data/ants-2.1.0/Examples/KellyKapowski.cxx Examining data/ants-2.1.0/Examples/KellySlater.cxx Examining data/ants-2.1.0/Examples/LabelClustersUniquely.cxx Examining data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx Examining data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx Examining data/ants-2.1.0/Examples/LaplacianThickness.cxx Examining data/ants-2.1.0/Examples/LesionFilling.cxx Examining data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx Examining data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx Examining data/ants-2.1.0/Examples/MemoryTest.cxx Examining data/ants-2.1.0/Examples/MultiplyImages.cxx Examining data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx Examining data/ants-2.1.0/Examples/N4BiasFieldCorrection.cxx Examining data/ants-2.1.0/Examples/PasteImageIntoImage.cxx Examining data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx Examining data/ants-2.1.0/Examples/PrintHeader.cxx Examining data/ants-2.1.0/Examples/RebaseTensorImage.cxx Examining data/ants-2.1.0/Examples/ReorientTensorImage.cxx Examining data/ants-2.1.0/Examples/ResampleImage.cxx Examining data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx Examining data/ants-2.1.0/Examples/ResetDirection.cxx Examining data/ants-2.1.0/Examples/SetDirectionByMatrix.cxx Examining data/ants-2.1.0/Examples/SetOrigin.cxx Examining data/ants-2.1.0/Examples/SetSpacing.cxx Examining data/ants-2.1.0/Examples/SmoothImage.cxx Examining data/ants-2.1.0/Examples/StackSlices.cxx Examining data/ants-2.1.0/Examples/StudentsTestOnImages.cxx Examining data/ants-2.1.0/Examples/SurfaceBasedSmoothing.cxx Examining data/ants-2.1.0/Examples/SurfaceCurvature.cxx Examining data/ants-2.1.0/Examples/TensorDerivedImage.cxx Examining data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx Examining data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx Examining data/ants-2.1.0/Examples/ThresholdImage.cxx Examining data/ants-2.1.0/Examples/TileImages.cxx Examining data/ants-2.1.0/Examples/TimeSCCAN.cxx Examining data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx Examining data/ants-2.1.0/Examples/WarpTensorImageMultiTransform.cxx Examining data/ants-2.1.0/Examples/WarpTimeSeriesImageMultiTransform.cxx Examining data/ants-2.1.0/Examples/WarpVTKPolyDataMultiTransform.cxx Examining data/ants-2.1.0/Examples/antsAffineInitializer.cxx Examining data/ants-2.1.0/Examples/antsAlignOrigin.cxx Examining data/ants-2.1.0/Examples/antsApplyTransforms.cxx Examining data/ants-2.1.0/Examples/antsApplyTransformsToPoints.cxx Examining data/ants-2.1.0/Examples/antsDisplacementAndVelocityFieldRegistrationCommandIterationUpdate.h Examining data/ants-2.1.0/Examples/antsMotionCorr.cxx Examining data/ants-2.1.0/Examples/antsMotionCorrDiffusionDirection.cxx Examining data/ants-2.1.0/Examples/antsMotionCorrStats.cxx Examining data/ants-2.1.0/Examples/antsRegistration.cxx Examining data/ants-2.1.0/Examples/antsRegistration2DDouble.cxx Examining data/ants-2.1.0/Examples/antsRegistration2DFloat.cxx Examining data/ants-2.1.0/Examples/antsRegistration3DDouble.cxx Examining data/ants-2.1.0/Examples/antsRegistration3DFloat.cxx Examining data/ants-2.1.0/Examples/antsRegistration4DDouble.cxx Examining data/ants-2.1.0/Examples/antsRegistration4DFloat.cxx Examining data/ants-2.1.0/Examples/antsRegistrationCommandIterationUpdate.h Examining data/ants-2.1.0/Examples/antsRegistrationTemplateHeader.cxx Examining data/ants-2.1.0/Examples/antsRegistrationTemplateHeader.h Examining data/ants-2.1.0/Examples/antsSliceRegularizedRegistration.cxx Examining data/ants-2.1.0/Examples/antsSurf.cxx Examining data/ants-2.1.0/Examples/antsTransformInfo.cxx Examining data/ants-2.1.0/Examples/antsUtilities.cxx Examining data/ants-2.1.0/Examples/antsUtilities.h Examining data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx Examining data/ants-2.1.0/Examples/compareTwoTransforms.cxx Examining data/ants-2.1.0/Examples/include/ANTSConformalMapping.h Examining data/ants-2.1.0/Examples/include/ANTSIntegrateVectorField.h Examining data/ants-2.1.0/Examples/include/ANTSIntegrateVelocityField.h Examining data/ants-2.1.0/Examples/include/ANTSJacobian.h Examining data/ants-2.1.0/Examples/include/ANTSUseDeformationFieldToGetAffineTransform.h Examining data/ants-2.1.0/Examples/include/ANTSUseLandmarkImagesToGetAffineTransform.h Examining data/ants-2.1.0/Examples/include/ANTSUseLandmarkImagesToGetBSplineDisplacementField.h Examining data/ants-2.1.0/Examples/include/ANTS_.h Examining data/ants-2.1.0/Examples/include/Atropos.h Examining data/ants-2.1.0/Examples/include/AverageAffineTransform.h Examining data/ants-2.1.0/Examples/include/AverageAffineTransformNoRigid.h Examining data/ants-2.1.0/Examples/include/AverageImages.h Examining data/ants-2.1.0/Examples/include/AverageTensorImages.h Examining data/ants-2.1.0/Examples/include/CheckTopology.h Examining data/ants-2.1.0/Examples/include/ClusterImageStatistics.h Examining data/ants-2.1.0/Examples/include/ComposeMultiTransform.h Examining data/ants-2.1.0/Examples/include/CompositeTransformUtil.h Examining data/ants-2.1.0/Examples/include/ComputeSimilarityMetric.h Examining data/ants-2.1.0/Examples/include/ConformalMapping.h Examining data/ants-2.1.0/Examples/include/ConvertImagePixelType.h Examining data/ants-2.1.0/Examples/include/ConvertInputImagePixelTypeToFloat.h Examining data/ants-2.1.0/Examples/include/ConvertScalarImageToRGB.h Examining data/ants-2.1.0/Examples/include/ConvertToJpg.h Examining data/ants-2.1.0/Examples/include/ConvertTransformFile.h Examining data/ants-2.1.0/Examples/include/ConvertVectorFieldToVTK.h Examining data/ants-2.1.0/Examples/include/CopyImageHeaderInformation.h Examining data/ants-2.1.0/Examples/include/CreateDTICohort.h Examining data/ants-2.1.0/Examples/include/CreateDisplacementField.h Examining data/ants-2.1.0/Examples/include/CreateImage.h Examining data/ants-2.1.0/Examples/include/CreateJacobianDeterminantImage.h Examining data/ants-2.1.0/Examples/include/CreateTiledMosaic.h Examining data/ants-2.1.0/Examples/include/CreateWarpedGridImage.h Examining data/ants-2.1.0/Examples/include/DeNrrd.h Examining data/ants-2.1.0/Examples/include/ExtractRegionFromImage.h Examining data/ants-2.1.0/Examples/include/ExtractRegionFromImageByMask.h Examining data/ants-2.1.0/Examples/include/ExtractSliceFromImage.h Examining data/ants-2.1.0/Examples/include/FitBSplineCurveToPoints.h Examining data/ants-2.1.0/Examples/include/GetConnectedComponentsFeatureImages.h Examining data/ants-2.1.0/Examples/include/GetMeshAndTopology.h Examining data/ants-2.1.0/Examples/include/ImageCompare.h Examining data/ants-2.1.0/Examples/include/ImageIntensityStatistics.h Examining data/ants-2.1.0/Examples/include/ImageMath.h Examining data/ants-2.1.0/Examples/include/ImageSetStatistics.h Examining data/ants-2.1.0/Examples/include/KellyKapowski.h Examining data/ants-2.1.0/Examples/include/KellySlater.h Examining data/ants-2.1.0/Examples/include/LabelClustersUniquely.h Examining data/ants-2.1.0/Examples/include/LabelGeometryMeasures.h Examining data/ants-2.1.0/Examples/include/LabelOverlapMeasures.h Examining data/ants-2.1.0/Examples/include/LaplacianThickness.h Examining data/ants-2.1.0/Examples/include/LesionFilling.h Examining data/ants-2.1.0/Examples/include/MeasureImageSimilarity.h Examining data/ants-2.1.0/Examples/include/MeasureMinMaxMean.h Examining data/ants-2.1.0/Examples/include/MemoryTest.h Examining data/ants-2.1.0/Examples/include/MultiplyImages.h Examining data/ants-2.1.0/Examples/include/N3BiasFieldCorrection.h Examining data/ants-2.1.0/Examples/include/N4BiasFieldCorrection.h Examining data/ants-2.1.0/Examples/include/PasteImageIntoImage.h Examining data/ants-2.1.0/Examples/include/PermuteFlipImageOrientationAxes.h Examining data/ants-2.1.0/Examples/include/PrintHeader.h Examining data/ants-2.1.0/Examples/include/RebaseTensorImage.h Examining data/ants-2.1.0/Examples/include/ReorientTensorImage.h Examining data/ants-2.1.0/Examples/include/ResampleImage.h Examining data/ants-2.1.0/Examples/include/ResampleImageBySpacing.h Examining data/ants-2.1.0/Examples/include/ResetDirection.h Examining data/ants-2.1.0/Examples/include/SetDirectionByMatrix.h Examining data/ants-2.1.0/Examples/include/SetOrigin.h Examining data/ants-2.1.0/Examples/include/SetSpacing.h Examining data/ants-2.1.0/Examples/include/SmoothImage.h Examining data/ants-2.1.0/Examples/include/StackSlices.h Examining data/ants-2.1.0/Examples/include/StudentsTestOnImages.h Examining data/ants-2.1.0/Examples/include/SurfaceBasedSmoothing.h Examining data/ants-2.1.0/Examples/include/SurfaceCurvature.h Examining data/ants-2.1.0/Examples/include/TensorDerivedImage.h Examining data/ants-2.1.0/Examples/include/TextureCooccurrenceFeatures.h Examining data/ants-2.1.0/Examples/include/TextureRunLengthFeatures.h Examining data/ants-2.1.0/Examples/include/ThresholdImage.h Examining data/ants-2.1.0/Examples/include/TileImages.h Examining data/ants-2.1.0/Examples/include/TimeSCCAN.h Examining data/ants-2.1.0/Examples/include/WarpImageMultiTransform.h Examining data/ants-2.1.0/Examples/include/WarpTensorImageMultiTransform.h Examining data/ants-2.1.0/Examples/include/WarpTimeSeriesImageMultiTransform.h Examining data/ants-2.1.0/Examples/include/WarpVTKPolyDataMultiTransform.h Examining data/ants-2.1.0/Examples/include/ants.h Examining data/ants-2.1.0/Examples/include/antsAffineInitializer.h Examining data/ants-2.1.0/Examples/include/antsAlignOrigin.h Examining data/ants-2.1.0/Examples/include/antsApplyTransforms.h Examining data/ants-2.1.0/Examples/include/antsApplyTransformsToPoints.h Examining data/ants-2.1.0/Examples/include/antsImageRead.h Examining data/ants-2.1.0/Examples/include/antsImageWrite.h Examining data/ants-2.1.0/Examples/include/antsMotionCorr.h Examining data/ants-2.1.0/Examples/include/antsMotionCorrDiffusionDirection.h Examining data/ants-2.1.0/Examples/include/antsMotionCorrStats.h Examining data/ants-2.1.0/Examples/include/antsRegistration.h Examining data/ants-2.1.0/Examples/include/antsSliceRegularizedRegistration.h Examining data/ants-2.1.0/Examples/include/antsSurf.h Examining data/ants-2.1.0/Examples/include/antsTransformInfo.h Examining data/ants-2.1.0/Examples/include/antsUtilitiesTesting.h Examining data/ants-2.1.0/Examples/include/ants_moco.h Examining data/ants-2.1.0/Examples/include/compareTwoTransforms.h Examining data/ants-2.1.0/Examples/include/itkCommandLineParserTest.h Examining data/ants-2.1.0/Examples/include/sccan.h Examining data/ants-2.1.0/Examples/include/simpleSynRegistration.h Examining data/ants-2.1.0/Examples/itkCommandLineParserTest.cxx Examining data/ants-2.1.0/Examples/itkTestMain.h Examining data/ants-2.1.0/Examples/itkantsRegistrationHelper.h Examining data/ants-2.1.0/Examples/sccan.cxx Examining data/ants-2.1.0/Examples/simpleSynRegistration.cxx Examining data/ants-2.1.0/Examples/antsRegistrationOptimizerCommandIterationUpdate.h Examining data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/AdaBoost.h Examining data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx Examining data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx Examining data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/util.h Examining data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx Examining data/ants-2.1.0/ExternalApplications/MALF/JointFusion/WeightedVotingLabelFusionImageFilter.h Examining data/ants-2.1.0/ImageRegistration/ANTS_affine_registration.h Examining data/ants-2.1.0/ImageRegistration/ANTS_affine_registration2.h Examining data/ants-2.1.0/ImageRegistration/itkANTSAffine3DTransform.h Examining data/ants-2.1.0/ImageRegistration/itkANTSCenteredAffine2DTransform.h Examining data/ants-2.1.0/ImageRegistration/itkANTSImageRegistrationOptimizer.cxx Examining data/ants-2.1.0/ImageRegistration/itkANTSImageRegistrationOptimizer.h Examining data/ants-2.1.0/ImageRegistration/itkANTSImageTransformation.cxx Examining data/ants-2.1.0/ImageRegistration/itkANTSImageTransformation.h Examining data/ants-2.1.0/ImageRegistration/itkANTSLabeledPointSet.h Examining data/ants-2.1.0/ImageRegistration/itkANTSSimilarityMetric.h Examining data/ants-2.1.0/ImageRegistration/itkAvantsMutualInformationRegistrationFunction.cxx Examining data/ants-2.1.0/ImageRegistration/itkAvantsMutualInformationRegistrationFunction.h Examining data/ants-2.1.0/ImageRegistration/itkAvantsPDEDeformableRegistrationFunction.h Examining data/ants-2.1.0/ImageRegistration/itkCrossCorrelationRegistrationFunction.cxx Examining data/ants-2.1.0/ImageRegistration/itkCrossCorrelationRegistrationFunction.h Examining data/ants-2.1.0/ImageRegistration/itkExpectationBasedPointSetRegistrationFunction.h Examining data/ants-2.1.0/ImageRegistration/itkJensenHavrdaCharvatTsallisLabeledPointSetMetric.h Examining data/ants-2.1.0/ImageRegistration/itkJensenHavrdaCharvatTsallisPointSetMetric.h Examining data/ants-2.1.0/ImageRegistration/itkJensenTsallisBSplineRegistrationFunction.h Examining data/ants-2.1.0/ImageRegistration/itkPICSLAdvancedNormalizationToolKit.h Examining data/ants-2.1.0/ImageRegistration/itkProbabilisticRegistrationFunction.cxx Examining data/ants-2.1.0/ImageRegistration/itkProbabilisticRegistrationFunction.h Examining data/ants-2.1.0/ImageRegistration/itkSpatialMutualInformationRegistrationFunction.cxx Examining data/ants-2.1.0/ImageRegistration/itkSpatialMutualInformationRegistrationFunction.h Examining data/ants-2.1.0/ImageRegistration/itkSyNDemonsRegistrationFunction.cxx Examining data/ants-2.1.0/ImageRegistration/itkSyNDemonsRegistrationFunction.h Examining data/ants-2.1.0/ImageRegistration/itkVectorParameterizedNeighborhoodOperatorImageFilter.h Examining data/ants-2.1.0/ImageSegmentation/antsAtroposSegmentationImageFilter.h Examining data/ants-2.1.0/ImageSegmentation/antsBoxPlotQuantileListSampleFilter.h Examining data/ants-2.1.0/ImageSegmentation/antsGaussianListSampleFunction.h Examining data/ants-2.1.0/ImageSegmentation/antsGrubbsRosnerListSampleFilter.h Examining data/ants-2.1.0/ImageSegmentation/antsHistogramParzenWindowsListSampleFunction.h Examining data/ants-2.1.0/ImageSegmentation/antsJointHistogramParzenShapeAndOrientationListSampleFunction.h Examining data/ants-2.1.0/ImageSegmentation/antsJointHistogramParzenWindowsListSampleFunction.h Examining data/ants-2.1.0/ImageSegmentation/antsListSampleFunction.h Examining data/ants-2.1.0/ImageSegmentation/antsListSampleToListSampleFilter.h Examining data/ants-2.1.0/ImageSegmentation/antsLogEuclideanGaussianListSampleFunction.h Examining data/ants-2.1.0/ImageSegmentation/antsManifoldParzenWindowsListSampleFunction.h Examining data/ants-2.1.0/ImageSegmentation/antsPartialVolumeGaussianListSampleFunction.h Examining data/ants-2.1.0/ImageSegmentation/antsPassThroughListSampleFilter.h Examining data/ants-2.1.0/Temporary/antsFastMarchingImageFilter.h Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangular.cxx Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangular.h Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangularLaplaceBeltrami.cxx Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangularLaplaceBeltrami.h Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangularMembrane.cxx Examining data/ants-2.1.0/Temporary/deprecate_itkFEMElement3DC0LinearTriangularMembrane.h Examining data/ants-2.1.0/Temporary/itkAddConstantToImageFilter.h Examining data/ants-2.1.0/Temporary/itkDijkstrasAlgorithm.cxx Examining data/ants-2.1.0/Temporary/itkDijkstrasAlgorithm.h Examining data/ants-2.1.0/Temporary/itkDivideByConstantImageFilter.h Examining data/ants-2.1.0/Temporary/itkFEMConformalMap.cxx Examining data/ants-2.1.0/Temporary/itkFEMConformalMap.h Examining data/ants-2.1.0/Temporary/itkFEMDiscConformalMap.cxx Examining data/ants-2.1.0/Temporary/itkFEMDiscConformalMap.h Examining data/ants-2.1.0/Temporary/itkFEMElement3DMembrane1DOF.h Examining data/ants-2.1.0/Temporary/itkManifoldIntegrationAlgorithm.cxx Examining data/ants-2.1.0/Temporary/itkManifoldIntegrationAlgorithm.h Examining data/ants-2.1.0/Temporary/itkMultiplyByConstantImageFilter.h Examining data/ants-2.1.0/Temporary/topological_numbers.h Examining data/ants-2.1.0/Tensor/TensorFunctions.h Examining data/ants-2.1.0/Tensor/itkDecomposeTensorFunction2.h Examining data/ants-2.1.0/Tensor/itkExpTensorImageFilter.h Examining data/ants-2.1.0/Tensor/itkLogTensorImageFilter.h Examining data/ants-2.1.0/Tensor/itkPreservationOfPrincipalDirectionTensorReorientationImageFilter.cxx Examining data/ants-2.1.0/Tensor/itkPreservationOfPrincipalDirectionTensorReorientationImageFilter.h Examining data/ants-2.1.0/Tensor/itkRotationMatrixFromVectors.h Examining data/ants-2.1.0/Tensor/itkWarpTensorImageMultiTransformFilter.h Examining data/ants-2.1.0/Utilities/BinaryImageToMeshFilter.h Examining data/ants-2.1.0/Utilities/ReadWriteData.cxx Examining data/ants-2.1.0/Utilities/ReadWriteData.h Examining data/ants-2.1.0/Utilities/antsAllocImage.h Examining data/ants-2.1.0/Utilities/antsCommandLineOption.cxx Examining data/ants-2.1.0/Utilities/antsCommandLineOption.h Examining data/ants-2.1.0/Utilities/antsCommandLineParser.cxx Examining data/ants-2.1.0/Utilities/antsCommandLineParser.h Examining data/ants-2.1.0/Utilities/antsMatrixUtilities.h Examining data/ants-2.1.0/Utilities/antsSCCANObject.h Examining data/ants-2.1.0/Utilities/itkAlternatingValueDifferenceImageFilter.h Examining data/ants-2.1.0/Utilities/itkAlternatingValueSimpleSubtractionImageFilter.h Examining data/ants-2.1.0/Utilities/itkAverageAffineTransformFunction.h Examining data/ants-2.1.0/Utilities/itkAverageAffineTransformNoRigidFunction.h Examining data/ants-2.1.0/Utilities/itkAverageOverDimensionImageFilter.h Examining data/ants-2.1.0/Utilities/itkComposeDiffeomorphismsImageFilter.h Examining data/ants-2.1.0/Utilities/itkDecomposeTensorFunction.h Examining data/ants-2.1.0/Utilities/itkDeformationFieldGradientTensorImageFilter.h Examining data/ants-2.1.0/Utilities/itkDeterminantTensorImageFilter.h Examining data/ants-2.1.0/Utilities/itkDiReCTImageFilter.h Examining data/ants-2.1.0/Utilities/itkDisplacementFieldFromMultiTransformFilter.h Examining data/ants-2.1.0/Utilities/itkGeneralToBSplineDisplacementFieldFilter.h Examining data/ants-2.1.0/Utilities/itkGeometricJacobianDeterminantImageFilter.h Examining data/ants-2.1.0/Utilities/itkLabelOverlapMeasuresImageFilter.h Examining data/ants-2.1.0/Utilities/itkLabelPerimeterEstimationCalculator.h Examining data/ants-2.1.0/Utilities/itkLabeledPointSetFileReader.h Examining data/ants-2.1.0/Utilities/itkLabeledPointSetFileWriter.h Examining data/ants-2.1.0/Utilities/itkManifoldParzenWindowsPointSetFunction.h Examining data/ants-2.1.0/Utilities/itkMultiScaleLaplacianBlobDetectorImageFilter.h Examining data/ants-2.1.0/Utilities/itkMultiplyByConstantVectorImageFilter.h Examining data/ants-2.1.0/Utilities/itkN3MRIBiasFieldCorrectionImageFilter.h Examining data/ants-2.1.0/Utilities/itkNeighborhoodFirstOrderStatisticsImageFilter.h Examining data/ants-2.1.0/Utilities/itkOptimalSharpeningImageFilter.h Examining data/ants-2.1.0/Utilities/itkPointSetFunction.h Examining data/ants-2.1.0/Utilities/itkPseudoContinuousArterialSpinLabeledCerebralBloodFlowImageFilter.h Examining data/ants-2.1.0/Utilities/itkPulsedArterialSpinLabeledCerebralBloodFlowImageFilter.h Examining data/ants-2.1.0/Utilities/itkSliceTimingCorrectionImageFilter.h Examining data/ants-2.1.0/Utilities/itkSplitAlternatingTimeSeriesImageFilter.h Examining data/ants-2.1.0/Utilities/itkSurfaceCurvatureBase.h Examining data/ants-2.1.0/Utilities/itkSurfaceImageCurvature.h Examining data/ants-2.1.0/Utilities/itkSurfaceMeshCurvature.h Examining data/ants-2.1.0/Utilities/itkTextureHistogram.h Examining data/ants-2.1.0/Utilities/itkVectorFieldGradientImageFunction.h Examining data/ants-2.1.0/Utilities/itkVectorGaussianInterpolateImageFunction.h Examining data/ants-2.1.0/Utilities/itkVectorImageFileReader.h Examining data/ants-2.1.0/Utilities/itkVectorImageFileWriter.h Examining data/ants-2.1.0/Utilities/itkWarpImageMultiTransformFilter.h Examining data/ants-2.1.0/Utilities/itkWarpImageWAffineFilter.h Examining data/ants-2.1.0/Utilities/itkWarpTensorImageMultiTransformFilter.h Examining data/ants-2.1.0/Utilities/itkantsReadWriteTransform.h Examining data/ants-2.1.0/antsRegistrationCLP/antsRegistrationCLP.cxx FINAL RESULTS: data/ants-2.1.0/Examples/ANTS.cxx:302:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( my_argv[arg_count], arg.c_str() ); data/ants-2.1.0/Examples/ANTS.cxx:311:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( my_argv[arg_count], arg.c_str() ); data/ants-2.1.0/Examples/ImageSetStatistics.cxx:695:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if( sscanf( lineBuffer, "%s ", filenm) != 1 ) data/ants-2.1.0/Examples/ImageSetStatistics.cxx:724:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if( sscanf( lineBuffer, "%s ", filenm) != 1 ) data/ants-2.1.0/Examples/ImageSetStatistics.cxx:765:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if( sscanf( lineBuffer, "%s ", filenm) != 1 ) data/ants-2.1.0/Examples/ImageSetStatistics.cxx:805:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if( sscanf( lineBuffer, "%s ", filenm) != 1 ) data/ants-2.1.0/Examples/sccan.cxx:547:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if( sscanf( lineBuffer, "%s ", filenm) != 1 ) data/ants-2.1.0/Examples/sccan.cxx:1005:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if( sscanf( lineBuffer, "%s ", filenm) != 1 ) data/ants-2.1.0/Examples/sccan.cxx:1029:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if( sscanf( lineBufferVec, "%s ", filenmVec) != 1 ) data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:501:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (fileName, "%s-AdaBoostResults-param-Tlabel%d",p.fnOutput.c_str(),p.targetLabel); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:505:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (fileName, "%s-AdaBoostResults-Tlabel%d",p.fnOutput.c_str(),p.targetLabel); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:200:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tfn, "%s-AdaBoostResults-param-Tlabel0", argv[2]); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:272:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tfn, "%s-AdaBoostResults-param-Tlabel%d", argv[2], Tlabel); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:287:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tfn, "%s-AdaBoostResults-Tlabel%d", argv[2], Tlabel); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:322:7: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, featurefn[i0].data(), Tlabel); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:342:7: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, maskFn.data(), Tlabel); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:536:7: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, posteriorFn.c_str(), Tlabel); data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:372:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, p.fnPosterior.c_str(), 100); data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:382:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, p.fnWeight.c_str(), 100); data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:549:7: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, p.fnPosterior.c_str(), (int) it->first); data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:586:7: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, p.fnWeight.c_str(), (int) it->first); data/ants-2.1.0/Examples/ANTSUseDeformationFieldToGetAffineTransform.cxx:266:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand( time(ITK_NULLPTR) ); data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:109:16: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. first = 1; srand(time(NULL) ); data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:126:16: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. first = 1; srand(time(NULL) ); data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:172:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL) ); data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:215:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL) ); data/ants-2.1.0/Examples/antsRegistrationTemplateHeader.h:875:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. samplingStrategy = RegistrationHelperType::random; data/ants-2.1.0/ImageRegistration/ANTS_affine_registration.h:212:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time_seed); data/ants-2.1.0/ImageRegistration/ANTS_affine_registration.h:1003:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time_seed); data/ants-2.1.0/Examples/ANTS.cxx:122:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ANTS.cxx:166:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dim = atoi( argv[1] ); data/ants-2.1.0/Examples/ANTS.cxx:180:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( argc == 3 && ( atoi( argv[1] ) != '-' || atoi( argv[1] ) != 2 || atoi( argv[1] ) != 3 ) ) data/ants-2.1.0/Examples/ANTS.cxx:180:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( argc == 3 && ( atoi( argv[1] ) != '-' || atoi( argv[1] ) != 2 || atoi( argv[1] ) != 3 ) ) data/ants-2.1.0/Examples/ANTS.cxx:180:72: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( argc == 3 && ( atoi( argv[1] ) != '-' || atoi( argv[1] ) != 2 || atoi( argv[1] ) != 3 ) ) data/ants-2.1.0/Examples/ANTS.cxx:289:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * * my_argv = new char *[my_argc]; data/ants-2.1.0/Examples/ANTSConformalMapping.cxx:481:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ANTSIntegrateVectorField.cxx:408:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ANTSIntegrateVelocityField.cxx:123:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ANTSJacobian.cxx:523:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uselog = (bool)atoi(argv[3]); data/ants-2.1.0/Examples/ANTSJacobian.cxx:528:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). norm = (bool)atoi(argv[5]); data/ants-2.1.0/Examples/ANTSJacobian.cxx:559:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ANTSJacobian.cxx:615:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/ANTSUseDeformationFieldToGetAffineTransform.cxx:426:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetAffineTransform.cxx:378:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:208:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:333:52: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). enforceStationaryBoundary = static_cast<bool>( atoi( argv[7] ) ); data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:373:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int numberOfLevels = atoi( argv[5] ); data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:378:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). splineOrder = atoi( argv[6] ); data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:479:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/Atropos.cxx:1555:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/AverageAffineTransform.cxx:237:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/AverageAffineTransform.cxx:311:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int kImageDim = atoi(argv[1]); data/ants-2.1.0/Examples/AverageAffineTransformNoRigid.cxx:236:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/AverageAffineTransformNoRigid.cxx:310:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int kImageDim = atoi(argv[1]); data/ants-2.1.0/Examples/AverageImages.cxx:68:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const bool normalizei = atoi(argv[3]); data/ants-2.1.0/Examples/AverageImages.cxx:262:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/AverageImages.cxx:320:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int dim = atoi( argv[1] ); data/ants-2.1.0/Examples/AverageTensorImages.cxx:23:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int mathtype = atoi(argv[3]); data/ants-2.1.0/Examples/AverageTensorImages.cxx:98:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/AverageTensorImages.cxx:149:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dim = atoi(argv[1]); data/ants-2.1.0/Examples/CheckTopology.cxx:273:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ClusterImageStatistics.cxx:297:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ClusterImageStatistics.cxx:354:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/ComposeMultiTransform.cxx:295:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ComposeMultiTransform.cxx:368:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int kImageDim = atoi(argv[1]); data/ants-2.1.0/Examples/CompositeTransformUtil.cxx:178:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[argc + 1]; data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:50:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int whichmetric = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:166:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.open(logfilename.c_str(), std::ofstream::app); data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:224:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:268:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/ConformalMapping.cxx:879:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ConformalMapping.cxx:953:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fixdir = atoi(argv[5]); data/ants-2.1.0/Examples/ConvertImagePixelType.cxx:105:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ConvertImagePixelType.cxx:171:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). typeoption = atoi(argv[3]); data/ants-2.1.0/Examples/ConvertInputImagePixelTypeToFloat.cxx:89:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ConvertInputImagePixelTypeToFloat.cxx:151:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). typeoption = atoi(argv[3]); data/ants-2.1.0/Examples/ConvertScalarImageToRGB.cxx:337:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ConvertScalarImageToRGB.cxx:387:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/ConvertToJpg.cxx:105:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ConvertTransformFile.cxx:346:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outputStream.open(outFilename.c_str(), std::ios::out); data/ants-2.1.0/Examples/ConvertTransformFile.cxx:463:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ConvertTransformFile.cxx:549:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int dimension = atoi( argv[1] ); data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:45:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:125:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( argc > 4 && atoi( argv[5] ) == (int) i ) data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:150:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( ( argc > 4 && idx[atoi( argv[5] )] != atoi( argv[4] ) ) || It.Get() == 0 ) data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:150:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( ( argc > 4 && idx[atoi( argv[5] )] != atoi( argv[4] ) ) || It.Get() == 0 ) data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:53:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi(argv[7]) ) data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:67:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi(argv[6]) ) data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:74:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi(argv[5]) ) data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:81:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi(argv[4]) ) data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:102:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi(argv[6]) ) data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:109:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi(argv[5]) ) data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:116:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi(argv[4]) ) data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:138:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/CreateDTICohort.cxx:1066:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/CreateDisplacementField.cxx:28:53: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bool enforceZeroBoundaryFlag = static_cast<bool>( atoi( argv[2] ) ); data/ants-2.1.0/Examples/CreateDisplacementField.cxx:146:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/CreateDisplacementField.cxx:198:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itk::SizeValueType imageDimension = atoi( argv[1] ); data/ants-2.1.0/Examples/CreateImage.cxx:126:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[5] ) ) data/ants-2.1.0/Examples/CreateImage.cxx:204:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[7] ) ) data/ants-2.1.0/Examples/CreateImage.cxx:257:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/CreateImage.cxx:306:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:42:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). calculateLogJacobian = static_cast<bool>( atoi( argv[4] ) ); data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:48:53: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). calculateGeometricJacobian = static_cast<bool>( atoi( argv[5] ) ); data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:137:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:178:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/CreateTiledMosaic.cxx:1001:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/CreateWarpedGridImage.cxx:146:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/CreateWarpedGridImage.cxx:194:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/DeNrrd.cxx:59:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/DeNrrd.cxx:159:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). gradientfile.open(output_gradients_filename); data/ants-2.1.0/Examples/DeNrrd.cxx:164:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gradKey[20]; data/ants-2.1.0/Examples/DeNrrd.cxx:165:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( gradKey, "DWMRI_gradient_%04d", i ); data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx:65:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). region = stats->GetRegion( atoi( argv[4] ) ); data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx:97:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx:146:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:73:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const unsigned int label = (argc >= 6) ? atoi(argv[5]) : 1; data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:79:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const unsigned int padWidth = (argc >= 7) ? atoi(argv[6]) : 0; data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:121:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:171:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:29:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). size[atoi( argv[4] )] = 0; data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:32:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). index[atoi( argv[4] )] = atoi( argv[5] ); data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:32:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). index[atoi( argv[4] )] = atoi( argv[5] ); data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:63:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:110:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:126:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). order[0] = atoi( argv[3] ); data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:133:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ncps[0] = atoi( argv[5] ); data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:140:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nlevels[0] = atoi( argv[4] ); data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:147:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). close[0] = atoi( argv[7] ); data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:195:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:239:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/GetConnectedComponentsFeatureImages.cxx:156:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/GetConnectedComponentsFeatureImages.cxx:199:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/GetMeshAndTopology.cxx:487:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/GetMeshAndTopology.cxx:586:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). inflate = atoi(argv[8]); data/ants-2.1.0/Examples/ImageCompare.cxx:34:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ImageIntensityStatistics.cxx:191:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ImageIntensityStatistics.cxx:232:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/ImageMath.cxx:322:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int axis = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:403:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). smallest = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:549:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). minclustersize = atoi( argv[argct] ); data/ants-2.1.0/Examples/ImageMath.cxx:652:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int slice = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:892:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numberOfBins = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:1006:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int nx = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:1207:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). xslice = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:1213:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). yslice = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:1219:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zslice = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:1516:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). usephyspace = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:1607:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bins = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:1613:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). points = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:1716:61: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const unsigned int whichStat = static_cast<unsigned int>( atoi( argv[5] ) ); data/ants-2.1.0/Examples/ImageMath.cxx:1717:55: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const unsigned int rad = static_cast<unsigned int>( atoi( argv[6] ) ); data/ants-2.1.0/Examples/ImageMath.cxx:2268:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int n_sub_vols = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:2346:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi(argv[argct++]) > 0 ) data/ants-2.1.0/Examples/ImageMath.cxx:2442:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi(argv[argct++]) > 0 ) data/ants-2.1.0/Examples/ImageMath.cxx:2587:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sincRadius = atoi( argv[argct++] ); data/ants-2.1.0/Examples/ImageMath.cxx:2600:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). order = atoi( argv[argct++] ); data/ants-2.1.0/Examples/ImageMath.cxx:2682:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int dim = atoi( argv[argct++] ); data/ants-2.1.0/Examples/ImageMath.cxx:2909:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). minRegionSize = atoi( argv[argct++] ); data/ants-2.1.0/Examples/ImageMath.cxx:3207:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int k_neighbors = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:3303:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.open(outname.c_str() ); data/ants-2.1.0/Examples/ImageMath.cxx:3499:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bool firstiscontrol = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:3692:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bool firstiscontrol = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:3944:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). n_comp_corr_vecs = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:4235:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). csflabel = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:4240:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wmlabel = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:4715:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int sizevalx = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:4719:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sizevaly = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:4724:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sizevalz = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:4730:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sizevalt = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:5743:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). whichvec = atoi(fn2.c_str() ); data/ants-2.1.0/Examples/ImageMath.cxx:7568:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). topocheck = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:7847:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). topocheck = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:8341:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). normalize = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:8393:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). normalize = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:8581:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maximumNumberOfIterations = atoi( argv[8] ); data/ants-2.1.0/Examples/ImageMath.cxx:9071:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.open(outname.c_str() ); data/ants-2.1.0/Examples/ImageMath.cxx:9169:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.open(outname.c_str() ); data/ants-2.1.0/Examples/ImageMath.cxx:9307:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char LabelNumberAsString[50]; data/ants-2.1.0/Examples/ImageMath.cxx:9308:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(LabelNumberAsString, "%.2d", LabelNumber); data/ants-2.1.0/Examples/ImageMath.cxx:9347:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char LabelNumberAsString[50]; data/ants-2.1.0/Examples/ImageMath.cxx:9348:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(LabelNumberAsString, "%.2d", LabelNumber); data/ants-2.1.0/Examples/ImageMath.cxx:9545:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int whichvec = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:9697:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int timedims = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:9782:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). shiftamount = atoi( argv[argct] ); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:9787:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). shiftdim = atoi( argv[argct] ); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:9825:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int timedims = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:9940:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.open(outname.c_str() ); data/ants-2.1.0/Examples/ImageMath.cxx:10042:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[2000]; data/ants-2.1.0/Examples/ImageMath.cxx:10376:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.open(outname.c_str() ); data/ants-2.1.0/Examples/ImageMath.cxx:10653:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dof = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:10712:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int rowcoloption = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:10896:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int n_samples = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:10990:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int n_evecs = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:11193:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.open(outname.c_str() ); data/ants-2.1.0/Examples/ImageMath.cxx:11240:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). radius = atoi(argv[argct]); data/ants-2.1.0/Examples/ImageMath.cxx:11478:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[5]; data/ants-2.1.0/Examples/ImageMath.cxx:11479:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( num, "%04d", label ); data/ants-2.1.0/Examples/ImageMath.cxx:11560:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[5]; data/ants-2.1.0/Examples/ImageMath.cxx:11561:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( num, "%04d", label ); data/ants-2.1.0/Examples/ImageMath.cxx:11595:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). radius = atoi( argv[5 + 2 * nImages] ); data/ants-2.1.0/Examples/ImageMath.cxx:11775:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). r = atoi( argv[6] ); data/ants-2.1.0/Examples/ImageMath.cxx:11863:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bins = atoi( argv[6] ); data/ants-2.1.0/Examples/ImageMath.cxx:11978:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int axis = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:11979:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int which = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:12992:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int nblobs = atoi( argv[argct] ); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:13009:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). radval = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageMath.cxx:14353:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ImageMath.cxx:14926:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int imageDimension = atoi(argv[1]); data/ants-2.1.0/Examples/ImageSetStatistics.cxx:638:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int whichstat = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/ImageSetStatistics.cxx:681:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineBuffer[maxChar]; data/ants-2.1.0/Examples/ImageSetStatistics.cxx:682:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filenm[maxChar]; data/ants-2.1.0/Examples/ImageSetStatistics.cxx:796:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inputStreamA.open( simimagelist.c_str() ); data/ants-2.1.0/Examples/ImageSetStatistics.cxx:975:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ImageSetStatistics.cxx:1036:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/KellyKapowski.cxx:601:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/KellySlater.cxx:523:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). alltheits = atoi(argv[argct]); data/ants-2.1.0/Examples/KellySlater.cxx:1047:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/KellySlater.cxx:1100:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int dim = atoi(argv[1]); data/ants-2.1.0/Examples/LabelClustersUniquely.cxx:127:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/LabelClustersUniquely.cxx:174:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx:225:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). doReflections = static_cast<bool>( atoi( argv[4] ) ); data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx:324:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx:379:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx:33:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( argc == 5 && atoi( argv[4] ) == 1 ) data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx:154:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx:202:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/LaplacianThickness.cxx:954:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/LesionFilling.cxx:224:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/LesionFilling.cxx:272:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:45:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int whichmetric = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:233:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.open(logfilename.c_str(), std::ofstream::app); data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:306:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:366:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:43:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). takeabsval = atoi(argv[4]); data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:120:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.open(argv[3], std::ofstream::app); data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:145:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:192:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dim = atoi( argv[1] ); data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:200:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/MemoryTest.cxx:42:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int whichmetric = atoi(argv[argct]); argct++; data/ants-2.1.0/Examples/MemoryTest.cxx:48:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numberoffields = atoi(argv[argct]); data/ants-2.1.0/Examples/MemoryTest.cxx:132:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/MemoryTest.cxx:182:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/MultiplyImages.cxx:141:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/MultiplyImages.cxx:188:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dim = atoi( argv[1] ); data/ants-2.1.0/Examples/MultiplyImages.cxx:196:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:96:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). shrinker->SetShrinkFactors( atoi( argv[4] ) ); data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:97:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maskshrinker->SetShrinkFactors( atoi( argv[4] ) ); data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:110:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). correcter->SetMaximumNumberOfIterations( atoi( argv[6] ) ); data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:114:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). correcter->SetNumberOfFittingLevels( atoi( argv[7] ) ); data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:120:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). verbose = atoi( argv[8] ); data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:211:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:259:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/N4BiasFieldCorrection.cxx:727:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/PasteImageIntoImage.cxx:42:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). writeOver = static_cast<unsigned int>( atoi( argv[7] ) ); data/ants-2.1.0/Examples/PasteImageIntoImage.cxx:101:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/PasteImageIntoImage.cxx:159:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:65:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). upperFactors[0] = atoi(argv[3]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:69:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). upperFactors[1] = atoi(argv[4]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:73:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). lowerFactors[0] = atoi(argv[5]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:77:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). lowerFactors[1] = atoi(argv[6]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:81:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). flipaboutorigin = atoi(argv[7]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:88:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). upperFactors[0] = atoi(argv[3]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:92:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). upperFactors[1] = atoi(argv[4]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:96:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). upperFactors[2] = atoi(argv[5]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:100:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). lowerFactors[0] = atoi(argv[6]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:104:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). lowerFactors[1] = atoi(argv[7]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:108:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). lowerFactors[2] = atoi(argv[8]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:112:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). flipaboutorigin = atoi(argv[9]); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:148:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:209:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/PrintHeader.cxx:134:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[2] ) ) data/ants-2.1.0/Examples/PrintHeader.cxx:404:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/RebaseTensorImage.cxx:41:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/RebaseTensorImage.cxx:88:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int dim = atoi(argv[1]); data/ants-2.1.0/Examples/ReorientTensorImage.cxx:166:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ReorientTensorImage.cxx:216:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dim = atoi(argv[1]); data/ants-2.1.0/Examples/ResampleImage.cxx:94:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( argc <= 5 || atoi( argv[5] ) == 0 ) data/ants-2.1.0/Examples/ResampleImage.cxx:152:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( argc > 6 && atoi( argv[6] ) ) data/ants-2.1.0/Examples/ResampleImage.cxx:154:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[6] ) ) data/ants-2.1.0/Examples/ResampleImage.cxx:225:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( argc > 7 && atoi( argv[7] ) >= 0 && atoi( argv[7] ) <= 5 ) data/ants-2.1.0/Examples/ResampleImage.cxx:225:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( argc > 7 && atoi( argv[7] ) >= 0 && atoi( argv[7] ) <= 5 ) data/ants-2.1.0/Examples/ResampleImage.cxx:227:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bs_interpolator->SetSplineOrder( atoi( argv[7] ) ); data/ants-2.1.0/Examples/ResampleImage.cxx:261:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ResampleImage.cxx:314:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:38:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:87:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int Dimension = atoi(argv[1]); data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:123:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dosmooth = atoi(argv[6]); data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:128:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). addvox = atoi(argv[7]); data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:133:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nn = atoi(argv[7]); data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:261:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dosmooth = atoi(argv[7]); data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:266:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). addvox = atoi(argv[8]); data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:271:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nn = atoi(argv[9]); data/ants-2.1.0/Examples/ResetDirection.cxx:93:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/SetDirectionByMatrix.cxx:112:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/SetOrigin.cxx:101:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/SetOrigin.cxx:149:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/SetSpacing.cxx:103:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/SetSpacing.cxx:151:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/SmoothImage.cxx:47:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). usespacing = atoi(argv[5]); data/ants-2.1.0/Examples/SmoothImage.cxx:52:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). usemedian = atoi(argv[6]); data/ants-2.1.0/Examples/SmoothImage.cxx:125:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/SmoothImage.cxx:177:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/StackSlices.cxx:51:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/StackSlices.cxx:120:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dimVars[0] = atoi( argv[2] ); data/ants-2.1.0/Examples/StackSlices.cxx:121:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dimVars[1] = atoi( argv[3] ); data/ants-2.1.0/Examples/StackSlices.cxx:122:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dimVars[2] = atoi( argv[4] ); data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:433:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int numSubjectsA = atoi(argv[3]); data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:434:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int numSubjectsB = atoi(argv[4]); data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:573:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:636:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/SurfaceBasedSmoothing.cxx:22:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/SurfaceBasedSmoothing.cxx:85:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numrepeats = atoi(argv[5]); data/ants-2.1.0/Examples/SurfaceCurvature.cxx:61:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/SurfaceCurvature.cxx:138:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). opt = (int) atoi(argv[4]); data/ants-2.1.0/Examples/TensorDerivedImage.cxx:46:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/TensorDerivedImage.cxx:159:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int idx = atoi(outType.c_str() ); data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:58:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). label = static_cast<PixelType>( atoi( argv[5] ) ); data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:66:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numberOfBins = static_cast<PixelType>( atoi( argv[3] ) ); data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:166:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:206:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:46:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). label = static_cast<PixelType>( atoi( argv[5] ) ); data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:55:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numberOfBins = static_cast<PixelType>( atoi( argv[3] ) ); data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:137:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:182:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi( argv[1] ) ) data/ants-2.1.0/Examples/ThresholdImage.cxx:189:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). thresh = OtsuThreshold<FixedImageType>(atoi(argv[5]), fixed ); data/ants-2.1.0/Examples/ThresholdImage.cxx:224:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/ThresholdImage.cxx:277:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/TileImages.cxx:177:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/TileImages.cxx:249:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int ImageDimension = static_cast<int>( atoi( argv[1] ) ); data/ants-2.1.0/Examples/TimeSCCAN.cxx:786:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:639:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:803:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int kImageDim = atoi(argv[1]); data/ants-2.1.0/Examples/WarpTensorImageMultiTransform.cxx:493:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/WarpTensorImageMultiTransform.cxx:590:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int kImageDim = atoi(argv[1]); data/ants-2.1.0/Examples/WarpTimeSeriesImageMultiTransform.cxx:652:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/WarpTimeSeriesImageMultiTransform.cxx:748:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int kImageDim = atoi(argv[1]); data/ants-2.1.0/Examples/WarpVTKPolyDataMultiTransform.cxx:500:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/WarpVTKPolyDataMultiTransform.cxx:551:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int kImageDim = atoi(argv[1]); data/ants-2.1.0/Examples/antsAffineInitializer.cxx:221:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). useprincaxis = atoi( argv[argct] ); argct++; data/ants-2.1.0/Examples/antsAffineInitializer.cxx:225:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). localoptimizeriterations = atoi( argv[argct] ); argct++; data/ants-2.1.0/Examples/antsAffineInitializer.cxx:538:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsAffineInitializer.cxx:593:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch( atoi(argv[1]) ) data/ants-2.1.0/Examples/antsAlignOrigin.cxx:227:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsApplyTransforms.cxx:783:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsApplyTransformsToPoints.cxx:366:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsMotionCorr.cxx:1701:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsMotionCorrDiffusionDirection.cxx:540:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsMotionCorrStats.cxx:109:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). transformIndex = atoi( transformOption->GetFunction(0)->GetName().c_str() ); data/ants-2.1.0/Examples/antsMotionCorrStats.cxx:490:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsRegistration.cxx:500:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsSliceRegularizedRegistration.cxx:1180:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsSurf.cxx:465:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char currentColor[3]; data/ants-2.1.0/Examples/antsSurf.cxx:999:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsTransformInfo.cxx:40:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:35:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:110:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int numberOfIterations = atoi( argv[3] ); data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:127:69: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int rotationNumberOfSamples = static_cast<unsigned int>( atoi( argv[5] ) ); data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:332:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( static_cast<bool>( atoi( argv[6] ) ) ) data/ants-2.1.0/Examples/itkCommandLineParserTest.cxx:21:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/Examples/itkTestMain.h:130:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int numThreads = atoi(av[2]); data/ants-2.1.0/Examples/itkTestMain.h:149:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numberOfPixelsTolerance = atoi( av[2] ); data/ants-2.1.0/Examples/itkTestMain.h:155:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). radiusTolerance = atoi( av[2] ); data/ants-2.1.0/Examples/sccan.cxx:534:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineBuffer[maxChar]; data/ants-2.1.0/Examples/sccan.cxx:535:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filenm[maxChar]; data/ants-2.1.0/Examples/sccan.cxx:992:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineBuffer[maxChar], lineBufferVec[maxChar]; data/ants-2.1.0/Examples/sccan.cxx:993:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filenm[maxChar], filenmVec[maxChar]; data/ants-2.1.0/Examples/sccan.cxx:1045:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). myfile.open(fnmp.c_str(), std::ios::out ); data/ants-2.1.0/Examples/sccan.cxx:1614:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). myfile.open(fnmp.c_str(), std::ios::out ); data/ants-2.1.0/Examples/sccan.cxx:2447:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* * argv = new char *[args.size() + 1]; data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:145:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p.targetLabel=atoi(argv[++j]); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:149:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p.featureChannel=atoi(argv[++j]); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:154:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p.DilateR = atoi(argv[++j]); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:162:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p.iteration = atoi(argv[++j]); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:172:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p.DX=atoi(t.c_str()); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:174:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p.DY=atoi(t.c_str()); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:176:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p.DZ=atoi(t.c_str()); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:500:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[1024]; data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/BiasLearn.cxx:520:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dim = atoi(argv[1]); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:78:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4096]; data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:110:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int label = atoi(argv[++j]); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:199:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tfn[1024]; data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:273:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ifs.open( tfn, ifstream::in ); data/ants-2.1.0/ExternalApplications/MALF/CorrectiveLearning/segAdapter.cxx:288:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ifs.open( tfn, ifstream::in ); data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:162:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). s[i++] = atoi(t); data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:186:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p.modality=atoi(argv[2]); data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:203:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p.AtlasGroupID.push_back(atoi(argv[++j])); data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:237:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int label = atoi(argv[++j]); data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:367:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4096]; data/ants-2.1.0/ExternalApplications/MALF/JointFusion/LabelFusion.cxx:617:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dim = atoi(argv[1]); data/ants-2.1.0/ImageRegistration/itkANTSImageRegistrationOptimizer.h:1445:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bool use_all_metrics = (atoi(regularizationOption->GetFunction()->GetName().c_str() ) > 0); data/ants-2.1.0/Temporary/itkFEMConformalMap.cxx:994:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f.open(filename); data/ants-2.1.0/Temporary/itkFEMDiscConformalMap.cxx:1387:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f.open(filename); data/ants-2.1.0/Temporary/topological_numbers.h:38:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef unsigned char TOPOLOGICAL_NEIGHBORHOOD[3][3][3]; data/ants-2.1.0/Examples/ANTS.cxx:127:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ANTSConformalMapping.cxx:486:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ANTSIntegrateVectorField.cxx:413:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ANTSIntegrateVelocityField.cxx:128:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ANTSJacobian.cxx:564:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ANTSUseDeformationFieldToGetAffineTransform.cxx:431:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetAffineTransform.cxx:383:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ANTSUseLandmarkImagesToGetBSplineDisplacementField.cxx:484:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/Atropos.cxx:1560:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/AverageAffineTransform.cxx:242:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/AverageAffineTransformNoRigid.cxx:241:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/AverageImages.cxx:267:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/AverageTensorImages.cxx:103:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/CheckTopology.cxx:278:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ClusterImageStatistics.cxx:302:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ComposeMultiTransform.cxx:300:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/CompositeTransformUtil.cxx:183:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ComputeSimilarityMetric.cxx:229:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ConformalMapping.cxx:884:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ConvertImagePixelType.cxx:110:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ConvertInputImagePixelTypeToFloat.cxx:94:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ConvertScalarImageToRGB.cxx:342:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ConvertToJpg.cxx:110:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ConvertTransformFile.cxx:468:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ConvertVectorFieldToVTK.cxx:50:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/CopyImageHeaderInformation.cxx:143:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/CreateDTICohort.cxx:1071:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/CreateDisplacementField.cxx:151:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/CreateImage.cxx:262:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/CreateJacobianDeterminantImage.cxx:142:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/CreateTiledMosaic.cxx:1006:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/CreateWarpedGridImage.cxx:151:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/DeNrrd.cxx:64:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ExtractRegionFromImage.cxx:102:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ExtractRegionFromImageByMask.cxx:126:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ExtractSliceFromImage.cxx:68:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/FitBSplineCurveToPoints.cxx:200:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/GetConnectedComponentsFeatureImages.cxx:161:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/GetMeshAndTopology.cxx:492:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ImageCompare.cxx:39:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ImageIntensityStatistics.cxx:196:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ImageMath.cxx:14358:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ImageSetStatistics.cxx:980:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/KellyKapowski.cxx:606:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/KellySlater.cxx:1052:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/LabelClustersUniquely.cxx:132:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/LabelGeometryMeasures.cxx:329:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/LabelOverlapMeasures.cxx:159:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/LaplacianThickness.cxx:959:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/LesionFilling.cxx:229:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/MeasureImageSimilarity.cxx:311:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/MeasureMinMaxMean.cxx:150:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/MemoryTest.cxx:137:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/MultiplyImages.cxx:146:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/N3BiasFieldCorrection.cxx:216:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/N4BiasFieldCorrection.cxx:732:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/PasteImageIntoImage.cxx:106:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/PermuteFlipImageOrientationAxes.cxx:153:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/PrintHeader.cxx:409:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/RebaseTensorImage.cxx:46:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ReorientTensorImage.cxx:171:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ResampleImage.cxx:266:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ResampleImageBySpacing.cxx:42:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ResetDirection.cxx:98:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/SetDirectionByMatrix.cxx:117:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/SetOrigin.cxx:106:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/SetSpacing.cxx:108:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/SmoothImage.cxx:130:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/StackSlices.cxx:56:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/StudentsTestOnImages.cxx:578:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/SurfaceBasedSmoothing.cxx:27:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/SurfaceCurvature.cxx:66:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/TensorDerivedImage.cxx:51:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/TextureCooccurrenceFeatures.cxx:171:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/TextureRunLengthFeatures.cxx:142:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/ThresholdImage.cxx:229:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/TileImages.cxx:182:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/TimeSCCAN.cxx:791:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:76:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen(s) > 3 && strcmp(s + strlen(s) - 3, "vox") == 0 ) data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:76:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen(s) > 3 && strcmp(s + strlen(s) - 3, "vox") == 0 ) data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:79:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s[strlen(s) - 3] = 0; data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:81:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strlen(s) > 2 && strcmp(s + strlen(s) - 2, "mm") == 0 ) data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:81:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strlen(s) > 2 && strcmp(s + strlen(s) - 2, "mm") == 0 ) data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:84:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s[strlen(s) - 2] = 0; data/ants-2.1.0/Examples/WarpImageMultiTransform.cxx:644:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/WarpTensorImageMultiTransform.cxx:498:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/WarpTimeSeriesImageMultiTransform.cxx:657:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/WarpVTKPolyDataMultiTransform.cxx:505:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsAffineInitializer.cxx:543:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsAlignOrigin.cxx:232:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsApplyTransforms.cxx:788:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsApplyTransformsToPoints.cxx:371:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsMotionCorr.cxx:1706:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsMotionCorrDiffusionDirection.cxx:545:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsMotionCorrStats.cxx:495:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsRegistration.cxx:505:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsSliceRegularizedRegistration.cxx:1185:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsSurf.cxx:1004:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsTransformInfo.cxx:45:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/antsUtilitiesTesting.cxx:40:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/itkCommandLineParserTest.cxx:26:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); data/ants-2.1.0/Examples/sccan.cxx:2452:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy( argv[i], args[i].c_str(), args[i].length() ); ANALYSIS SUMMARY: Hits = 496 Lines analyzed = 112818 in approximately 2.65 seconds (42637 lines/second) Physical Source Lines of Code (SLOC) = 84137 Hits@level = [0] 9 [1] 102 [2] 365 [3] 8 [4] 21 [5] 0 Hits@level+ = [0+] 505 [1+] 496 [2+] 394 [3+] 29 [4+] 21 [5+] 0 Hits/KSLOC@level+ = [0+] 6.00212 [1+] 5.89515 [2+] 4.68284 [3+] 0.344676 [4+] 0.249593 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.