Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/802.11.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/802.1d.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/bcmeth.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/bcmevent.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/bcmip.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/ethernet.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/ieee80211_radiotap.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/wpa.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/bcmcrypto/tkhash.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/bcmdefs.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/bcmendian.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/bcmutils.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/epivers.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/linuxver.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/osl.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/packed_section_end.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/packed_section_start.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/pcicfg.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/siutils.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/typedefs.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/include/wlioctl.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/shared/bcmwifi/include/bcmwifi_channels.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/shared/bcmwifi/include/bcmwifi_rates.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_dbg.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_export.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wlc_ethereal.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wlc_key.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wlc_types.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wlc_utils.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wlc_wowl.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wlc_pub.h
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c
Examining data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c
Examining data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/802.11.h
Examining data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/802.1d.h
Examining data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/bcmeth.h
Examining data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/bcmevent.h
Examining data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/bcmip.h
Examining data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/ethernet.h
Examining data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/ieee80211_radiotap.h
Examining data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/wpa.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/bcmcrypto/tkhash.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/bcmdefs.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/bcmendian.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/bcmutils.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/epivers.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/linuxver.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/osl.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/packed_section_end.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/packed_section_start.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/pcicfg.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/siutils.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/typedefs.h
Examining data/broadcom-sta-6.30.223.271/i386/src/include/wlioctl.h
Examining data/broadcom-sta-6.30.223.271/i386/src/shared/bcmwifi/include/bcmwifi_channels.h
Examining data/broadcom-sta-6.30.223.271/i386/src/shared/bcmwifi/include/bcmwifi_rates.h
Examining data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_dbg.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_export.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wlc_ethereal.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wlc_key.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wlc_pub.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wlc_types.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wlc_utils.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wlc_wowl.h
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c
Examining data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c

FINAL RESULTS:

data/broadcom-sta-6.30.223.271/amd64/src/include/bcmutils.h:24:57:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define bcm_strcpy_s(dst, noOfElements, src)            strcpy((dst), (src))
data/broadcom-sta-6.30.223.271/amd64/src/include/bcmutils.h:26:57:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define bcm_strcat_s(dst, noOfElements, src)            strcat((dst), (src))
data/broadcom-sta-6.30.223.271/amd64/src/include/bcmutils.h:27:26:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define bcm_sprintf_s    snprintf
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:152:10:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	#define	printf(fmt, args...)	printk(fmt , ## args)
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:180:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	#undef printf
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:181:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	#undef sprintf
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:182:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	#undef snprintf
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:183:9:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	#undef vsprintf
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:184:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	#undef vsnprintf
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:185:10:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	#define	printf(fmt, args...)		osl_printf((fmt) , ## args)
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:186:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	#define sprintf(buf, fmt, args...)	osl_sprintf((buf), (fmt) , ## args)
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:187:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	#define snprintf(buf, n, fmt, args...)	osl_snprintf((buf), (n), (fmt) , ## args)
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:188:10:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	#define vsprintf(buf, fmt, ap)		osl_vsprintf((buf), (fmt), (ap))
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:189:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	#define vsnprintf(buf, n, fmt, ap)	osl_vsnprintf((buf), (n), (fmt), (ap))
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:199:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	#undef strcpy
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:206:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	#define	strcpy(d, s)			osl_strcpy((d), (s))
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:768:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(printbuf, 1024, format, args);
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:786:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	rc = vsprintf(buf, format, args);
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:798:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	rc = vsnprintf(buf, n, format, args);
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:806:10:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	return (vsprintf(buf, format, ap));
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:812:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	return (vsnprintf(buf, n, format, ap));
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:836:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	return (strcpy(d, s));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_dbg.h:32:30:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	                            printf(wlc_dbg_get_hw_timestamp()); }\
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_dbg.h:44:46:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define WL_PRINT(args)		do { WL_TIMESTAMP(); printf args; } while (0)
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:274:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(extra, flag);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1237:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(extra, iw->nickname);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:744:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(" (Compiled in " SRCBASE);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:1029:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmp1, "%s%d", HYBRID_PROC, wl->pub->unit);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2431:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(t->name, tname);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2541:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(phdr->devname, wl->dev->name);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:3107:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(wlif->name, "%s%d", devname, wl->pub->unit);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:3423:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s%d", HYBRID_PROC, wl->pub->unit);
data/broadcom-sta-6.30.223.271/i386/src/include/bcmutils.h:24:57:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define bcm_strcpy_s(dst, noOfElements, src)            strcpy((dst), (src))
data/broadcom-sta-6.30.223.271/i386/src/include/bcmutils.h:26:57:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define bcm_strcat_s(dst, noOfElements, src)            strcat((dst), (src))
data/broadcom-sta-6.30.223.271/i386/src/include/bcmutils.h:27:26:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define bcm_sprintf_s    snprintf
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:152:10:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	#define	printf(fmt, args...)	printk(fmt , ## args)
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:180:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	#undef printf
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:181:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	#undef sprintf
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:182:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	#undef snprintf
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:183:9:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	#undef vsprintf
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:184:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	#undef vsnprintf
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:185:10:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	#define	printf(fmt, args...)		osl_printf((fmt) , ## args)
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:186:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	#define sprintf(buf, fmt, args...)	osl_sprintf((buf), (fmt) , ## args)
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:187:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	#define snprintf(buf, n, fmt, args...)	osl_snprintf((buf), (n), (fmt) , ## args)
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:188:10:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	#define vsprintf(buf, fmt, ap)		osl_vsprintf((buf), (fmt), (ap))
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:189:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	#define vsnprintf(buf, n, fmt, ap)	osl_vsnprintf((buf), (n), (fmt), (ap))
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:199:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	#undef strcpy
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:206:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	#define	strcpy(d, s)			osl_strcpy((d), (s))
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:768:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(printbuf, 1024, format, args);
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:786:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	rc = vsprintf(buf, format, args);
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:798:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	rc = vsnprintf(buf, n, format, args);
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:806:10:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	return (vsprintf(buf, format, ap));
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:812:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	return (vsnprintf(buf, n, format, ap));
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:836:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	return (strcpy(d, s));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:449:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ifr.ifr_name, dev->name);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_dbg.h:32:30:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	                            printf(wlc_dbg_get_hw_timestamp()); }\
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_dbg.h:44:46:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define WL_PRINT(args)		do { WL_TIMESTAMP(); printf args; } while (0)
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:116:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ifr.ifr_name, dev->name);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:295:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(extra, flag);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1258:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(extra, iw->nickname);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:1017:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmp1, "%s%d", HYBRID_PROC, wl->pub->unit);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2378:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(t->name, tname);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2488:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(phdr->devname, wl->dev->name);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:3052:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(wlif->name, "%s%d", devname, wl->pub->unit);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:3368:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s%d", HYBRID_PROC, wl->pub->unit);
data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/bcmevent.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ifname[BCM_MSG_IFNAME_MAX]; 
data/broadcom-sta-6.30.223.271/amd64/src/common/include/proto/bcmevent.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ifname[BCM_MSG_IFNAME_MAX]; 
data/broadcom-sta-6.30.223.271/amd64/src/include/bcmdefs.h:36:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	typedef char STATIC_ASSERT_FAIL[(expr) ? 1 : -1] UNUSED_VAR; \
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:156:10:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#define	bcopy(src, dst, len)	memcpy((dst), (src), (len))
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:156:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#define	bcopy(src, dst, len)	memcpy((dst), (src), (len))
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:219:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#undef memcpy
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:222:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#define	memcpy(d, s, n)		osl_memcpy((d), (s), (n))
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:230:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#undef bcopy
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:233:10:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#define	bcopy(src, dst, len)	osl_memcpy((dst), (src), (len))
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	file[BCM_MEM_FILENAME_LEN];
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:676:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempbuf[256];
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:764:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char printbuf[1024];
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:866:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(d, s, n);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:537:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sr->ssid.SSID, ssids->ssid, sr->ssid.SSID_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:716:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)join_params.ssid.SSID, (void *)params->ssid, params->ssid_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:719:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&join_params.params.bssid, params->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:953:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(key.data, sme->key, key.len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1023:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(wl->profile->bssid, sme->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1033:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&join_params.ssid.SSID, sme->ssid, join_params.ssid.SSID_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1035:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&join_params.params.bssid, &ether_bcast, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1037:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(wl->profile->ssid.SSID, &join_params.ssid.SSID, join_params.ssid.SSID_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1068:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&scbval.ea, &wl->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1245:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)&key.ea, (void *)mac_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1254:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key.data, params->key, key.len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1259:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&key.data[24], &key.data[16], sizeof(keybuf));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1260:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&key.data[16], keybuf, sizeof(keybuf));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1333:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)&key.ea, (void *)mac_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1388:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)params.key, key.data, params.key_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1534:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&wl->pmk_list->pmkids.pmkid[i].BSSID, pmksa->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1535:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&wl->pmk_list->pmkids.pmkid[i].PMKID, pmksa->pmkid, WPA2_PMKID_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1562:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pmkid.pmkid[0].BSSID, pmksa->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1563:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pmkid.pmkid[0].PMKID, pmksa->pmkid, WPA2_PMKID_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1578:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&wl->pmk_list->pmkids.pmkid[i].BSSID,
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1580:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&wl->pmk_list->pmkids.pmkid[i].PMKID,
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1673:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rekey.kek, data->kek, WLC_KEK_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1674:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rekey.kck, data->kck, WLC_KCK_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1675:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rekey.replay_counter, data->replay_ctr, WLC_REPLAY_CTR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:1976:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mgmt->bssid, &bi->BSSID, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:2118:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&wl->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:2198:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, wl->ioctl_buf, buf_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:2396:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(wl->profile->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:2397:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&wl->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:2445:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&wl->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:2446:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(wl->profile->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:2843:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&e->emsg, msg, sizeof(wl_event_msg_t));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:3008:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ie->buf[ie->offset + 2], v, l);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:3023:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ie->buf[ie->offset], ie_stream, ie_size);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_cfg80211_hybrid.c:3038:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, &ie->buf[0], ie->offset);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[WLC_IOCTL_SMLEN];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:169:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(ioctlbuf, buf, buflen);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[WLC_IOCTL_SMLEN];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:266:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char extra[IW_CUSTOM_MAX + 1];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cap[5];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:344:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(cap, "abg");
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:346:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(cap, "bg");
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:350:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(cap, "abgn");
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:352:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(cap, "bgn");
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:697:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&iw->spy_addr[i], addr[i].sa_data, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:723:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(addr[i].sa_data, &iw->spy_addr[i], ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:725:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&qual[i], &iw->spy_qual[i], sizeof(struct iw_quality));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:809:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(&mlme->addr.sa_data, &scbval.ea, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:872:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(addr[dwrq->length].sa_data, &bi->BSSID, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:890:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&addr[dwrq->length], qual, sizeof(struct iw_quality) * dwrq->length);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:919:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ssid.SSID, req->essid, ssid.SSID_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1068:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iwe.u.ap_addr.sa_data, &bi->BSSID, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1152:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ssid.SSID, extra, ssid.SSID_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1191:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(extra, ssid.SSID, ssid.SSID_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1217:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iw->nickname, extra, dwrq->length);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1608:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key.data, extra, dwrq->length);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1696:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(extra, key.data, dwrq->length);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1800:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy((void *)&iwe->addr.sa_data, (char *)&key.ea, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1829:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy((void *)iwe->key, key.data, iwe->key_len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1833:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&key.data[24], keybuf, sizeof(keybuf));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1834:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&key.data[16], &key.data[24], sizeof(keybuf));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1890:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eabuf[ETHER_ADDR_STR_LEN];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1903:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(&iwpmksa->bssid.sa_data[0], &pmkidptr->pmkid[0].BSSID, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1904:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(&iwpmksa->pmkid[0], &pmkidptr->pmkid[0].PMKID, WPA2_PMKID_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1919:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&pmkid_array[i+1].BSSID,
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1922:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&pmkid_array[i+1].PMKID,
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1929:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(&iwpmksa->bssid.sa_data[0],
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1932:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(&iwpmksa->pmkid[0], &pmkid_array[pmkid_list.pmkids.npmkid].PMKID,
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2568:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char extra[IW_CUSTOM_MAX + 1];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2578:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(wrqu.addr.sa_data, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2613:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&extra[1], data, datalen);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2623:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&extra[1], &status, sizeof(status));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2637:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(micerrevt->src_addr.sa_data, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2647:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(extra, data, datalen);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2654:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(extra, data, datalen);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2675:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&pmkidcand->BSSID, &iwpmkidcand->bssid.sa_data,
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char iso_abbrev[WLC_CNTRY_BUF_SZ];	
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char custom_locale[WLC_CNTRY_BUF_SZ];	
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.h:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nickname[IW_ESSID_MAX_SIZE];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:228:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char intf_name[IFNAMSIZ] = quote_str(BRCM_WLAN_IFNAME);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:650:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(&wl->pub->cur_etheraddr, dev->dev_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:1028:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp1[128];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:1757:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, stats_watchdog, sizeof(struct net_device_stats));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:1861:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(sa->sa_data, dev->dev_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:1918:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(mclist->dmi_addr, &maclist->ea[i++], ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:1927:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(ha->addr, &maclist->ea[i++], ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2596:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(oskb->data + D11_PHY_HDR_LEN, pdata, oskb->len - D11_PHY_HDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2665:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rtl->vend_oui, brcm_oui, sizeof(brcm_oui));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2692:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rtht->vend_oui, brcm_oui, sizeof(brcm_oui));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2711:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(oskb->data + D11_PHY_HDR_LEN, pdata, oskb->len - D11_PHY_HDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2799:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rtl->vend_oui, brcm_oui, sizeof(brcm_oui));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2966:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(oskb->data + D11_PHY_HDR_LEN, pdata, oskb->len - D11_PHY_HDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2973:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				bcopy(amsdu_p->data, pdata, amsdu_p->len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:3033:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(wl->dev->dev_addr, dev->dev_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:3147:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(buf, (char *)PKTDATA(osh, p) + offset, len);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:3318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[8];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:3422:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IFNAMSIZ];		
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rfkill_name[32];
data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/bcmevent.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ifname[BCM_MSG_IFNAME_MAX]; 
data/broadcom-sta-6.30.223.271/i386/src/common/include/proto/bcmevent.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ifname[BCM_MSG_IFNAME_MAX]; 
data/broadcom-sta-6.30.223.271/i386/src/include/bcmdefs.h:36:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	typedef char STATIC_ASSERT_FAIL[(expr) ? 1 : -1] UNUSED_VAR; \
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:156:10:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#define	bcopy(src, dst, len)	memcpy((dst), (src), (len))
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:156:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#define	bcopy(src, dst, len)	memcpy((dst), (src), (len))
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:219:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#undef memcpy
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:222:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#define	memcpy(d, s, n)		osl_memcpy((d), (s), (n))
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:230:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#undef bcopy
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:233:10:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	#define	bcopy(src, dst, len)	osl_memcpy((dst), (src), (len))
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	file[BCM_MEM_FILENAME_LEN];
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:676:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempbuf[256];
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:764:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char printbuf[1024];
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:866:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(d, s, n);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:552:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sr->ssid.SSID, ssids->ssid, sr->ssid.SSID_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:731:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)join_params.ssid.SSID, (void *)params->ssid, params->ssid_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:734:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&join_params.params.bssid, params->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:967:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(key.data, sme->key, key.len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1037:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(wl->profile->bssid, sme->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1047:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&join_params.ssid.SSID, sme->ssid, join_params.ssid.SSID_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1049:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&join_params.params.bssid, &ether_bcast, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1051:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(wl->profile->ssid.SSID, &join_params.ssid.SSID, join_params.ssid.SSID_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1083:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&scbval.ea, &wl->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1258:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)&key.ea, (void *)mac_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1267:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key.data, params->key, key.len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1272:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&key.data[24], &key.data[16], sizeof(keybuf));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1273:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&key.data[16], keybuf, sizeof(keybuf));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1346:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)&key.ea, (void *)mac_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1401:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)params.key, key.data, params.key_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1545:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&wl->pmk_list->pmkids.pmkid[i].BSSID, pmksa->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1546:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&wl->pmk_list->pmkids.pmkid[i].PMKID, pmksa->pmkid, WPA2_PMKID_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1573:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pmkid.pmkid[0].BSSID, pmksa->bssid, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1574:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pmkid.pmkid[0].PMKID, pmksa->pmkid, WPA2_PMKID_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1589:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&wl->pmk_list->pmkids.pmkid[i].BSSID,
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1591:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&wl->pmk_list->pmkids.pmkid[i].PMKID,
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1684:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rekey.kek, data->kek, WLC_KEK_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1685:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rekey.kck, data->kck, WLC_KCK_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1686:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rekey.replay_counter, data->replay_ctr, WLC_REPLAY_CTR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:1987:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mgmt->bssid, &bi->BSSID, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2113:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&wl->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2193:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, wl->ioctl_buf, buf_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2368:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(wl->profile->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2369:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&wl->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2401:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&wl->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2402:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(wl->profile->bssid, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2792:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&e->emsg, msg, sizeof(wl_event_msg_t));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2950:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ie->buf[ie->offset + 2], v, l);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2965:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ie->buf[ie->offset], ie_stream, ie_size);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_cfg80211_hybrid.c:2980:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, &ie->buf[0], ie->offset);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[WLC_IOCTL_SMLEN];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:190:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(ioctlbuf, buf, buflen);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:203:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[WLC_IOCTL_SMLEN];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char extra[IW_CUSTOM_MAX + 1];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cap[5];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:365:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(cap, "abg");
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:367:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(cap, "bg");
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:371:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(cap, "abgn");
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:373:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(cap, "bgn");
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:718:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&iw->spy_addr[i], addr[i].sa_data, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:744:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(addr[i].sa_data, &iw->spy_addr[i], ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:746:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&qual[i], &iw->spy_qual[i], sizeof(struct iw_quality));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:830:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(&mlme->addr.sa_data, &scbval.ea, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:893:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(addr[dwrq->length].sa_data, &bi->BSSID, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:911:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&addr[dwrq->length], qual, sizeof(struct iw_quality) * dwrq->length);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:940:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ssid.SSID, req->essid, ssid.SSID_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1089:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iwe.u.ap_addr.sa_data, &bi->BSSID, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1173:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ssid.SSID, extra, ssid.SSID_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1212:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(extra, ssid.SSID, ssid.SSID_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1238:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iw->nickname, extra, dwrq->length);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1629:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key.data, extra, dwrq->length);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1717:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(extra, key.data, dwrq->length);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1821:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy((void *)&iwe->addr.sa_data, (char *)&key.ea, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1850:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy((void *)iwe->key, key.data, iwe->key_len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1854:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&key.data[24], keybuf, sizeof(keybuf));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1855:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&key.data[16], &key.data[24], sizeof(keybuf));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1911:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eabuf[ETHER_ADDR_STR_LEN];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1924:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(&iwpmksa->bssid.sa_data[0], &pmkidptr->pmkid[0].BSSID, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1925:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(&iwpmksa->pmkid[0], &pmkidptr->pmkid[0].PMKID, WPA2_PMKID_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1940:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&pmkid_array[i+1].BSSID,
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1943:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&pmkid_array[i+1].PMKID,
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1950:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(&iwpmksa->bssid.sa_data[0],
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1953:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(&iwpmksa->pmkid[0], &pmkid_array[pmkid_list.pmkids.npmkid].PMKID,
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2589:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char extra[IW_CUSTOM_MAX + 1];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2599:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(wrqu.addr.sa_data, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2634:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&extra[1], data, datalen);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2644:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&extra[1], &status, sizeof(status));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2658:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(micerrevt->src_addr.sa_data, &e->addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2668:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(extra, data, datalen);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2675:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(extra, data, datalen);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2696:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(&pmkidcand->BSSID, &iwpmkidcand->bssid.sa_data,
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char iso_abbrev[WLC_CNTRY_BUF_SZ];	
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char custom_locale[WLC_CNTRY_BUF_SZ];	
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.h:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nickname[IW_ESSID_MAX_SIZE];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:222:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char intf_name[IFNAMSIZ] = quote_str(BRCM_WLAN_IFNAME);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:640:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(&wl->pub->cur_etheraddr, dev->dev_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:1016:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp1[128];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:1719:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, stats_watchdog, sizeof(struct net_device_stats));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:1816:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(sa->sa_data, dev->dev_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:1878:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(mclist->dmi_addr, &maclist->ea[i++], ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:1887:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(ha->addr, &maclist->ea[i++], ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2543:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(oskb->data + D11_PHY_HDR_LEN, pdata, oskb->len - D11_PHY_HDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2612:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rtl->vend_oui, brcm_oui, sizeof(brcm_oui));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2639:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rtht->vend_oui, brcm_oui, sizeof(brcm_oui));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2658:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(oskb->data + D11_PHY_HDR_LEN, pdata, oskb->len - D11_PHY_HDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2746:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rtl->vend_oui, brcm_oui, sizeof(brcm_oui));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2913:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		bcopy(oskb->data + D11_PHY_HDR_LEN, pdata, oskb->len - D11_PHY_HDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2920:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				bcopy(amsdu_p->data, pdata, amsdu_p->len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2978:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(wl->dev->dev_addr, dev->dev_addr, ETHER_ADDR_LEN);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:3092:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(buf, (char *)PKTDATA(osh, p) + offset, len);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:3263:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[8];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:3367:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IFNAMSIZ];		
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rfkill_name[32];
data/broadcom-sta-6.30.223.271/amd64/src/include/bcmutils.h:25:57:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define bcm_strncpy_s(dst, noOfElements, src, count)    strncpy((dst), (src), (count))
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:198:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	#undef strlen
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:200:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	#undef strncpy
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:205:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	#define strlen(s)			osl_strlen((s))
data/broadcom-sta-6.30.223.271/amd64/src/include/linux_osl.h:207:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	#define	strncpy(d, s, n)		osl_strncpy((d), (s), (n))
data/broadcom-sta-6.30.223.271/amd64/src/include/linuxver.h:107:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(current->comm, a, MIN(sizeof(current->comm), (strlen(a)))); \
data/broadcom-sta-6.30.223.271/amd64/src/include/linuxver.h:107:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncpy(current->comm, a, MIN(sizeof(current->comm), (strlen(a)))); \
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:474:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(p->file, basename, BCM_MEM_FILENAME_LEN);
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:830:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (strlen(s));
data/broadcom-sta-6.30.223.271/amd64/src/shared/linux_osl.c:842:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	return (strncpy(d, s, n));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:271:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(flag) > sizeof(extra))
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:275:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	wrqu.data.length = strlen(extra);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:336:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(cap, "a");
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:339:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(cap, "b");
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:1238:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dwrq->length = strlen(extra) + 1;
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2594:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		wrqu.data.length = strlen(extra);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2602:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		wrqu.data.length = strlen(extra);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_iw.c:2708:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		wrqu.data.length = strlen(extra);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:1044:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MFREE(wl->osh, t->name, strlen(t->name) + 1);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:1324:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(dev->name, intf_name, IFNAMSIZ-1);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:1542:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(info->version, EPI_VERSION_STR, sizeof(info->version));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2430:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((t->name = MALLOC(wl->osh, strlen(tname) + 1)))
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2489:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MFREE(wl->osh, t->name, strlen(t->name) + 1);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:2502:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				MFREE(wl->osh, t->name, strlen(t->name) + 1);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:3024:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ASSERT(strlen(wlif->name) > 0);
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:3025:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(wlif->dev->name, wlif->name, strlen(wlif->name));
data/broadcom-sta-6.30.223.271/amd64/src/wl/sys/wl_linux.c:3025:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strncpy(wlif->dev->name, wlif->name, strlen(wlif->name));
data/broadcom-sta-6.30.223.271/i386/src/include/bcmutils.h:25:57:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define bcm_strncpy_s(dst, noOfElements, src, count)    strncpy((dst), (src), (count))
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:198:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	#undef strlen
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:200:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	#undef strncpy
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:205:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	#define strlen(s)			osl_strlen((s))
data/broadcom-sta-6.30.223.271/i386/src/include/linux_osl.h:207:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	#define	strncpy(d, s, n)		osl_strncpy((d), (s), (n))
data/broadcom-sta-6.30.223.271/i386/src/include/linuxver.h:107:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(current->comm, a, MIN(sizeof(current->comm), (strlen(a)))); \
data/broadcom-sta-6.30.223.271/i386/src/include/linuxver.h:107:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncpy(current->comm, a, MIN(sizeof(current->comm), (strlen(a)))); \
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:474:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(p->file, basename, BCM_MEM_FILENAME_LEN);
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:830:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (strlen(s));
data/broadcom-sta-6.30.223.271/i386/src/shared/linux_osl.c:842:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	return (strncpy(d, s, n));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:292:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(flag) > sizeof(extra))
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:296:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	wrqu.data.length = strlen(extra);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:357:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(cap, "a");
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:360:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(cap, "b");
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:1259:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dwrq->length = strlen(extra) + 1;
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2615:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		wrqu.data.length = strlen(extra);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2623:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		wrqu.data.length = strlen(extra);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_iw.c:2729:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		wrqu.data.length = strlen(extra);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:1032:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MFREE(wl->osh, t->name, strlen(t->name) + 1);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:1312:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(dev->name, intf_name, IFNAMSIZ-1);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:1530:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(info->version, EPI_VERSION_STR, sizeof(info->version));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2377:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((t->name = MALLOC(wl->osh, strlen(tname) + 1)))
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2436:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MFREE(wl->osh, t->name, strlen(t->name) + 1);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2449:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				MFREE(wl->osh, t->name, strlen(t->name) + 1);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2969:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ASSERT(strlen(wlif->name) > 0);
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2970:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(wlif->dev->name, wlif->name, strlen(wlif->name));
data/broadcom-sta-6.30.223.271/i386/src/wl/sys/wl_linux.c:2970:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strncpy(wlif->dev->name, wlif->name, strlen(wlif->name));

ANALYSIS SUMMARY:

Hits = 343
Lines analyzed = 43989 in approximately 1.02 seconds (43269 lines/second)
Physical Source Lines of Code (SLOC) = 35620
Hits@level = [0]  37 [1]  54 [2] 224 [3]   0 [4]  65 [5]   0
Hits@level+ = [0+] 380 [1+] 343 [2+] 289 [3+]  65 [4+]  65 [5+]   0
Hits/KSLOC@level+ = [0+] 10.6682 [1+] 9.62942 [2+] 8.11342 [3+] 1.82482 [4+] 1.82482 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.