Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/curl-7.72.0/projects/wolfssl_options.h
Examining data/curl-7.72.0/docs/examples/persistent.c
Examining data/curl-7.72.0/docs/examples/htmltidy.c
Examining data/curl-7.72.0/docs/examples/urlapi.c
Examining data/curl-7.72.0/docs/examples/evhiperfifo.c
Examining data/curl-7.72.0/docs/examples/imap-store.c
Examining data/curl-7.72.0/docs/examples/imap-delete.c
Examining data/curl-7.72.0/docs/examples/ephiperfifo.c
Examining data/curl-7.72.0/docs/examples/altsvc.c
Examining data/curl-7.72.0/docs/examples/imap-copy.c
Examining data/curl-7.72.0/docs/examples/ftpgetresp.c
Examining data/curl-7.72.0/docs/examples/rtsp.c
Examining data/curl-7.72.0/docs/examples/cookie_interface.c
Examining data/curl-7.72.0/docs/examples/sampleconv.c
Examining data/curl-7.72.0/docs/examples/fileupload.c
Examining data/curl-7.72.0/docs/examples/threaded-shared-conn.c
Examining data/curl-7.72.0/docs/examples/httpput.c
Examining data/curl-7.72.0/docs/examples/debug.c
Examining data/curl-7.72.0/docs/examples/ftpget.c
Examining data/curl-7.72.0/docs/examples/pop3-retr.c
Examining data/curl-7.72.0/docs/examples/parseurl.c
Examining data/curl-7.72.0/docs/examples/multi-poll.c
Examining data/curl-7.72.0/docs/examples/pop3-stat.c
Examining data/curl-7.72.0/docs/examples/ftpgetinfo.c
Examining data/curl-7.72.0/docs/examples/cacertinmem.c
Examining data/curl-7.72.0/docs/examples/http2-pushinmemory.c
Examining data/curl-7.72.0/docs/examples/imap-lsub.c
Examining data/curl-7.72.0/docs/examples/pop3-dele.c
Examining data/curl-7.72.0/docs/examples/sepheaders.c
Examining data/curl-7.72.0/docs/examples/pop3-uidl.c
Examining data/curl-7.72.0/docs/examples/ghiper.c
Examining data/curl-7.72.0/docs/examples/chkspeed.c
Examining data/curl-7.72.0/docs/examples/externalsocket.c
Examining data/curl-7.72.0/docs/examples/multi-double.c
Examining data/curl-7.72.0/docs/examples/imap-ssl.c
Examining data/curl-7.72.0/docs/examples/imap-create.c
Examining data/curl-7.72.0/docs/examples/multi-debugcallback.c
Examining data/curl-7.72.0/docs/examples/simplepost.c
Examining data/curl-7.72.0/docs/examples/postinmemory.c
Examining data/curl-7.72.0/docs/examples/10-at-a-time.c
Examining data/curl-7.72.0/docs/examples/pop3-ssl.c
Examining data/curl-7.72.0/docs/examples/progressfunc.c
Examining data/curl-7.72.0/docs/examples/threaded-ssl.c
Examining data/curl-7.72.0/docs/examples/imap-search.c
Examining data/curl-7.72.0/docs/examples/crawler.c
Examining data/curl-7.72.0/docs/examples/http-post.c
Examining data/curl-7.72.0/docs/examples/getinmemory.c
Examining data/curl-7.72.0/docs/examples/getinfo.c
Examining data/curl-7.72.0/docs/examples/sessioninfo.c
Examining data/curl-7.72.0/docs/examples/multi-post.c
Examining data/curl-7.72.0/docs/examples/http2-upload.c
Examining data/curl-7.72.0/docs/examples/ftp-wildcard.c
Examining data/curl-7.72.0/docs/examples/pop3-tls.c
Examining data/curl-7.72.0/docs/examples/ftpupload.c
Examining data/curl-7.72.0/docs/examples/smtp-tls.c
Examining data/curl-7.72.0/docs/examples/https.c
Examining data/curl-7.72.0/docs/examples/resolve.c
Examining data/curl-7.72.0/docs/examples/imap-tls.c
Examining data/curl-7.72.0/docs/examples/simple.c
Examining data/curl-7.72.0/docs/examples/multi-uv.c
Examining data/curl-7.72.0/docs/examples/httpcustomheader.c
Examining data/curl-7.72.0/docs/examples/imap-fetch.c
Examining data/curl-7.72.0/docs/examples/multi-formadd.c
Examining data/curl-7.72.0/docs/examples/pop3-multi.c
Examining data/curl-7.72.0/docs/examples/certinfo.c
Examining data/curl-7.72.0/docs/examples/htmltitle.cpp
Examining data/curl-7.72.0/docs/examples/simplessl.c
Examining data/curl-7.72.0/docs/examples/ftpsget.c
Examining data/curl-7.72.0/docs/examples/imap-examine.c
Examining data/curl-7.72.0/docs/examples/multithread.c
Examining data/curl-7.72.0/docs/examples/multi-single.c
Examining data/curl-7.72.0/docs/examples/sftpget.c
Examining data/curl-7.72.0/docs/examples/imap-append.c
Examining data/curl-7.72.0/docs/examples/imap-authzid.c
Examining data/curl-7.72.0/docs/examples/imap-noop.c
Examining data/curl-7.72.0/docs/examples/postit2.c
Examining data/curl-7.72.0/docs/examples/smtp-multi.c
Examining data/curl-7.72.0/docs/examples/smtp-mail.c
Examining data/curl-7.72.0/docs/examples/curlgtk.c
Examining data/curl-7.72.0/docs/examples/xmlstream.c
Examining data/curl-7.72.0/docs/examples/curlx.c
Examining data/curl-7.72.0/docs/examples/pop3-top.c
Examining data/curl-7.72.0/docs/examples/smtp-ssl.c
Examining data/curl-7.72.0/docs/examples/http3-present.c
Examining data/curl-7.72.0/docs/examples/smtp-vrfy.c
Examining data/curl-7.72.0/docs/examples/smtp-authzid.c
Examining data/curl-7.72.0/docs/examples/anyauthput.c
Examining data/curl-7.72.0/docs/examples/url2file.c
Examining data/curl-7.72.0/docs/examples/http3.c
Examining data/curl-7.72.0/docs/examples/synctime.c
Examining data/curl-7.72.0/docs/examples/fopen.c
Examining data/curl-7.72.0/docs/examples/multi-app.c
Examining data/curl-7.72.0/docs/examples/ftpuploadresume.c
Examining data/curl-7.72.0/docs/examples/pop3-noop.c
Examining data/curl-7.72.0/docs/examples/ftpuploadfrommem.c
Examining data/curl-7.72.0/docs/examples/href_extractor.c
Examining data/curl-7.72.0/docs/examples/usercertinmem.c
Examining data/curl-7.72.0/docs/examples/smtp-mime.c
Examining data/curl-7.72.0/docs/examples/pop3-authzid.c
Examining data/curl-7.72.0/docs/examples/imap-multi.c
Examining data/curl-7.72.0/docs/examples/imap-list.c
Examining data/curl-7.72.0/docs/examples/smtp-expn.c
Examining data/curl-7.72.0/docs/examples/hiperfifo.c
Examining data/curl-7.72.0/docs/examples/sslbackend.c
Examining data/curl-7.72.0/docs/examples/postit2-formadd.c
Examining data/curl-7.72.0/docs/examples/shared-connection-cache.c
Examining data/curl-7.72.0/docs/examples/pop3-list.c
Examining data/curl-7.72.0/docs/examples/sftpuploadresume.c
Examining data/curl-7.72.0/docs/examples/http2-download.c
Examining data/curl-7.72.0/docs/examples/getredirect.c
Examining data/curl-7.72.0/docs/examples/opensslthreadlock.c
Examining data/curl-7.72.0/docs/examples/multi-event.c
Examining data/curl-7.72.0/docs/examples/sendrecv.c
Examining data/curl-7.72.0/docs/examples/smooth-gtk-thread.c
Examining data/curl-7.72.0/docs/examples/http2-serverpush.c
Examining data/curl-7.72.0/docs/examples/post-callback.c
Examining data/curl-7.72.0/lib/rename.c
Examining data/curl-7.72.0/lib/wildcard.h
Examining data/curl-7.72.0/lib/timeval.h
Examining data/curl-7.72.0/lib/urlapi-int.h
Examining data/curl-7.72.0/lib/curl_range.c
Examining data/curl-7.72.0/lib/urlapi.c
Examining data/curl-7.72.0/lib/setup-os400.h
Examining data/curl-7.72.0/lib/easy.c
Examining data/curl-7.72.0/lib/curl_setup.h
Examining data/curl-7.72.0/lib/imap.c
Examining data/curl-7.72.0/lib/inet_pton.h
Examining data/curl-7.72.0/lib/strcase.c
Examining data/curl-7.72.0/lib/hostip6.c
Examining data/curl-7.72.0/lib/splay.h
Examining data/curl-7.72.0/lib/hostcheck.h
Examining data/curl-7.72.0/lib/hash.c
Examining data/curl-7.72.0/lib/curl_sha256.h
Examining data/curl-7.72.0/lib/doh.h
Examining data/curl-7.72.0/lib/rand.c
Examining data/curl-7.72.0/lib/http_digest.h
Examining data/curl-7.72.0/lib/curl_des.h
Examining data/curl-7.72.0/lib/strtoofft.c
Examining data/curl-7.72.0/lib/http_proxy.h
Examining data/curl-7.72.0/lib/sockaddr.h
Examining data/curl-7.72.0/lib/rand.h
Examining data/curl-7.72.0/lib/smb.c
Examining data/curl-7.72.0/lib/altsvc.c
Examining data/curl-7.72.0/lib/curl_rtmp.h
Examining data/curl-7.72.0/lib/warnless.h
Examining data/curl-7.72.0/lib/curl_gethostname.c
Examining data/curl-7.72.0/lib/curl_gssapi.c
Examining data/curl-7.72.0/lib/sendf.h
Examining data/curl-7.72.0/lib/setopt.h
Examining data/curl-7.72.0/lib/hostip4.c
Examining data/curl-7.72.0/lib/tftp.h
Examining data/curl-7.72.0/lib/system_win32.c
Examining data/curl-7.72.0/lib/x509asn1.c
Examining data/curl-7.72.0/lib/rtsp.c
Examining data/curl-7.72.0/lib/file.h
Examining data/curl-7.72.0/lib/amigaos.h
Examining data/curl-7.72.0/lib/memdebug.c
Examining data/curl-7.72.0/lib/curl_fnmatch.c
Examining data/curl-7.72.0/lib/nwos.c
Examining data/curl-7.72.0/lib/conncache.c
Examining data/curl-7.72.0/lib/url.c
Examining data/curl-7.72.0/lib/strerror.h
Examining data/curl-7.72.0/lib/curl_path.c
Examining data/curl-7.72.0/lib/gopher.c
Examining data/curl-7.72.0/lib/curl_ntlm_wb.h
Examining data/curl-7.72.0/lib/fileinfo.c
Examining data/curl-7.72.0/lib/curl_ntlm_core.c
Examining data/curl-7.72.0/lib/netrc.c
Examining data/curl-7.72.0/lib/config-plan9.h
Examining data/curl-7.72.0/lib/imap.h
Examining data/curl-7.72.0/lib/hash.h
Examining data/curl-7.72.0/lib/md4.c
Examining data/curl-7.72.0/lib/strtoofft.h
Examining data/curl-7.72.0/lib/dict.c
Examining data/curl-7.72.0/lib/nwlib.c
Examining data/curl-7.72.0/lib/rtsp.h
Examining data/curl-7.72.0/lib/dynbuf.c
Examining data/curl-7.72.0/lib/sendf.c
Examining data/curl-7.72.0/lib/speedcheck.h
Examining data/curl-7.72.0/lib/hostcheck.c
Examining data/curl-7.72.0/lib/curl_get_line.c
Examining data/curl-7.72.0/lib/connect.c
Examining data/curl-7.72.0/lib/smtp.h
Examining data/curl-7.72.0/lib/memdebug.h
Examining data/curl-7.72.0/lib/amigaos.c
Examining data/curl-7.72.0/lib/config-win32.h
Examining data/curl-7.72.0/lib/socketpair.h
Examining data/curl-7.72.0/lib/strtok.c
Examining data/curl-7.72.0/lib/mime.h
Examining data/curl-7.72.0/lib/version_win32.c
Examining data/curl-7.72.0/lib/curl_fnmatch.h
Examining data/curl-7.72.0/lib/sigpipe.h
Examining data/curl-7.72.0/lib/connect.h
Examining data/curl-7.72.0/lib/easyif.h
Examining data/curl-7.72.0/lib/setup-vms.h
Examining data/curl-7.72.0/lib/cookie.h
Examining data/curl-7.72.0/lib/pingpong.h
Examining data/curl-7.72.0/lib/url.h
Examining data/curl-7.72.0/lib/transfer.c
Examining data/curl-7.72.0/lib/select.c
Examining data/curl-7.72.0/lib/inet_ntop.c
Examining data/curl-7.72.0/lib/curl_sspi.c
Examining data/curl-7.72.0/lib/smtp.c
Examining data/curl-7.72.0/lib/inet_ntop.h
Examining data/curl-7.72.0/lib/curl_sasl.c
Examining data/curl-7.72.0/lib/escape.h
Examining data/curl-7.72.0/lib/content_encoding.h
Examining data/curl-7.72.0/lib/version_win32.h
Examining data/curl-7.72.0/lib/non-ascii.c
Examining data/curl-7.72.0/lib/multihandle.h
Examining data/curl-7.72.0/lib/openldap.c
Examining data/curl-7.72.0/lib/conncache.h
Examining data/curl-7.72.0/lib/file.c
Examining data/curl-7.72.0/lib/psl.h
Examining data/curl-7.72.0/lib/curl_ntlm_wb.c
Examining data/curl-7.72.0/lib/telnet.h
Examining data/curl-7.72.0/lib/netrc.h
Examining data/curl-7.72.0/lib/pop3.h
Examining data/curl-7.72.0/lib/ftplistparser.h
Examining data/curl-7.72.0/lib/setopt.c
Examining data/curl-7.72.0/lib/curl_memrchr.h
Examining data/curl-7.72.0/lib/curl_addrinfo.c
Examining data/curl-7.72.0/lib/parsedate.c
Examining data/curl-7.72.0/lib/dotdot.c
Examining data/curl-7.72.0/lib/asyn.h
Examining data/curl-7.72.0/lib/base64.c
Examining data/curl-7.72.0/lib/curl_md5.h
Examining data/curl-7.72.0/lib/formdata.c
Examining data/curl-7.72.0/lib/curl_sspi.h
Examining data/curl-7.72.0/lib/urldata.h
Examining data/curl-7.72.0/lib/config-tpf.h
Examining data/curl-7.72.0/lib/multiif.h
Examining data/curl-7.72.0/lib/speedcheck.c
Examining data/curl-7.72.0/lib/progress.c
Examining data/curl-7.72.0/lib/http.c
Examining data/curl-7.72.0/lib/getinfo.c
Examining data/curl-7.72.0/lib/curl_base64.h
Examining data/curl-7.72.0/lib/arpa_telnet.h
Examining data/curl-7.72.0/lib/if2ip.h
Examining data/curl-7.72.0/lib/config-os400.h
Examining data/curl-7.72.0/lib/curl_multibyte.c
Examining data/curl-7.72.0/lib/curl_setup_once.h
Examining data/curl-7.72.0/lib/curl_threads.h
Examining data/curl-7.72.0/lib/http2.h
Examining data/curl-7.72.0/lib/curl_addrinfo.h
Examining data/curl-7.72.0/lib/setup-win32.h
Examining data/curl-7.72.0/lib/slist.h
Examining data/curl-7.72.0/lib/content_encoding.c
Examining data/curl-7.72.0/lib/curl_get_line.h
Examining data/curl-7.72.0/lib/if2ip.c
Examining data/curl-7.72.0/lib/altsvc.h
Examining data/curl-7.72.0/lib/config-symbian.h
Examining data/curl-7.72.0/lib/hostip.h
Examining data/curl-7.72.0/lib/tftp.c
Examining data/curl-7.72.0/lib/socketpair.c
Examining data/curl-7.72.0/lib/asyn-ares.c
Examining data/curl-7.72.0/lib/curl_gssapi.h
Examining data/curl-7.72.0/lib/curl_ctype.c
Examining data/curl-7.72.0/lib/curl_path.h
Examining data/curl-7.72.0/lib/share.c
Examining data/curl-7.72.0/lib/curl_printf.h
Examining data/curl-7.72.0/lib/vauth/spnego_gssapi.c
Examining data/curl-7.72.0/lib/vauth/krb5_gssapi.c
Examining data/curl-7.72.0/lib/vauth/vauth.c
Examining data/curl-7.72.0/lib/vauth/spnego_sspi.c
Examining data/curl-7.72.0/lib/vauth/digest.h
Examining data/curl-7.72.0/lib/vauth/digest.c
Examining data/curl-7.72.0/lib/vauth/oauth2.c
Examining data/curl-7.72.0/lib/vauth/cram.c
Examining data/curl-7.72.0/lib/vauth/vauth.h
Examining data/curl-7.72.0/lib/vauth/digest_sspi.c
Examining data/curl-7.72.0/lib/vauth/cleartext.c
Examining data/curl-7.72.0/lib/vauth/ntlm_sspi.c
Examining data/curl-7.72.0/lib/vauth/krb5_sspi.c
Examining data/curl-7.72.0/lib/vauth/ntlm.h
Examining data/curl-7.72.0/lib/vauth/ntlm.c
Examining data/curl-7.72.0/lib/hmac.c
Examining data/curl-7.72.0/lib/vssh/ssh.h
Examining data/curl-7.72.0/lib/vssh/wolfssh.c
Examining data/curl-7.72.0/lib/vssh/libssh.c
Examining data/curl-7.72.0/lib/vssh/libssh2.c
Examining data/curl-7.72.0/lib/config-vxworks.h
Examining data/curl-7.72.0/lib/formdata.h
Examining data/curl-7.72.0/lib/sha256.c
Examining data/curl-7.72.0/lib/slist.c
Examining data/curl-7.72.0/lib/dynbuf.h
Examining data/curl-7.72.0/lib/hostsyn.c
Examining data/curl-7.72.0/lib/http_chunks.h
Examining data/curl-7.72.0/lib/security.c
Examining data/curl-7.72.0/lib/curl_sec.h
Examining data/curl-7.72.0/lib/http_digest.c
Examining data/curl-7.72.0/lib/curl_threads.c
Examining data/curl-7.72.0/lib/wildcard.c
Examining data/curl-7.72.0/lib/version.c
Examining data/curl-7.72.0/lib/curl_sasl.h
Examining data/curl-7.72.0/lib/curl_memrchr.c
Examining data/curl-7.72.0/lib/http_negotiate.c
Examining data/curl-7.72.0/lib/curl_rtmp.c
Examining data/curl-7.72.0/lib/mprintf.c
Examining data/curl-7.72.0/lib/config-amigaos.h
Examining data/curl-7.72.0/lib/dotdot.h
Examining data/curl-7.72.0/lib/krb5.c
Examining data/curl-7.72.0/lib/curl_multibyte.h
Examining data/curl-7.72.0/lib/curl_gethostname.h
Examining data/curl-7.72.0/lib/socks.c
Examining data/curl-7.72.0/lib/quic.h
Examining data/curl-7.72.0/lib/getinfo.h
Examining data/curl-7.72.0/lib/strcase.h
Examining data/curl-7.72.0/lib/curl_ctype.h
Examining data/curl-7.72.0/lib/hostip.c
Examining data/curl-7.72.0/lib/splay.c
Examining data/curl-7.72.0/lib/curl_ldap.h
Examining data/curl-7.72.0/lib/curl_md4.h
Examining data/curl-7.72.0/lib/vtls/nss.c
Examining data/curl-7.72.0/lib/vtls/gtls.c
Examining data/curl-7.72.0/lib/vtls/wolfssl.c
Examining data/curl-7.72.0/lib/vtls/wolfssl.h
Examining data/curl-7.72.0/lib/vtls/nssg.h
Examining data/curl-7.72.0/lib/vtls/schannel_verify.c
Examining data/curl-7.72.0/lib/vtls/keylog.c
Examining data/curl-7.72.0/lib/vtls/openssl.h
Examining data/curl-7.72.0/lib/vtls/mesalink.h
Examining data/curl-7.72.0/lib/vtls/mbedtls_threadlock.h
Examining data/curl-7.72.0/lib/vtls/keylog.h
Examining data/curl-7.72.0/lib/vtls/gskit.c
Examining data/curl-7.72.0/lib/vtls/vtls.c
Examining data/curl-7.72.0/lib/vtls/schannel.h
Examining data/curl-7.72.0/lib/vtls/schannel.c
Examining data/curl-7.72.0/lib/vtls/bearssl.h
Examining data/curl-7.72.0/lib/vtls/vtls.h
Examining data/curl-7.72.0/lib/vtls/mbedtls_threadlock.c
Examining data/curl-7.72.0/lib/vtls/mbedtls.c
Examining data/curl-7.72.0/lib/vtls/sectransp.h
Examining data/curl-7.72.0/lib/vtls/gskit.h
Examining data/curl-7.72.0/lib/vtls/gtls.h
Examining data/curl-7.72.0/lib/vtls/mesalink.c
Examining data/curl-7.72.0/lib/vtls/openssl.c
Examining data/curl-7.72.0/lib/vtls/sectransp.c
Examining data/curl-7.72.0/lib/vtls/bearssl.c
Examining data/curl-7.72.0/lib/vtls/mbedtls.h
Examining data/curl-7.72.0/lib/progress.h
Examining data/curl-7.72.0/lib/curl_endian.c
Examining data/curl-7.72.0/lib/psl.c
Examining data/curl-7.72.0/lib/http_ntlm.h
Examining data/curl-7.72.0/lib/doh.c
Examining data/curl-7.72.0/lib/hostasyn.c
Examining data/curl-7.72.0/lib/curl_hmac.h
Examining data/curl-7.72.0/lib/telnet.c
Examining data/curl-7.72.0/lib/strdup.h
Examining data/curl-7.72.0/lib/config-riscos.h
Examining data/curl-7.72.0/lib/pingpong.c
Examining data/curl-7.72.0/lib/system_win32.h
Examining data/curl-7.72.0/lib/llist.h
Examining data/curl-7.72.0/lib/ftp.h
Examining data/curl-7.72.0/lib/select.h
Examining data/curl-7.72.0/lib/parsedate.h
Examining data/curl-7.72.0/lib/http_negotiate.h
Examining data/curl-7.72.0/lib/vquic/quiche.h
Examining data/curl-7.72.0/lib/vquic/vquic.c
Examining data/curl-7.72.0/lib/vquic/ngtcp2.c
Examining data/curl-7.72.0/lib/vquic/ngtcp2.h
Examining data/curl-7.72.0/lib/vquic/quiche.c
Examining data/curl-7.72.0/lib/vquic/vquic.h
Examining data/curl-7.72.0/lib/getenv.c
Examining data/curl-7.72.0/lib/transfer.h
Examining data/curl-7.72.0/lib/multi.c
Examining data/curl-7.72.0/lib/curl_range.h
Examining data/curl-7.72.0/lib/curl_memory.h
Examining data/curl-7.72.0/lib/warnless.c
Examining data/curl-7.72.0/lib/http.h
Examining data/curl-7.72.0/lib/curl_des.c
Examining data/curl-7.72.0/lib/x509asn1.h
Examining data/curl-7.72.0/lib/llist.c
Examining data/curl-7.72.0/lib/ftp.c
Examining data/curl-7.72.0/lib/timeval.c
Examining data/curl-7.72.0/lib/inet_pton.c
Examining data/curl-7.72.0/lib/socks_gssapi.c
Examining data/curl-7.72.0/lib/ftplistparser.c
Examining data/curl-7.72.0/lib/mime.c
Examining data/curl-7.72.0/lib/dict.h
Examining data/curl-7.72.0/lib/curl_endian.h
Examining data/curl-7.72.0/lib/idn_win32.c
Examining data/curl-7.72.0/lib/nonblock.h
Examining data/curl-7.72.0/lib/socks_sspi.c
Examining data/curl-7.72.0/lib/pop3.c
Examining data/curl-7.72.0/lib/md5.c
Examining data/curl-7.72.0/lib/strerror.c
Examining data/curl-7.72.0/lib/config-mac.h
Examining data/curl-7.72.0/lib/escape.c
Examining data/curl-7.72.0/lib/socks.h
Examining data/curl-7.72.0/lib/http_ntlm.c
Examining data/curl-7.72.0/lib/http_proxy.c
Examining data/curl-7.72.0/lib/strtok.h
Examining data/curl-7.72.0/lib/config-dos.h
Examining data/curl-7.72.0/lib/curl_ntlm_core.h
Examining data/curl-7.72.0/lib/non-ascii.h
Examining data/curl-7.72.0/lib/ldap.c
Examining data/curl-7.72.0/lib/share.h
Examining data/curl-7.72.0/lib/fileinfo.h
Examining data/curl-7.72.0/lib/asyn-thread.c
Examining data/curl-7.72.0/lib/http2.c
Examining data/curl-7.72.0/lib/nonblock.c
Examining data/curl-7.72.0/lib/gopher.h
Examining data/curl-7.72.0/lib/cookie.c
Examining data/curl-7.72.0/lib/strdup.c
Examining data/curl-7.72.0/lib/curlx.h
Examining data/curl-7.72.0/lib/http_chunks.c
Examining data/curl-7.72.0/lib/smb.h
Examining data/curl-7.72.0/lib/rename.h
Examining data/curl-7.72.0/lib/config-win32ce.h
Examining data/curl-7.72.0/lib/mqtt.h
Examining data/curl-7.72.0/lib/mqtt.c
Examining data/curl-7.72.0/src/tool_filetime.c
Examining data/curl-7.72.0/src/tool_filetime.h
Examining data/curl-7.72.0/src/tool_cfgable.c
Examining data/curl-7.72.0/src/tool_hugehelp.h
Examining data/curl-7.72.0/src/tool_setup.h
Examining data/curl-7.72.0/src/tool_panykey.c
Examining data/curl-7.72.0/src/tool_binmode.h
Examining data/curl-7.72.0/src/tool_cfgable.h
Examining data/curl-7.72.0/src/tool_cb_hdr.h
Examining data/curl-7.72.0/src/tool_convert.h
Examining data/curl-7.72.0/src/tool_operhlp.h
Examining data/curl-7.72.0/src/tool_helpers.h
Examining data/curl-7.72.0/src/tool_cb_dbg.c
Examining data/curl-7.72.0/src/tool_version.h
Examining data/curl-7.72.0/src/tool_bname.c
Examining data/curl-7.72.0/src/tool_progress.c
Examining data/curl-7.72.0/src/tool_paramhlp.c
Examining data/curl-7.72.0/src/tool_homedir.c
Examining data/curl-7.72.0/src/tool_operhlp.c
Examining data/curl-7.72.0/src/tool_doswin.c
Examining data/curl-7.72.0/src/tool_getpass.c
Examining data/curl-7.72.0/src/tool_sdecls.h
Examining data/curl-7.72.0/src/tool_main.h
Examining data/curl-7.72.0/src/tool_formparse.h
Examining data/curl-7.72.0/src/tool_cb_wrt.c
Examining data/curl-7.72.0/src/tool_writeout_json.h
Examining data/curl-7.72.0/src/tool_writeout.c
Examining data/curl-7.72.0/src/slist_wc.h
Examining data/curl-7.72.0/src/tool_cb_see.h
Examining data/curl-7.72.0/src/tool_panykey.h
Examining data/curl-7.72.0/src/tool_dirhie.c
Examining data/curl-7.72.0/src/tool_metalink.h
Examining data/curl-7.72.0/src/tool_setopt.h
Examining data/curl-7.72.0/src/tool_cb_wrt.h
Examining data/curl-7.72.0/src/tool_xattr.c
Examining data/curl-7.72.0/src/tool_dirhie.h
Examining data/curl-7.72.0/src/tool_bname.h
Examining data/curl-7.72.0/src/tool_sleep.c
Examining data/curl-7.72.0/src/tool_easysrc.h
Examining data/curl-7.72.0/src/tool_progress.h
Examining data/curl-7.72.0/src/tool_homedir.h
Examining data/curl-7.72.0/src/tool_help.c
Examining data/curl-7.72.0/src/tool_binmode.c
Examining data/curl-7.72.0/src/tool_getparam.h
Examining data/curl-7.72.0/src/tool_cb_hdr.c
Examining data/curl-7.72.0/src/tool_cb_dbg.h
Examining data/curl-7.72.0/src/tool_help.h
Examining data/curl-7.72.0/src/tool_cb_rea.c
Examining data/curl-7.72.0/src/tool_msgs.h
Examining data/curl-7.72.0/src/tool_cb_rea.h
Examining data/curl-7.72.0/src/tool_convert.c
Examining data/curl-7.72.0/src/tool_xattr.h
Examining data/curl-7.72.0/src/tool_paramhlp.h
Examining data/curl-7.72.0/src/tool_setopt.c
Examining data/curl-7.72.0/src/tool_hugehelp.c
Examining data/curl-7.72.0/src/tool_operate.c
Examining data/curl-7.72.0/src/slist_wc.c
Examining data/curl-7.72.0/src/tool_getparam.c
Examining data/curl-7.72.0/src/tool_metalink.c
Examining data/curl-7.72.0/src/tool_cb_prg.c
Examining data/curl-7.72.0/src/tool_getpass.h
Examining data/curl-7.72.0/src/tool_cb_see.c
Examining data/curl-7.72.0/src/tool_sleep.h
Examining data/curl-7.72.0/src/tool_parsecfg.h
Examining data/curl-7.72.0/src/tool_helpers.c
Examining data/curl-7.72.0/src/tool_writeout.h
Examining data/curl-7.72.0/src/tool_strdup.h
Examining data/curl-7.72.0/src/tool_cb_prg.h
Examining data/curl-7.72.0/src/tool_easysrc.c
Examining data/curl-7.72.0/src/tool_operate.h
Examining data/curl-7.72.0/src/tool_parsecfg.c
Examining data/curl-7.72.0/src/tool_msgs.c
Examining data/curl-7.72.0/src/tool_strdup.c
Examining data/curl-7.72.0/src/tool_formparse.c
Examining data/curl-7.72.0/src/tool_libinfo.c
Examining data/curl-7.72.0/src/tool_vms.c
Examining data/curl-7.72.0/src/tool_main.c
Examining data/curl-7.72.0/src/tool_vms.h
Examining data/curl-7.72.0/src/macos/src/curl_GUSIConfig.cpp
Examining data/curl-7.72.0/src/macos/src/macos_main.cpp
Examining data/curl-7.72.0/src/tool_doswin.h
Examining data/curl-7.72.0/src/tool_urlglob.h
Examining data/curl-7.72.0/src/tool_urlglob.c
Examining data/curl-7.72.0/src/tool_writeout_json.c
Examining data/curl-7.72.0/src/tool_libinfo.h
Examining data/curl-7.72.0/src/tool_util.c
Examining data/curl-7.72.0/src/tool_util.h
Examining data/curl-7.72.0/include/curl/typecheck-gcc.h
Examining data/curl-7.72.0/include/curl/system.h
Examining data/curl-7.72.0/include/curl/stdcheaders.h
Examining data/curl-7.72.0/include/curl/easy.h
Examining data/curl-7.72.0/include/curl/urlapi.h
Examining data/curl-7.72.0/include/curl/mprintf.h
Examining data/curl-7.72.0/include/curl/curl.h
Examining data/curl-7.72.0/include/curl/curlver.h
Examining data/curl-7.72.0/include/curl/multi.h
Examining data/curl-7.72.0/packages/OS400/ccsidcurl.h
Examining data/curl-7.72.0/packages/OS400/ccsidcurl.c
Examining data/curl-7.72.0/packages/OS400/chkstrings.c
Examining data/curl-7.72.0/packages/OS400/os400sys.h
Examining data/curl-7.72.0/packages/OS400/os400sys.c
Examining data/curl-7.72.0/packages/vms/curlmsg.h
Examining data/curl-7.72.0/packages/vms/vms_eco_level.h
Examining data/curl-7.72.0/packages/vms/report_openssl_version.c
Examining data/curl-7.72.0/packages/vms/curlmsg_vms.h
Examining data/curl-7.72.0/packages/vms/curl_crtl_init.c
Examining data/curl-7.72.0/tests/libtest/lib590.c
Examining data/curl-7.72.0/tests/libtest/lib650.c
Examining data/curl-7.72.0/tests/libtest/lib1511.c
Examining data/curl-7.72.0/tests/libtest/lib562.c
Examining data/curl-7.72.0/tests/libtest/lib521.c
Examining data/curl-7.72.0/tests/libtest/lib668.c
Examining data/curl-7.72.0/tests/libtest/lib514.c
Examining data/curl-7.72.0/tests/libtest/lib1534.c
Examining data/curl-7.72.0/tests/libtest/lib1560.c
Examining data/curl-7.72.0/tests/libtest/chkdecimalpoint.c
Examining data/curl-7.72.0/tests/libtest/lib576.c
Examining data/curl-7.72.0/tests/libtest/lib1553.c
Examining data/curl-7.72.0/tests/libtest/lib1593.c
Examining data/curl-7.72.0/tests/libtest/lib1551.c
Examining data/curl-7.72.0/tests/libtest/test.h
Examining data/curl-7.72.0/tests/libtest/lib1558.c
Examining data/curl-7.72.0/tests/libtest/lib508.c
Examining data/curl-7.72.0/tests/libtest/lib643.c
Examining data/curl-7.72.0/tests/libtest/chkhostname.c
Examining data/curl-7.72.0/tests/libtest/lib1557.c
Examining data/curl-7.72.0/tests/libtest/lib1905.c
Examining data/curl-7.72.0/tests/libtest/lib1594.c
Examining data/curl-7.72.0/tests/libtest/lib542.c
Examining data/curl-7.72.0/tests/libtest/lib578.c
Examining data/curl-7.72.0/tests/libtest/lib1526.c
Examining data/curl-7.72.0/tests/libtest/lib519.c
Examining data/curl-7.72.0/tests/libtest/lib518.c
Examining data/curl-7.72.0/tests/libtest/lib1501.c
Examining data/curl-7.72.0/tests/libtest/lib1522.c
Examining data/curl-7.72.0/tests/libtest/lib661.c
Examining data/curl-7.72.0/tests/libtest/lib1528.c
Examining data/curl-7.72.0/tests/libtest/lib666.c
Examining data/curl-7.72.0/tests/libtest/lib569.c
Examining data/curl-7.72.0/tests/libtest/lib1513.c
Examining data/curl-7.72.0/tests/libtest/lib654.c
Examining data/curl-7.72.0/tests/libtest/lib582.c
Examining data/curl-7.72.0/tests/libtest/lib1509.c
Examining data/curl-7.72.0/tests/libtest/lib1550.c
Examining data/curl-7.72.0/tests/libtest/lib559.c
Examining data/curl-7.72.0/tests/libtest/lib1900.c
Examining data/curl-7.72.0/tests/libtest/lib571.c
Examining data/curl-7.72.0/tests/libtest/lib560.c
Examining data/curl-7.72.0/tests/libtest/lib549.c
Examining data/curl-7.72.0/tests/libtest/lib1535.c
Examining data/curl-7.72.0/tests/libtest/lib1554.c
Examining data/curl-7.72.0/tests/libtest/lib515.c
Examining data/curl-7.72.0/tests/libtest/lib652.c
Examining data/curl-7.72.0/tests/libtest/lib555.c
Examining data/curl-7.72.0/tests/libtest/lib1512.c
Examining data/curl-7.72.0/tests/libtest/testutil.c
Examining data/curl-7.72.0/tests/libtest/lib651.c
Examining data/curl-7.72.0/tests/libtest/lib589.c
Examining data/curl-7.72.0/tests/libtest/first.c
Examining data/curl-7.72.0/tests/libtest/lib1156.c
Examining data/curl-7.72.0/tests/libtest/lib567.c
Examining data/curl-7.72.0/tests/libtest/lib564.c
Examining data/curl-7.72.0/tests/libtest/lib670.c
Examining data/curl-7.72.0/tests/libtest/lib573.c
Examining data/curl-7.72.0/tests/libtest/sethostname.h
Examining data/curl-7.72.0/tests/libtest/lib575.c
Examining data/curl-7.72.0/tests/libtest/lib557.c
Examining data/curl-7.72.0/tests/libtest/lib1525.c
Examining data/curl-7.72.0/tests/libtest/lib579.c
Examining data/curl-7.72.0/tests/libtest/lib572.c
Examining data/curl-7.72.0/tests/libtest/lib1540.c
Examining data/curl-7.72.0/tests/libtest/lib1567.c
Examining data/curl-7.72.0/tests/libtest/lib568.c
Examining data/curl-7.72.0/tests/libtest/lib1530.c
Examining data/curl-7.72.0/tests/libtest/lib525.c
Examining data/curl-7.72.0/tests/libtest/lib552.c
Examining data/curl-7.72.0/tests/libtest/lib3010.c
Examining data/curl-7.72.0/tests/libtest/lib1523.c
Examining data/curl-7.72.0/tests/libtest/lib1510.c
Examining data/curl-7.72.0/tests/libtest/lib537.c
Examining data/curl-7.72.0/tests/libtest/lib1532.c
Examining data/curl-7.72.0/tests/libtest/lib523.c
Examining data/curl-7.72.0/tests/libtest/lib505.c
Examining data/curl-7.72.0/tests/libtest/lib674.c
Examining data/curl-7.72.0/tests/libtest/lib547.c
Examining data/curl-7.72.0/tests/libtest/lib1517.c
Examining data/curl-7.72.0/tests/libtest/lib1500.c
Examining data/curl-7.72.0/tests/libtest/lib506.c
Examining data/curl-7.72.0/tests/libtest/lib1537.c
Examining data/curl-7.72.0/tests/libtest/lib553.c
Examining data/curl-7.72.0/tests/libtest/lib509.c
Examining data/curl-7.72.0/tests/libtest/lib1906.c
Examining data/curl-7.72.0/tests/libtest/lib530.c
Examining data/curl-7.72.0/tests/libtest/lib510.c
Examining data/curl-7.72.0/tests/libtest/lib1541.c
Examining data/curl-7.72.0/tests/libtest/lib1520.c
Examining data/curl-7.72.0/tests/libtest/lib586.c
Examining data/curl-7.72.0/tests/libtest/lib1508.c
Examining data/curl-7.72.0/tests/libtest/lib520.c
Examining data/curl-7.72.0/tests/libtest/testtrace.h
Examining data/curl-7.72.0/tests/libtest/lib500.c
Examining data/curl-7.72.0/tests/libtest/lib507.c
Examining data/curl-7.72.0/tests/libtest/lib1591.c
Examining data/curl-7.72.0/tests/libtest/lib1531.c
Examining data/curl-7.72.0/tests/libtest/lib1533.c
Examining data/curl-7.72.0/tests/libtest/lib533.c
Examining data/curl-7.72.0/tests/libtest/lib1518.c
Examining data/curl-7.72.0/tests/libtest/lib1536.c
Examining data/curl-7.72.0/tests/libtest/lib556.c
Examining data/curl-7.72.0/tests/libtest/lib591.c
Examining data/curl-7.72.0/tests/libtest/lib658.c
Examining data/curl-7.72.0/tests/libtest/lib667.c
Examining data/curl-7.72.0/tests/libtest/lib1507.c
Examining data/curl-7.72.0/tests/libtest/lib1538.c
Examining data/curl-7.72.0/tests/libtest/lib1556.c
Examining data/curl-7.72.0/tests/libtest/lib544.c
Examining data/curl-7.72.0/tests/libtest/lib1592.c
Examining data/curl-7.72.0/tests/libtest/lib1552.c
Examining data/curl-7.72.0/tests/libtest/lib541.c
Examining data/curl-7.72.0/tests/libtest/lib1515.c
Examining data/curl-7.72.0/tests/libtest/lib655.c
Examining data/curl-7.72.0/tests/libtest/stub_gssapi.h
Examining data/curl-7.72.0/tests/libtest/lib597.c
Examining data/curl-7.72.0/tests/libtest/lib1564.c
Examining data/curl-7.72.0/tests/libtest/lib1502.c
Examining data/curl-7.72.0/tests/libtest/lib554.c
Examining data/curl-7.72.0/tests/libtest/lib1514.c
Examining data/curl-7.72.0/tests/libtest/libntlmconnect.c
Examining data/curl-7.72.0/tests/libtest/lib574.c
Examining data/curl-7.72.0/tests/libtest/lib570.c
Examining data/curl-7.72.0/tests/libtest/lib1565.c
Examining data/curl-7.72.0/tests/libtest/lib566.c
Examining data/curl-7.72.0/tests/libtest/lib599.c
Examining data/curl-7.72.0/tests/libtest/lib1506.c
Examining data/curl-7.72.0/tests/libtest/testtrace.c
Examining data/curl-7.72.0/tests/libtest/testutil.h
Examining data/curl-7.72.0/tests/libtest/lib1908.c
Examining data/curl-7.72.0/tests/libtest/lib558.c
Examining data/curl-7.72.0/tests/libtest/lib513.c
Examining data/curl-7.72.0/tests/libtest/sethostname.c
Examining data/curl-7.72.0/tests/libtest/lib512.c
Examining data/curl-7.72.0/tests/libtest/lib1555.c
Examining data/curl-7.72.0/tests/libtest/lib501.c
Examining data/curl-7.72.0/tests/libtest/lib540.c
Examining data/curl-7.72.0/tests/libtest/lib503.c
Examining data/curl-7.72.0/tests/libtest/lib511.c
Examining data/curl-7.72.0/tests/libtest/libauthretry.c
Examining data/curl-7.72.0/tests/libtest/lib1529.c
Examining data/curl-7.72.0/tests/libtest/lib653.c
Examining data/curl-7.72.0/tests/libtest/lib598.c
Examining data/curl-7.72.0/tests/libtest/lib502.c
Examining data/curl-7.72.0/tests/libtest/lib524.c
Examining data/curl-7.72.0/tests/libtest/lib539.c
Examining data/curl-7.72.0/tests/libtest/lib517.c
Examining data/curl-7.72.0/tests/libtest/lib526.c
Examining data/curl-7.72.0/tests/libtest/lib516.c
Examining data/curl-7.72.0/tests/libtest/lib1559.c
Examining data/curl-7.72.0/tests/libtest/lib504.c
Examining data/curl-7.72.0/tests/libtest/lib1907.c
Examining data/curl-7.72.0/tests/libtest/lib543.c
Examining data/curl-7.72.0/tests/libtest/lib1910.c
Examining data/curl-7.72.0/tests/libtest/lib583.c
Examining data/curl-7.72.0/tests/libtest/lib659.c
Examining data/curl-7.72.0/tests/libtest/stub_gssapi.c
Examining data/curl-7.72.0/tests/libtest/lib1527.c
Examining data/curl-7.72.0/tests/server/server_sockaddr.h
Examining data/curl-7.72.0/tests/server/tftpd.c
Examining data/curl-7.72.0/tests/server/testpart.c
Examining data/curl-7.72.0/tests/server/tftp.h
Examining data/curl-7.72.0/tests/server/getpart.h
Examining data/curl-7.72.0/tests/server/sws.c
Examining data/curl-7.72.0/tests/server/disabled.c
Examining data/curl-7.72.0/tests/server/getpart.c
Examining data/curl-7.72.0/tests/server/resolve.c
Examining data/curl-7.72.0/tests/server/fake_ntlm.c
Examining data/curl-7.72.0/tests/server/server_setup.h
Examining data/curl-7.72.0/tests/server/util.c
Examining data/curl-7.72.0/tests/server/mqttd.c
Examining data/curl-7.72.0/tests/server/socksd.c
Examining data/curl-7.72.0/tests/server/util.h
Examining data/curl-7.72.0/tests/server/rtspd.c
Examining data/curl-7.72.0/tests/server/sockfilt.c
Examining data/curl-7.72.0/tests/unit/unit1396.c
Examining data/curl-7.72.0/tests/unit/unit1650.c
Examining data/curl-7.72.0/tests/unit/unit1603.c
Examining data/curl-7.72.0/tests/unit/curlcheck.h
Examining data/curl-7.72.0/tests/unit/unit1655.c
Examining data/curl-7.72.0/tests/unit/unit1398.c
Examining data/curl-7.72.0/tests/unit/unit1601.c
Examining data/curl-7.72.0/tests/unit/unit1652.c
Examining data/curl-7.72.0/tests/unit/unit1600.c
Examining data/curl-7.72.0/tests/unit/unit1330.c
Examining data/curl-7.72.0/tests/unit/unit1610.c
Examining data/curl-7.72.0/tests/unit/unit1323.c
Examining data/curl-7.72.0/tests/unit/unit1395.c
Examining data/curl-7.72.0/tests/unit/unit1394.c
Examining data/curl-7.72.0/tests/unit/unit1606.c
Examining data/curl-7.72.0/tests/unit/unit1608.c
Examining data/curl-7.72.0/tests/unit/unit1307.c
Examining data/curl-7.72.0/tests/unit/unit1607.c
Examining data/curl-7.72.0/tests/unit/unit1612.c
Examining data/curl-7.72.0/tests/unit/unit1605.c
Examining data/curl-7.72.0/tests/unit/unit1621.c
Examining data/curl-7.72.0/tests/unit/unit1602.c
Examining data/curl-7.72.0/tests/unit/unit1651.c
Examining data/curl-7.72.0/tests/unit/unit1302.c
Examining data/curl-7.72.0/tests/unit/unit1611.c
Examining data/curl-7.72.0/tests/unit/unit1397.c
Examining data/curl-7.72.0/tests/unit/unit1304.c
Examining data/curl-7.72.0/tests/unit/unit1308.c
Examining data/curl-7.72.0/tests/unit/unit1309.c
Examining data/curl-7.72.0/tests/unit/unit1301.c
Examining data/curl-7.72.0/tests/unit/unit1305.c
Examining data/curl-7.72.0/tests/unit/unit1620.c
Examining data/curl-7.72.0/tests/unit/unit1654.c
Examining data/curl-7.72.0/tests/unit/unit1609.c
Examining data/curl-7.72.0/tests/unit/unit1653.c
Examining data/curl-7.72.0/tests/unit/unit1300.c
Examining data/curl-7.72.0/tests/unit/unit1399.c
Examining data/curl-7.72.0/tests/unit/unit1303.c
Examining data/curl-7.72.0/tests/unit/unit1604.c
Examining data/curl-7.72.0/CMake/CurlTests.c

FINAL RESULTS:

data/curl-7.72.0/docs/examples/cookie_interface.c:93:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/curl-7.72.0/docs/examples/cookie_interface.c:93:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/curl-7.72.0/docs/examples/evhiperfifo.c:76:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINT(x...) printf(x)
data/curl-7.72.0/docs/examples/htmltidy.c:56:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(tidyAttrName(attr));
data/curl-7.72.0/docs/examples/rtsp.c:173:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(s, " a = control: %s", control);
data/curl-7.72.0/docs/examples/synctime.c:158:22:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        int RetVal = sscanf((char *)(ptr), "Date: %s %hu %s %hu %hu:%hu:%hu",
data/curl-7.72.0/docs/examples/threaded-shared-conn.c:63:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                    curl_lock_access access, void *userptr)
data/curl-7.72.0/docs/examples/threaded-shared-conn.c:65:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  (void)access; /* unused */
data/curl-7.72.0/lib/content_encoding.c:878:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(p, ce->name);
data/curl-7.72.0/lib/curl_ntlm_wb.c:186:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if(access(ntlm_auth, X_OK) != 0) {
data/curl-7.72.0/lib/curl_ntlm_wb.c:226:7:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execl(ntlm_auth, ntlm_auth,
data/curl-7.72.0/lib/curl_ntlm_wb.c:233:7:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execl(ntlm_auth, ntlm_auth,
data/curl-7.72.0/lib/curl_path.c:181:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(*path, homedir);
data/curl-7.72.0/lib/curl_printf.h:32:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# undef printf
data/curl-7.72.0/lib/curl_printf.h:33:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# undef fprintf
data/curl-7.72.0/lib/curl_printf.h:35:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# undef vprintf
data/curl-7.72.0/lib/curl_printf.h:36:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# undef vfprintf
data/curl-7.72.0/lib/curl_printf.h:37:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# undef vsnprintf
data/curl-7.72.0/lib/curl_printf.h:40:10:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define printf curl_mprintf
data/curl-7.72.0/lib/curl_printf.h:41:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define fprintf curl_mfprintf
data/curl-7.72.0/lib/curl_printf.h:43:10:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define vprintf curl_mvprintf
data/curl-7.72.0/lib/curl_printf.h:44:10:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define vfprintf curl_mvfprintf
data/curl-7.72.0/lib/curl_setup.h:338:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#  define access(fname,mode)         curlx_win32_access(fname, mode)
data/curl-7.72.0/lib/curl_setup.h:359:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#    define access(fname,mode)         curlx_win32_access(fname, mode)
data/curl-7.72.0/lib/curlx.h:94:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# undef printf
data/curl-7.72.0/lib/curlx.h:95:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# undef fprintf
data/curl-7.72.0/lib/curlx.h:96:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
# undef sprintf
data/curl-7.72.0/lib/curlx.h:98:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# undef vprintf
data/curl-7.72.0/lib/curlx.h:99:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# undef vfprintf
data/curl-7.72.0/lib/curlx.h:100:9:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
# undef vsprintf
data/curl-7.72.0/lib/curlx.h:105:10:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define printf curlx_mprintf
data/curl-7.72.0/lib/curlx.h:106:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define fprintf curlx_mfprintf
data/curl-7.72.0/lib/curlx.h:107:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
# define sprintf curlx_msprintf
data/curl-7.72.0/lib/curlx.h:109:10:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define vprintf curlx_mvprintf
data/curl-7.72.0/lib/curlx.h:110:10:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define vfprintf curlx_mvfprintf
data/curl-7.72.0/lib/ftp.c:988:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(addr, string_ftpport);
data/curl-7.72.0/lib/ftp.c:998:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(addr, string_ftpport);
data/curl-7.72.0/lib/inet_ntop.c:69:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dst, tmp);
data/curl-7.72.0/lib/inet_ntop.c:166:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dst, tmp);
data/curl-7.72.0/lib/ldap.c:773:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, fmt, args);
data/curl-7.72.0/lib/mime.c:1448:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if(stat(filename, &sbuf) || access(filename, R_OK))
data/curl-7.72.0/lib/mprintf.c:960:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        (sprintf)(work, formatbuf, p->data.dnum);
data/curl-7.72.0/lib/security.c:403:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buffer, buf);
data/curl-7.72.0/lib/sendf.c:274:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(data->set.errorbuffer, error);
data/curl-7.72.0/lib/smb.c:127:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(p, (str));                             \
data/curl-7.72.0/lib/smb.c:132:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(p, (str));                             \
data/curl-7.72.0/lib/smb.c:530:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(msg.bytes, req->path);
data/curl-7.72.0/lib/smb.h:169:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned int access;
data/curl-7.72.0/lib/socks.c:343:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy((char *)socksreq + packetsize, hostname);
data/curl-7.72.0/lib/socks_gssapi.c:68:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(buf + len, (char *) status_string.value);
data/curl-7.72.0/lib/socks_gssapi.c:89:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(buf + len, (char *) status_string.value);
data/curl-7.72.0/lib/system_win32.c:221:9:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        _tcscpy(path + _tcslen(path), TEXT("\\"));
data/curl-7.72.0/lib/system_win32.c:222:9:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        _tcscpy(path + _tcslen(path), filename);
data/curl-7.72.0/lib/tftp.c:411:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buf, option);
data/curl-7.72.0/lib/urlapi.c:706:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, &url[5]);
data/curl-7.72.0/lib/urlapi.c:1461:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(p, u->query); /* original query */
data/curl-7.72.0/lib/urlapi.c:1464:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(&p[querylen + addamperand], newp); /* new suffix */
data/curl-7.72.0/lib/vauth/krb5_sspi.c:423:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) message + sizeof(outdata), user_name);
data/curl-7.72.0/lib/vquic/ngtcp2.c:111:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, fmt, ap);
data/curl-7.72.0/lib/vssh/libssh2.c:916:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            else if(access(sshc->rsa, R_OK) != 0) {
data/curl-7.72.0/lib/vssh/libssh2.c:921:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              else if(access(sshc->rsa, R_OK) != 0) {
data/curl-7.72.0/lib/vssh/libssh2.c:930:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            if(sshc->rsa && access(sshc->rsa, R_OK) != 0) {
data/curl-7.72.0/lib/vssh/libssh2.c:933:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              if(sshc->rsa && access(sshc->rsa, R_OK) != 0) {
data/curl-7.72.0/lib/vtls/gskit.c:367:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(ciphers[i].ptr, ctp->gsktoken);
data/curl-7.72.0/lib/vtls/gskit.c:417:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ciphers[CURL_GSKPROTO_SSLV3].ptr,
data/curl-7.72.0/lib/vtls/gtls.c:600:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(prioritysrp, prioritylist);
data/curl-7.72.0/lib/vtls/gtls.c:601:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(prioritysrp + len, ":" GNUTLS_SRP);
data/curl-7.72.0/lib/vtls/vtls.c:1342:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buffer, backends);
data/curl-7.72.0/lib/vtls/wolfssl.c:477:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(protocols + strlen(protocols), NGHTTP2_PROTO_VERSION_ID ",");
data/curl-7.72.0/lib/vtls/wolfssl.c:482:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(protocols + strlen(protocols), ALPN_HTTP_1_1);
data/curl-7.72.0/packages/OS400/os400sys.c:1155:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cp, cp2);
data/curl-7.72.0/packages/OS400/os400sys.c:1188:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cp, cp2);
data/curl-7.72.0/packages/OS400/os400sys.c:1221:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cp, cp2);
data/curl-7.72.0/src/tool_cb_hdr.c:222:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(outs->stream, BOLD "%.*s" BOLDOFF ":", namelen, ptr);
data/curl-7.72.0/src/tool_cb_prg.c:198:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(bar->out, format, line, percent);
data/curl-7.72.0/src/tool_dirhie.c:150:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(dirbuildup, tempdir);
data/curl-7.72.0/src/tool_getparam.c:1409:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              strcpy(n, enc);
data/curl-7.72.0/src/tool_help.c:594:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(CURL_ID "%s\n", curl_version());
data/curl-7.72.0/src/tool_main.c:113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fname, env);
data/curl-7.72.0/src/tool_msgs.c:117:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(errors, fmt, ap);
data/curl-7.72.0/src/tool_paramhlp.c:99:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(string + stringlen, buffer);
data/curl-7.72.0/src/tool_parsecfg.c:364:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(&line[linelen], buf);
data/curl-7.72.0/src/tool_progress.c:284:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(global->errors,
data/curl-7.72.0/src/tool_writeout.c:325:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  fprintf(stream, version);
data/curl-7.72.0/src/tool_writeout_json.c:87:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(str, "\"%s\":%" CURL_FORMAT_CURL_OFF_T
data/curl-7.72.0/src/tool_writeout_json.c:120:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(str, "\"%s\":%" CURL_FORMAT_CURL_OFF_T, key, val);
data/curl-7.72.0/tests/libtest/first.c:97:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fname, env);
data/curl-7.72.0/tests/libtest/lib1541.c:49:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                    curl_lock_access access, void *userptr)
data/curl-7.72.0/tests/libtest/lib1541.c:51:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  (void)access; /* unused */
data/curl-7.72.0/tests/libtest/lib547.c:57:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ptr, UPLOADTHIS);
data/curl-7.72.0/tests/libtest/lib555.c:64:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ptr, uploadthis);
data/curl-7.72.0/tests/libtest/stub_gssapi.c:195:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ctx->creds, creds);
data/curl-7.72.0/tests/server/getpart.c:47:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define show(x) printf x
data/curl-7.72.0/tests/server/getpart.c:433:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(couter, ptag);
data/curl-7.72.0/tests/server/getpart.c:439:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(cmain, ptag);
data/curl-7.72.0/tests/server/getpart.c:445:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(csub, ptag);
data/curl-7.72.0/tests/server/socksd.c:158:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(config.addr, CONFIG_ADDR);
data/curl-7.72.0/tests/server/socksd.c:199:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(config.addr, value);
data/curl-7.72.0/tests/server/socksd.c:207:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(config.user, value);
data/curl-7.72.0/tests/server/socksd.c:211:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(config.password, value);
data/curl-7.72.0/tests/unit/unit1307.c:268:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
enum system {
data/curl-7.72.0/tests/unit/unit1307.c:278:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  enum system machine;
data/curl-7.72.0/docs/examples/curlx.c:332:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        p.pst = getenv(*(++args));
data/curl-7.72.0/include/curl/curl.h:2372:19:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
CURL_EXTERN char *curl_getenv(const char *variable);
data/curl-7.72.0/lib/altsvc.c:421:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *timestr = getenv("CURL_TIME");
data/curl-7.72.0/lib/curl_gethostname.c:67:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *force_hostname = getenv("CURL_GETHOSTNAME");
data/curl-7.72.0/lib/curl_ntlm_core.c:659:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *force_timestamp = getenv("CURL_FORCETIME");
data/curl-7.72.0/lib/curl_ntlm_wb.c:149:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    username = getenv("NTLMUSER");
data/curl-7.72.0/lib/curl_ntlm_wb.c:151:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      username = getenv("LOGNAME");
data/curl-7.72.0/lib/curl_ntlm_wb.c:153:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      username = getenv("USER");
data/curl-7.72.0/lib/curl_ntlm_wb.c:179:21:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ntlm_auth_alloc = curl_getenv("CURL_NTLM_WB_FILE");
data/curl-7.72.0/lib/curl_threads.h:43:34:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
#    define Curl_mutex_init(m)   InitializeCriticalSection(m)
data/curl-7.72.0/lib/curl_threads.h:47:34:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#  define Curl_mutex_acquire(m)  EnterCriticalSection(m)
data/curl-7.72.0/lib/curlx.h:78:22:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define curlx_getenv curl_getenv
data/curl-7.72.0/lib/getenv.c:69:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *env = getenv(variable);
data/curl-7.72.0/lib/getenv.c:74:7:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *curl_getenv(const char *v)
data/curl-7.72.0/lib/getinfo.c:180:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *timestr = getenv("CURL_TIME");
data/curl-7.72.0/lib/getinfo.c:192:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  timestr = getenv("CURL_DEBUG_SIZE");
data/curl-7.72.0/lib/getinfo.c:323:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *timestr = getenv("CURL_TIME");
data/curl-7.72.0/lib/getinfo.c:402:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *timestr = getenv("CURL_TIME");
data/curl-7.72.0/lib/http.c:1230:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *p = getenv("CURL_SMALLREQSEND");
data/curl-7.72.0/lib/http.c:3999:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             getenv("CURL_ALTSVC_HTTP")
data/curl-7.72.0/lib/ldap.c:766:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *env = getenv("CURL_TRACE");
data/curl-7.72.0/lib/netrc.c:222:19:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *homea = curl_getenv("HOME"); /* portable environment reader */
data/curl-7.72.0/lib/openldap.c:225:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *env = getenv("CURL_OPENLDAP_TRACE");
data/curl-7.72.0/lib/rand.c:47:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *force_entropy = getenv("CURL_ENTROPY");
data/curl-7.72.0/lib/setup-vms.h:37:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define getenv decc_getenv
data/curl-7.72.0/lib/setup-vms.h:50:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#undef getenv
data/curl-7.72.0/lib/setup-vms.h:52:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define getenv vms_getenv
data/curl-7.72.0/lib/system_win32.c:202:7:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
      LoadLibrary(filename);
data/curl-7.72.0/lib/system_win32.c:228:11:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
          LoadLibrary(path);
data/curl-7.72.0/lib/url.c:2192:10:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  prox = curl_getenv(proxy_env);
data/curl-7.72.0/lib/url.c:2209:12:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    prox = curl_getenv(proxy_env);
data/curl-7.72.0/lib/url.c:2218:13:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    proxy = curl_getenv(envp); /* default proxy to use */
data/curl-7.72.0/lib/url.c:2221:15:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      proxy = curl_getenv(envp);
data/curl-7.72.0/lib/url.c:2437:16:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    no_proxy = curl_getenv(p);
data/curl-7.72.0/lib/url.c:2440:18:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      no_proxy = curl_getenv(p);
data/curl-7.72.0/lib/url.c:3078:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      getenv("CURL_ALTSVC_HTTP")
data/curl-7.72.0/lib/version.c:156:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *debugversion = getenv("CURL_VERSION");
data/curl-7.72.0/lib/vquic/ngtcp2.c:203:18:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  gnutls_datum_t srandom;
data/curl-7.72.0/lib/vquic/ngtcp2.c:205:49:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  gnutls_session_get_random(session, &crandom, &srandom);
data/curl-7.72.0/lib/vquic/quiche.c:213:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  keylog_file = getenv("SSLKEYLOGFILE");
data/curl-7.72.0/lib/vquic/vquic.c:54:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *qlog_dir = getenv("QLOGDIR");
data/curl-7.72.0/lib/vssh/libssh2.c:908:24:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
          char *home = curl_getenv("HOME");
data/curl-7.72.0/lib/vtls/keylog.c:51:24:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    keylog_file_name = curl_getenv("SSLKEYLOGFILE");
data/curl-7.72.0/lib/vtls/nss.c:1381:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  cert_dir = getenv("SSL_DIR");
data/curl-7.72.0/lib/vtls/vtls.c:809:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return Curl_ssl->random(data, entropy, length);
data/curl-7.72.0/lib/vtls/vtls.c:1362:19:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = env_tmp = curl_getenv("CURL_SSL_BACKEND");
data/curl-7.72.0/lib/vtls/vtls.h:55:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  CURLcode (*random)(struct Curl_easy *data, unsigned char *entropy,
data/curl-7.72.0/src/tool_homedir.c:38:9:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = curl_getenv(variable);
data/curl-7.72.0/src/tool_main.c:338:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if(getenv("_IN_NETWARE_BASH_") == NULL)
data/curl-7.72.0/src/tool_vms.c:56:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  shell = getenv("SHELL");
data/curl-7.72.0/tests/libtest/first.c:91:9:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = curl_getenv("CURL_MEMDEBUG");
data/curl-7.72.0/tests/libtest/first.c:105:9:  [3] (buffer) curl_getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = curl_getenv("CURL_MEMLIMIT");
data/curl-7.72.0/tests/libtest/sethostname.c:32:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *force_hostname = getenv("CURL_GETHOSTNAME");
data/curl-7.72.0/tests/libtest/stub_gssapi.c:103:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  creds = getenv("CURL_STUB_GSS_CREDS");
data/curl-7.72.0/tests/server/fake_ntlm.c:160:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = getenv("CURL_NTLM_AUTH_TESTNUM");
data/curl-7.72.0/tests/server/fake_ntlm.c:183:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = getenv("CURL_NTLM_AUTH_SRCDIR");
data/curl-7.72.0/CMake/CurlTests.c:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[8192];
data/curl-7.72.0/CMake/CurlTests.c:519:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/curl-7.72.0/CMake/CurlTests.c:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/curl-7.72.0/docs/examples/anyauthput.c:116:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hd = open(file, O_RDONLY);
data/curl-7.72.0/docs/examples/cookie_interface.c:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nline[256];
data/curl-7.72.0/docs/examples/crawler.c:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&(mem->buf[mem->size]), contents, realsize);
data/curl-7.72.0/docs/examples/curlgtk.c:53:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *outfile = fopen(filename, "wb");
data/curl-7.72.0/docs/examples/curlx.c:157:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(tmp, ia5->data, ia5->length);
data/curl-7.72.0/docs/examples/ephiperfifo.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error[CURL_ERROR_SIZE];
data/curl-7.72.0/docs/examples/ephiperfifo.c:394:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[1024];
data/curl-7.72.0/docs/examples/ephiperfifo.c:431:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  sockfd = open(fifo, O_RDWR | O_NONBLOCK, 0);
data/curl-7.72.0/docs/examples/evhiperfifo.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error[CURL_ERROR_SIZE];
data/curl-7.72.0/docs/examples/evhiperfifo.c:372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[1024];
data/curl-7.72.0/docs/examples/evhiperfifo.c:409:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  sockfd = open(fifo, O_RDWR | O_NONBLOCK, 0);
data/curl-7.72.0/docs/examples/fileupload.c:39:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = fopen("debugit", "rb"); /* open file to upload */
data/curl-7.72.0/docs/examples/fopen.c:121:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&url->buffer[url->buffer_pos], buffer, size);
data/curl-7.72.0/docs/examples/fopen.c:244:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file->handle.file = fopen(url, operation);
data/curl-7.72.0/docs/examples/fopen.c:357:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, file->buffer, want);
data/curl-7.72.0/docs/examples/fopen.c:405:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, file->buffer, want);
data/curl-7.72.0/docs/examples/fopen.c:461:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[256];
data/curl-7.72.0/docs/examples/fopen.c:470:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  outf = fopen(FGETSFILE, "wb+");
data/curl-7.72.0/docs/examples/fopen.c:494:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  outf = fopen(FREADFILE, "wb+");
data/curl-7.72.0/docs/examples/fopen.c:518:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  outf = fopen(REWINDFILE, "wb+");
data/curl-7.72.0/docs/examples/ftp-wildcard.c:120:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    data->output = fopen(finfo->filename, "wb");
data/curl-7.72.0/docs/examples/ftpget.c:41:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out->stream = fopen(out->filename, "wb");
data/curl-7.72.0/docs/examples/ftpgetresp.c:49:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ftpfile = fopen(FTPBODY, "wb"); /* b is binary, needed on win32 */
data/curl-7.72.0/docs/examples/ftpgetresp.c:52:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  respfile = fopen(FTPHEADERS, "wb"); /* b is binary, needed on win32 */
data/curl-7.72.0/docs/examples/ftpsget.c:43:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out->stream = fopen(out->filename, "wb");
data/curl-7.72.0/docs/examples/ftpupload.c:88:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hd_src = fopen(LOCAL_FILE, "rb");
data/curl-7.72.0/docs/examples/ftpuploadfrommem.c:58:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, upload->readptr, copylen);
data/curl-7.72.0/docs/examples/ftpuploadresume.c:76:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(localpath, "rb");
data/curl-7.72.0/docs/examples/getinmemory.c:53:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&(mem->memory[mem->size]), contents, realsize);
data/curl-7.72.0/docs/examples/ghiper.c:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error[CURL_ERROR_SIZE];
data/curl-7.72.0/docs/examples/ghiper.c:401:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  socket = open(fifo, O_RDWR | O_NONBLOCK, 0);
data/curl-7.72.0/docs/examples/hiperfifo.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error[CURL_ERROR_SIZE];
data/curl-7.72.0/docs/examples/hiperfifo.c:362:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[1024];
data/curl-7.72.0/docs/examples/hiperfifo.c:407:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  sockfd = open(fifo, O_RDWR | O_NONBLOCK, 0);
data/curl-7.72.0/docs/examples/href_extractor.c:42:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    html_parser_char_parse(hsp, ((char *)buffer)[p]);
data/curl-7.72.0/docs/examples/href_extractor.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[1], attr[4], val[128];
data/curl-7.72.0/docs/examples/htmltidy.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char curl_errbuf[CURL_ERROR_SIZE];
data/curl-7.72.0/docs/examples/htmltitle.cpp:65:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char errorBuffer[CURL_ERROR_SIZE];
data/curl-7.72.0/docs/examples/http2-download.c:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[128];
data/curl-7.72.0/docs/examples/http2-download.c:153:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  t->out = fopen(filename, "wb");
data/curl-7.72.0/docs/examples/http2-download.c:196:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    num_transfers = atoi(argv[1]);
data/curl-7.72.0/docs/examples/http2-pushinmemory.c:55:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&(mem->memory[mem->size]), contents, realsize);
data/curl-7.72.0/docs/examples/http2-serverpush.c:133:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *out = fopen(OUTPUTFILE, "wb");
data/curl-7.72.0/docs/examples/http2-serverpush.c:172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[128];
data/curl-7.72.0/docs/examples/http2-serverpush.c:181:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(filename, "wb");
data/curl-7.72.0/docs/examples/http2-upload.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timebuf[60];
data/curl-7.72.0/docs/examples/http2-upload.c:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char url[256];
data/curl-7.72.0/docs/examples/http2-upload.c:174:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[128];
data/curl-7.72.0/docs/examples/http2-upload.c:182:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(filename, "wb");
data/curl-7.72.0/docs/examples/http2-upload.c:200:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  i->in = fopen(upload, "rb");
data/curl-7.72.0/docs/examples/http2-upload.c:255:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    num_transfers = atoi(argv[1]);
data/curl-7.72.0/docs/examples/httpput.c:81:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hd_src = fopen(file, "rb");
data/curl-7.72.0/docs/examples/imap-append.c:75:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, data, len);
data/curl-7.72.0/docs/examples/multi-event.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[50];
data/curl-7.72.0/docs/examples/multi-event.c:72:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file = fopen(filename, "wb");
data/curl-7.72.0/docs/examples/multi-uv.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[50];
data/curl-7.72.0/docs/examples/multi-uv.c:82:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file = fopen(filename, "wb");
data/curl-7.72.0/docs/examples/multithread.c:42:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * const urls[NUMT]= {
data/curl-7.72.0/docs/examples/post-callback.c:54:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, wt->readptr, copy_this_much);
data/curl-7.72.0/docs/examples/postinmemory.c:50:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&(mem->memory[mem->size]), contents, realsize);
data/curl-7.72.0/docs/examples/rtsp.c:92:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *sdp_fp = fopen(sdp_filename, "wb");
data/curl-7.72.0/docs/examples/rtsp.c:153:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(sdp_filename, "video.sdp");
data/curl-7.72.0/docs/examples/rtsp.c:169:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *sdp_fp = fopen(sdp_filename, "rb");
data/curl-7.72.0/docs/examples/sendrecv.c:131:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[1024];
data/curl-7.72.0/docs/examples/sepheaders.c:61:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  headerfile = fopen(headerfilename, "wb");
data/curl-7.72.0/docs/examples/sepheaders.c:68:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  bodyfile = fopen(bodyfilename, "wb");
data/curl-7.72.0/docs/examples/sftpget.c:52:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out->stream = fopen(out->filename, "wb");
data/curl-7.72.0/docs/examples/sftpuploadresume.c:89:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(localpath, "rb");
data/curl-7.72.0/docs/examples/simplessl.c:74:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  headerfile = fopen(pHeaderFile, "wb");
data/curl-7.72.0/docs/examples/smooth-gtk-thread.c:87:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *outfile = fopen(urls[j], "wb");
data/curl-7.72.0/docs/examples/smtp-authzid.c:83:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, data, len);
data/curl-7.72.0/docs/examples/smtp-mail.c:80:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, data, len);
data/curl-7.72.0/docs/examples/smtp-multi.c:77:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, data, len);
data/curl-7.72.0/docs/examples/smtp-ssl.c:77:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, data, len);
data/curl-7.72.0/docs/examples/smtp-tls.c:77:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, data, len);
data/curl-7.72.0/docs/examples/sslbackend.c:60:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int id = atoi(name);
data/curl-7.72.0/docs/examples/synctime.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char http_proxy[MAX_STRING1];
data/curl-7.72.0/docs/examples/synctime.c:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char proxy_user[MAX_STRING1];
data/curl-7.72.0/docs/examples/synctime.c:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timeserver[MAX_STRING1];
data/curl-7.72.0/docs/examples/synctime.c:111:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char DefaultTimeServer[3][MAX_STRING1] =
data/curl-7.72.0/docs/examples/synctime.c:140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  TmpStr1[26], TmpStr2[26];
data/curl-7.72.0/docs/examples/synctime.c:215:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    outfile = fopen(OutFileName, "wb");
data/curl-7.72.0/docs/examples/synctime.c:309:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timeBuf[61];
data/curl-7.72.0/docs/examples/synctime.c:310:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tzoneBuf[16];
data/curl-7.72.0/docs/examples/url2file.c:67:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pagefile = fopen(pagefilename, "wb");
data/curl-7.72.0/docs/examples/xmlstream.c:81:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&(mem->memory[mem->size]), s, len);
data/curl-7.72.0/lib/altsvc.c:145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char srchost[MAX_ALTSVC_HOSTLEN + 1];
data/curl-7.72.0/lib/altsvc.c:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dsthost[MAX_ALTSVC_HOSTLEN + 1];
data/curl-7.72.0/lib/altsvc.c:147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char srcalpn[MAX_ALTSVC_ALPNLEN + 1];
data/curl-7.72.0/lib/altsvc.c:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dstalpn[MAX_ALTSVC_ALPNLEN + 1];
data/curl-7.72.0/lib/altsvc.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char date[MAX_ALTSVC_DATELEN + 1];
data/curl-7.72.0/lib/altsvc.c:200:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(file, FOPEN_READTEXT);
data/curl-7.72.0/lib/altsvc.c:331:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char randsuffix[9];
data/curl-7.72.0/lib/altsvc.c:352:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(tempstore, FOPEN_WRITETEXT);
data/curl-7.72.0/lib/altsvc.c:392:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(alpnbuf, protop, len);
data/curl-7.72.0/lib/altsvc.c:453:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char namebuf[MAX_ALTSVC_HOSTLEN] = "";
data/curl-7.72.0/lib/altsvc.c:454:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char alpnbuf[MAX_ALTSVC_ALPNLEN] = "";
data/curl-7.72.0/lib/altsvc.c:481:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char option[32];
data/curl-7.72.0/lib/altsvc.c:499:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(namebuf, hostp, len);
data/curl-7.72.0/lib/asyn-ares.c:795:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char a6[INET6_ADDRSTRLEN];
data/curl-7.72.0/lib/asyn-thread.c:299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char service[12];
data/curl-7.72.0/lib/asyn-thread.c:302:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1];
data/curl-7.72.0/lib/base64.c:181:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ibuf[3];
data/curl-7.72.0/lib/base64.c:182:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char obuf[4];
data/curl-7.72.0/lib/config-win32.h:733:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sun_path[UNIX_PATH_MAX];
data/curl-7.72.0/lib/conncache.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[HASHKEY_SIZE];
data/curl-7.72.0/lib/conncache.c:241:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[HASHKEY_SIZE];
data/curl-7.72.0/lib/conncache.c:537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[READBUFFER_MIN + 1];
data/curl-7.72.0/lib/connect.c:275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char myhost[256] = "";
data/curl-7.72.0/lib/connect.c:408:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            si6->sin6_scope_id = atoi(scope_ptr);
data/curl-7.72.0/lib/connect.c:457:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/connect.c:483:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/connect.c:614:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(conn->data->info.conn_primary_ip, conn->primary_ip, MAX_IPADR_LEN);
data/curl-7.72.0/lib/connect.c:615:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(conn->data->info.conn_local_ip, conn->local_ip, MAX_IPADR_LEN);
data/curl-7.72.0/lib/connect.c:687:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/connect.c:718:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(conn->ip_addr_str, conn->primary_ip, MAX_IPADR_LEN);
data/curl-7.72.0/lib/connect.c:952:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ipaddress[MAX_IPADR_LEN];
data/curl-7.72.0/lib/connect.c:953:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/connect.c:978:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/connect.c:1026:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/connect.c:1053:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/connect.c:1126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipaddress[MAX_IPADR_LEN];
data/curl-7.72.0/lib/connect.c:1132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/connect.c:1520:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&addr->sa_addr, ai->ai_addr, addr->addrlen);
data/curl-7.72.0/lib/content_encoding.c:498:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(z->next_in, buf, z->avail_in);
data/curl-7.72.0/lib/content_encoding.c:521:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(z->next_in + z->avail_in - nbytes, buf, nbytes);
data/curl-7.72.0/lib/cookie.c:463:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_NAME];
data/curl-7.72.0/lib/cookie.c:464:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char what[MAX_NAME];
data/curl-7.72.0/lib/cookie.c:757:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(co->path, path, pathlen);
data/curl-7.72.0/lib/cookie.c:1133:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = file?fopen(file, FOPEN_READTEXT):NULL;
data/curl-7.72.0/lib/cookie.c:1527:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char randsuffix[9];
data/curl-7.72.0/lib/cookie.c:1536:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(tempstore, FOPEN_WRITETEXT);
data/curl-7.72.0/lib/curl_addrinfo.c:170:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ca->ai_addr, ai->ai_addr, ss_size);
data/curl-7.72.0/lib/curl_addrinfo.c:174:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ca->ai_canonname, ai->ai_canonname, namelen);
data/curl-7.72.0/lib/curl_addrinfo.c:298:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ai->ai_canonname, he->h_name, namelen);
data/curl-7.72.0/lib/curl_addrinfo.c:322:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&addr->sin_addr, curr, sizeof(struct in_addr));
data/curl-7.72.0/lib/curl_addrinfo.c:331:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&addr6->sin6_addr, curr, sizeof(struct in6_addr));
data/curl-7.72.0/lib/curl_addrinfo.c:358:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *h_addr_list[2];
data/curl-7.72.0/lib/curl_addrinfo.c:405:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrentry, inaddr, sizeof(struct in_addr));
data/curl-7.72.0/lib/curl_addrinfo.c:411:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrentry, inaddr, sizeof(struct in6_addr));
data/curl-7.72.0/lib/curl_addrinfo.c:502:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sa_un->sun_path + 1, path, path_len - 1);
data/curl-7.72.0/lib/curl_addrinfo.c:504:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sa_un->sun_path, path, path_len); /* copy NUL byte */
data/curl-7.72.0/lib/curl_ctype.c:44:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char ascii[128] = {
data/curl-7.72.0/lib/curl_fnmatch.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keyword[KEYLEN] = { 0 };
data/curl-7.72.0/lib/curl_fnmatch.c:260:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char charset[CURLFNM_CHSET_SIZE] = { 0 };
data/curl-7.72.0/lib/curl_gssapi.c:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[GSS_LOG_BUFFER_LEN];
data/curl-7.72.0/lib/curl_multibyte.c:42:21:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    int str_w_len = MultiByteToWideChar(CP_UTF8, MB_ERR_INVALID_CHARS,
data/curl-7.72.0/lib/curl_multibyte.c:47:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if(MultiByteToWideChar(CP_UTF8, 0, str_utf8, -1, str_w,
data/curl-7.72.0/lib/curl_multibyte.c:99:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return (fopen)(filename, mode);
data/curl-7.72.0/lib/curl_ntlm_core.c:169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[8];
data/curl-7.72.0/lib/curl_ntlm_core.c:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[8];
data/curl-7.72.0/lib/curl_ntlm_core.c:212:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[8];                                /* expanded 64 bit key */
data/curl-7.72.0/lib/curl_ntlm_core.c:271:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[8];
data/curl-7.72.0/lib/curl_ntlm_core.c:290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[8];
data/curl-7.72.0/lib/curl_ntlm_core.c:313:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[8];
data/curl-7.72.0/lib/curl_ntlm_core.c:342:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[8];
data/curl-7.72.0/lib/curl_ntlm_core.c:371:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(out, in, 8);
data/curl-7.72.0/lib/curl_ntlm_core.c:448:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char pw[14];
data/curl-7.72.0/lib/curl_ntlm_core.c:648:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char hmac_output[HMAC_MD5_LENGTH];
data/curl-7.72.0/lib/curl_ntlm_core.c:683:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr + 32, challenge_client, 8);
data/curl-7.72.0/lib/curl_ntlm_core.c:684:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr + 44, ntlm->target_info, ntlm->target_info_len);
data/curl-7.72.0/lib/curl_ntlm_core.c:687:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr + 8, &ntlm->nonce[0], 8);
data/curl-7.72.0/lib/curl_ntlm_core.c:696:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, hmac_output, HMAC_MD5_LENGTH);
data/curl-7.72.0/lib/curl_ntlm_core.c:724:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char data[16];
data/curl-7.72.0/lib/curl_ntlm_core.c:725:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char hmac_output[16];
data/curl-7.72.0/lib/curl_ntlm_core.c:728:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&data[0], challenge_server, 8);
data/curl-7.72.0/lib/curl_ntlm_core.c:729:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&data[8], challenge_client, 8);
data/curl-7.72.0/lib/curl_ntlm_core.c:737:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(lmresp, hmac_output, 16);
data/curl-7.72.0/lib/curl_ntlm_core.c:738:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(lmresp + 16, challenge_client, 8);
data/curl-7.72.0/lib/curl_ntlm_wb.c:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pwbuf[1024];
data/curl-7.72.0/lib/curl_ntlm_wb.c:128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/curl_path.c:58:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(real_path, working_path + 3, working_path_len - 2);
data/curl-7.72.0/lib/curl_path.c:60:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(real_path, working_path, 1 + working_path_len);
data/curl-7.72.0/lib/curl_path.c:72:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(real_path, homedir, homelen);
data/curl-7.72.0/lib/curl_path.c:76:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(real_path + homelen + 1, working_path + 3,
data/curl-7.72.0/lib/curl_path.c:86:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(real_path, working_path, 1 + working_path_len);
data/curl-7.72.0/lib/curl_path.c:188:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(*path)[pathLength], cp, (int)(end - cp));
data/curl-7.72.0/lib/curl_setup.h:337:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define fopen(fname,mode)          curlx_win32_fopen(fname, mode)
data/curl-7.72.0/lib/curl_setup.h:358:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#    define fopen(fname,mode)          curlx_win32_fopen(fname, mode)
data/curl-7.72.0/lib/doh.c:151:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dnsp, hostp, labellen);
data/curl-7.72.0/lib/doh.c:478:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&a->ip.v4, &doh[index], 4);
data/curl-7.72.0/lib/doh.c:492:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&a->ip.v6, &doh[index], 16);
data/curl-7.72.0/lib/doh.c:756:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[128];
data/curl-7.72.0/lib/doh.c:836:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ai->ai_canonname, hostname, hostlen);
data/curl-7.72.0/lib/doh.c:860:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&addr->sin_addr, &de->addr[i].ip.v4, sizeof(struct in_addr));
data/curl-7.72.0/lib/doh.c:869:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&addr6->sin6_addr, &de->addr[i].ip.v6, sizeof(struct in6_addr));
data/curl-7.72.0/lib/doh.h:76:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char v4[4]; /* network byte order */
data/curl-7.72.0/lib/doh.h:77:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char v6[16];
data/curl-7.72.0/lib/dotdot.c:177:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(outptr, &input[oindex], qlen + 1); /* include the end zero byte */
data/curl-7.72.0/lib/dynbuf.c:106:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&s->bufr[indx], mem, len);
data/curl-7.72.0/lib/escape.c:105:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char encoded[4];
data/curl-7.72.0/lib/escape.c:167:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hexstr[3];
data/curl-7.72.0/lib/file.c:76:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define open_readonly(p,f) open((p),(f),(0))
data/curl-7.72.0/lib/file.c:78:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define open_readonly(p,f) open((p),(f))
data/curl-7.72.0/lib/file.c:286:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(file->path, mode, conn->data->set.new_file_perms);
data/curl-7.72.0/lib/file.c:419:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[80];
data/curl-7.72.0/lib/formdata.c:725:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[8192];
data/curl-7.72.0/lib/formdata.c:785:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zname, name, len);
data/curl-7.72.0/lib/ftp.c:918:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char myhost[MAX_IPADR_LEN + 1] = "";
data/curl-7.72.0/lib/ftp.c:923:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hbuf[NI_MAXHOST];
data/curl-7.72.0/lib/ftp.c:939:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/ftp.c:1114:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(sa, ai->ai_addr, ai->ai_addrlen);
data/curl-7.72.0/lib/ftp.c:1247:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char target[sizeof(myhost) + 20];
data/curl-7.72.0/lib/ftp.c:1826:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char separator[4];
data/curl-7.72.0/lib/ftp.c:2048:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char timebuf[24];
data/curl-7.72.0/lib/ftp.c:2064:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char headerbuf[128];
data/curl-7.72.0/lib/ftp.c:2279:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char clbuf[128];
data/curl-7.72.0/lib/ftp.c:2314:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[24]= { "Accept-ranges: bytes\r\n" };
data/curl-7.72.0/lib/ftp.c:3469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/curl-7.72.0/lib/ftp.c:3955:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[SBUF_SIZE];
data/curl-7.72.0/lib/ftp.c:3970:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&s, cmd, write_len);
data/curl-7.72.0/lib/ftp.c:3971:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(&s[write_len], "\r\n"); /* append a trailing CRLF */
data/curl-7.72.0/lib/hash.c:92:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(he->key, key, key_len);
data/curl-7.72.0/lib/hash.h:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   key[1]; /* allocated memory following the struct */
data/curl-7.72.0/lib/hostip.c:264:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char entry_id[MAX_HOSTCACHE_LEN];
data/curl-7.72.0/lib/hostip.c:419:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char entry_id[MAX_HOSTCACHE_LEN];
data/curl-7.72.0/lib/hostip.c:875:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname[256];
data/curl-7.72.0/lib/hostip.c:882:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char entry_id[MAX_HOSTCACHE_LEN];
data/curl-7.72.0/lib/hostip.c:911:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char address[64];
data/curl-7.72.0/lib/hostip.c:928:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(hostname, hostp->data, host_end - hostp->data);
data/curl-7.72.0/lib/hostip.c:966:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(address, addr_begin, alen);
data/curl-7.72.0/lib/hostip4.c:134:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sbuf[12];
data/curl-7.72.0/lib/hostip6.c:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[INET6_ADDRSTRLEN];
data/curl-7.72.0/lib/hostip6.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sbuf[12];
data/curl-7.72.0/lib/hostip6.c:142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addrbuf[128];
data/curl-7.72.0/lib/http.c:272:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, start, len);
data/curl-7.72.0/lib/http.c:1123:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, http->postdata, (size_t)http->postsize);
data/curl-7.72.0/lib/http.c:1143:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, http->postdata, fullsize);
data/curl-7.72.0/lib/http.c:1224:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data->state.ulbuf, ptr, sendsize);
data/curl-7.72.0/lib/http.c:1446:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char proxy_header[128];
data/curl-7.72.0/lib/http.c:1449:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tcp_version[5];
data/curl-7.72.0/lib/http.c:1453:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(tcp_version, "TCP6");
data/curl-7.72.0/lib/http.c:1456:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(tcp_version, "TCP4");
data/curl-7.72.0/lib/http.c:1835:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char datestr[80];
data/curl-7.72.0/lib/http.c:1916:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ftp_typecode[sizeof("/;type=?")] = "";
data/curl-7.72.0/lib/http.c:3559:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char scratch[SCRATCHSIZE + 1]; /* "HTTP/major.minor 123" */
data/curl-7.72.0/lib/http.c:3585:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char twoorthree[2];
data/curl-7.72.0/lib/http2.c:719:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&stream->mem[stream->memlen],
data/curl-7.72.0/lib/http2.c:791:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&stream->mem[stream->memlen], data, nread);
data/curl-7.72.0/lib/http2.c:1112:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, stream->upload_mem, nread);
data/curl-7.72.0/lib/http2.c:1604:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mem, Curl_dyn_ptr(&stream->header_recvbuf) +
data/curl-7.72.0/lib/http2.c:1644:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mem, stream->pausedata, nread);
data/curl-7.72.0/lib/http2.c:1976:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[0].namelen = strlen((char *)nva[0].name);
data/curl-7.72.0/lib/http2.c:1998:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[1].namelen = strlen((char *)nva[1].name);
data/curl-7.72.0/lib/http2.c:2008:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[2].namelen = strlen((char *)nva[2].name);
data/curl-7.72.0/lib/http2.c:2013:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[2].valuelen = strlen((char *)nva[2].value);
data/curl-7.72.0/lib/http2.c:2046:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      nva[i].namelen = strlen((char *)nva[i].name);
data/curl-7.72.0/lib/http2.c:2051:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      Curl_strntolower((char *)hdbuf, hdbuf, nva[i].namelen);
data/curl-7.72.0/lib/http2.c:2059:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    switch(inspect_header((const char *)nva[i].name, nva[i].namelen, hdbuf,
data/curl-7.72.0/lib/http2.c:2312:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(httpc->inbuf, mem, nread);
data/curl-7.72.0/lib/http_chunks.h:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hexbuffer[ MAXNUM_SIZE + 1];
data/curl-7.72.0/lib/idn_win32.c:77:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t punycode[IDN_MAX_LENGTH];
data/curl-7.72.0/lib/idn_win32.c:97:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t unicode[IDN_MAX_LENGTH];
data/curl-7.72.0/lib/if2ip.c:122:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char scope[12] = "";
data/curl-7.72.0/lib/if2ip.c:123:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char ipstr[64];
data/curl-7.72.0/lib/if2ip.c:210:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(req.ifr_name, interf, len + 1);
data/curl-7.72.0/lib/if2ip.h:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ifrn_name[IFNAMSIZ]; /* if name, e.g. "en0" */
data/curl-7.72.0/lib/imap.c:1062:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[20];
data/curl-7.72.0/lib/imap.h:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resptag[5];            /* Response tag to wait for */
data/curl-7.72.0/lib/inet_ntop.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[sizeof("255.255.255.255")];
data/curl-7.72.0/lib/inet_ntop.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255")];
data/curl-7.72.0/lib/inet_pton.c:97:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[INADDRSZ], *tp;
data/curl-7.72.0/lib/inet_pton.c:132:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, tmp, INADDRSZ);
data/curl-7.72.0/lib/inet_pton.c:155:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[IN6ADDRSZ], *tp, *endp, *colonp;
data/curl-7.72.0/lib/inet_pton.c:232:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, tmp, IN6ADDRSZ);
data/curl-7.72.0/lib/krb5.c:91:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(buf, "599 ");
data/curl-7.72.0/lib/krb5.c:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, dec.value, dec.length);
data/curl-7.72.0/lib/krb5.c:139:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*to, enc.value, enc.length);
data/curl-7.72.0/lib/md4.c:96:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(result, gcry_md_read(*ctx, 0), MD4_DIGEST_LENGTH);
data/curl-7.72.0/lib/md4.c:207:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ctx->data, data, size);
data/curl-7.72.0/lib/md4.c:276:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[64];
data/curl-7.72.0/lib/md4.c:448:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&ctx->buffer[used], data, size);
data/curl-7.72.0/lib/md4.c:452:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ctx->buffer[used], data, available);
data/curl-7.72.0/lib/md4.c:463:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ctx->buffer, data, size);
data/curl-7.72.0/lib/md5.c:90:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(digest, gcry_md_read(*ctx, 0), 16);
data/curl-7.72.0/lib/md5.c:270:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[64];
data/curl-7.72.0/lib/md5.c:464:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&ctx->buffer[used], data, size);
data/curl-7.72.0/lib/md5.c:468:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ctx->buffer[used], data, available);
data/curl-7.72.0/lib/md5.c:479:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ctx->buffer, data, size);
data/curl-7.72.0/lib/memdebug.c:112:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      curl_dbg_logfile = fopen(logname, FOPEN_WRITETEXT);
data/curl-7.72.0/lib/memdebug.c:231:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mem, str, len);
data/curl-7.72.0/lib/memdebug.c:256:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mem, str, bsiz);
data/curl-7.72.0/lib/memdebug.c:450:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *res = fopen(file, mode);
data/curl-7.72.0/lib/memdebug.h:150:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#undef fopen
data/curl-7.72.0/lib/memdebug.h:151:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen(file,mode) curl_dbg_fopen(file,mode,__LINE__,__FILE__)
data/curl-7.72.0/lib/mime.c:131:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen_read fopen
data/curl-7.72.0/lib/mime.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[8192];
data/curl-7.72.0/lib/mime.c:154:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file = fopen(name, FOPEN_READTEXT); /* VMS */
data/curl-7.72.0/lib/mime.c:210:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return fopen(file, FOPEN_READTEXT); /* VMS */
data/curl-7.72.0/lib/mime.c:213:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return fopen(file, FOPEN_READTEXT, "rfm=stmlf", "ctx=stm");
data/curl-7.72.0/lib/mime.c:370:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, st->buf + st->bufbeg, size);
data/curl-7.72.0/lib/mime.c:537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4];
data/curl-7.72.0/lib/mime.c:604:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "\x3D\x0D\x0A");    /* "=\r\n" */
data/curl-7.72.0/lib/mime.c:618:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, buf, len);
data/curl-7.72.0/lib/mime.c:655:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, part->data + curlx_sotouz(part->state.offset), sz);
data/curl-7.72.0/lib/mime.c:768:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, bytes, sz);
data/curl-7.72.0/lib/mime.c:1421:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(part->data, data, datasize);
data/curl-7.72.0/lib/mime.h:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           buf[ENCODING_BUFFER_SIZE]; /* Input buffer. */
data/curl-7.72.0/lib/mime.h:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char boundary[MIME_BOUNDARY_LEN]; /* The part boundary. */
data/curl-7.72.0/lib/mprintf.c:584:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *endpos[MAX_PARAMETERS];
data/curl-7.72.0/lib/mprintf.c:586:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char work[BUFFSIZE];
data/curl-7.72.0/lib/mprintf.c:890:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char formatbuf[32]="%";
data/curl-7.72.0/lib/mqtt.c:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char client_id[MQTT_CLIENTID_LEN + 1] = "curl";
data/curl-7.72.0/lib/mqtt.c:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char packet[32] = {
data/curl-7.72.0/lib/mqtt.c:161:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&packet[client_id_offset], client_id, MQTT_CLIENTID_LEN);
data/curl-7.72.0/lib/mqtt.c:179:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char readbuf[MQTT_CONNACK_LEN];
data/curl-7.72.0/lib/mqtt.c:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char encodedsize[4];
data/curl-7.72.0/lib/mqtt.c:269:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&packet[1], encodedsize, n);
data/curl-7.72.0/lib/mqtt.c:274:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&packet[5 + n], topic, topiclen);
data/curl-7.72.0/lib/mqtt.c:292:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char readbuf[MQTT_SUBACK_LEN];
data/curl-7.72.0/lib/mqtt.c:330:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char encodedbytes[4];
data/curl-7.72.0/lib/mqtt.c:348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pkt[i], encodedbytes, encodelen);
data/curl-7.72.0/lib/mqtt.c:352:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pkt[i], topic, topiclen);
data/curl-7.72.0/lib/mqtt.c:354:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pkt[i], payload, payloadlen);
data/curl-7.72.0/lib/multi.c:664:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/curl-7.72.0/lib/multi.c:1232:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[64];
data/curl-7.72.0/lib/multi.c:1316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/curl-7.72.0/lib/multi.c:2702:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data->sockets, socks, num*sizeof(curl_socket_t));
data/curl-7.72.0/lib/multi.c:2703:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data->actions, actions, num*sizeof(int));
data/curl-7.72.0/lib/multi.c:2793:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tv, &node->time, sizeof(*tv));
data/curl-7.72.0/lib/multi.c:3159:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&node->time, stamp, sizeof(*stamp));
data/curl-7.72.0/lib/netrc.c:78:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file = fopen(netrcfile, FOPEN_READTEXT);
data/curl-7.72.0/lib/netrc.c:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char netrcbuffer[4096];
data/curl-7.72.0/lib/netrc.c:229:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char pwbuf[1024];
data/curl-7.72.0/lib/non-ascii.c:67:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(convbuf, indata, insize);
data/curl-7.72.0/lib/openldap.c:211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hosturl[1024];
data/curl-7.72.0/lib/openldap.c:216:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(hosturl, "ldap");
data/curl-7.72.0/lib/parsedate.c:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[5];
data/curl-7.72.0/lib/parsedate.c:356:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[32]="";
data/curl-7.72.0/lib/parsedate.h:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char * const Curl_wkday[7];
data/curl-7.72.0/lib/parsedate.h:26:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char * const Curl_month[12];
data/curl-7.72.0/lib/pingpong.c:310:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ptr, pp->cache, pp->cache_size);
data/curl-7.72.0/lib/pingpong.c:444:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pp->cache, pp->linestart_resp, pp->cache_size);
data/curl-7.72.0/lib/pop3.c:416:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[MD5_DIGEST_LEN];
data/curl-7.72.0/lib/pop3.c:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char secret[2 * MD5_DIGEST_LEN + 1];
data/curl-7.72.0/lib/pop3.c:638:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pop3c->apoptimestamp, line + i, timestamplen);
data/curl-7.72.0/lib/progress.c:42:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(r, "--:--:--");
data/curl-7.72.0/lib/progress.c:468:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char max5[6][10];
data/curl-7.72.0/lib/progress.c:474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char time_left[10];
data/curl-7.72.0/lib/progress.c:475:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char time_total[10];
data/curl-7.72.0/lib/progress.c:476:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char time_spent[10];
data/curl-7.72.0/lib/rand.c:54:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((char *)&seed, force_entropy, min);
data/curl-7.72.0/lib/rand.c:77:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(RANDOM_FILE, O_RDONLY);
data/curl-7.72.0/lib/rand.c:155:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[128];
data/curl-7.72.0/lib/rtsp.c:612:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rtspc->rtp_buf + rtspc->rtp_bufsize, k->str, *nread);
data/curl-7.72.0/lib/rtsp.c:684:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(scratch, rtp, rtp_dataleft);
data/curl-7.72.0/lib/rtsp.c:812:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data->set.str[STRING_RTSP_SESSION_ID], start, end - start);
data/curl-7.72.0/lib/security.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char print_buffer[50];
data/curl-7.72.0/lib/security.c:222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data, (char *)buf->data + buf->index, len);
data/curl-7.72.0/lib/sendf.c:201:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, psnd->buffer + psnd->recv_processed, copysize);
data/curl-7.72.0/lib/sendf.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char print_buffer[2048 + 1];
data/curl-7.72.0/lib/sendf.c:268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char error[CURL_ERROR_SIZE + 2];
data/curl-7.72.0/lib/sendf.c:415:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/sendf.c:481:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/sendf.c:736:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char s_infotype[CURLINFO_END][3] = {
data/curl-7.72.0/lib/setopt.c:101:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(nblob->data, blob->data, blob->len);
data/curl-7.72.0/lib/setopt.c:567:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, argptr, (size_t)data->set.postfieldsize);
data/curl-7.72.0/lib/sha256.c:120:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(digest, gcry_md_read(*ctx, 0), SHA256_DIGEST_LENGTH);
data/curl-7.72.0/lib/sha256.c:291:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[64];
data/curl-7.72.0/lib/sha256.c:407:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(md->buf + md->curlen, in, n);
data/curl-7.72.0/lib/smb.c:351:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)h->magic, "\xffSMB", 4);
data/curl-7.72.0/lib/smb.c:416:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(conn->data->state.ulbuf + sizeof(struct smb_header),
data/curl-7.72.0/lib/smb.c:434:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char lm_hash[21];
data/curl-7.72.0/lib/smb.c:435:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char lm[24];
data/curl-7.72.0/lib/smb.c:436:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char nt_hash[21];
data/curl-7.72.0/lib/smb.c:437:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char nt[24];
data/curl-7.72.0/lib/smb.c:464:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, lm, sizeof(lm));
data/curl-7.72.0/lib/smb.c:466:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, nt, sizeof(nt));
data/curl-7.72.0/lib/smb.h:39:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char challenge[8];
data/curl-7.72.0/lib/smb.h:100:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char magic[4];
data/curl-7.72.0/lib/smb.h:106:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char signature[8];
data/curl-7.72.0/lib/smb.h:130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bytes[1];
data/curl-7.72.0/lib/smb.h:150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bytes[1024];
data/curl-7.72.0/lib/smb.h:159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bytes[1024];
data/curl-7.72.0/lib/smb.h:178:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bytes[1024];
data/curl-7.72.0/lib/smtp.c:215:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpline[6];
data/curl-7.72.0/lib/smtp.c:219:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmpline, line, (len == 5 ? 5 : 3));
data/curl-7.72.0/lib/smtp.c:1681:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char localhost[HOSTNAME_MAX + 1];
data/curl-7.72.0/lib/smtp.c:1835:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&scratch[si], &SMTP_EOB[eob_sent], smtp->eob - eob_sent);
data/curl-7.72.0/lib/smtp.c:1853:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&scratch[si], &SMTP_EOB_REPL[eob_sent],
data/curl-7.72.0/lib/smtp.c:1865:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&scratch[si], &SMTP_EOB[eob_sent], smtp->eob - eob_sent);
data/curl-7.72.0/lib/sockaddr.h:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cbuf[256];   /* this should be big enough to fit a lot */
data/curl-7.72.0/lib/socketpair.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[2][12];
data/curl-7.72.0/lib/socks.c:275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/curl-7.72.0/lib/socks.c:323:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(socksreq + 8, proxy_user, plen + 1);
data/curl-7.72.0/lib/socks.c:506:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dest[256] = "unknown";  /* printable hostname:port */
data/curl-7.72.0/lib/socks.c:688:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(socksreq + len, proxy_user, proxy_user_len);
data/curl-7.72.0/lib/socks.c:698:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(socksreq + len, proxy_password, proxy_password_len);
data/curl-7.72.0/lib/socks.c:853:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&socksreq[len], hostname, hostname_len); /* address w/o NULL */
data/curl-7.72.0/lib/socks_gssapi.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/curl-7.72.0/lib/socks_gssapi.c:77:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(buf + len, ".\n");
data/curl-7.72.0/lib/socks_gssapi.c:123:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char socksreq[4]; /* room for GSS-API exchange header only */
data/curl-7.72.0/lib/socks_gssapi.c:142:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(service.value, serviceptr, service.length);
data/curl-7.72.0/lib/socks_gssapi.c:202:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(socksreq + 2, &us_length, sizeof(short));
data/curl-7.72.0/lib/socks_gssapi.c:268:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&us_length, socksreq + 2, sizeof(short));
data/curl-7.72.0/lib/socks_gssapi.c:327:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(user, gss_send_token.value, gss_send_token.length);
data/curl-7.72.0/lib/socks_gssapi.c:383:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq + 2, &us_length, sizeof(short));
data/curl-7.72.0/lib/socks_gssapi.c:392:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(gss_send_token.value, &gss_enc, 1);
data/curl-7.72.0/lib/socks_gssapi.c:408:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq + 2, &us_length, sizeof(short));
data/curl-7.72.0/lib/socks_gssapi.c:420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq, &gss_enc, 1);
data/curl-7.72.0/lib/socks_gssapi.c:462:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&us_length, socksreq + 2, sizeof(short));
data/curl-7.72.0/lib/socks_gssapi.c:503:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq, gss_w_token.value, gss_w_token.length);
data/curl-7.72.0/lib/socks_gssapi.c:515:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq, gss_recv_token.value, gss_recv_token.length);
data/curl-7.72.0/lib/socks_sspi.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/socks_sspi.c:87:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char socksreq[4]; /* room for GSS-API exchange header only */
data/curl-7.72.0/lib/socks_sspi.c:205:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(socksreq + 2, &us_length, sizeof(short));
data/curl-7.72.0/lib/socks_sspi.c:289:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&us_length, socksreq + 2, sizeof(short));
data/curl-7.72.0/lib/socks_sspi.c:383:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq + 2, &us_length, sizeof(short));
data/curl-7.72.0/lib/socks_sspi.c:412:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sspi_w_token[1].pvBuffer, &gss_enc, 1);
data/curl-7.72.0/lib/socks_sspi.c:446:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sspi_send_token.pvBuffer, sspi_w_token[0].pvBuffer,
data/curl-7.72.0/lib/socks_sspi.c:448:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((PUCHAR) sspi_send_token.pvBuffer +(int)sspi_w_token[0].cbBuffer,
data/curl-7.72.0/lib/socks_sspi.c:450:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((PUCHAR) sspi_send_token.pvBuffer
data/curl-7.72.0/lib/socks_sspi.c:466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq + 2, &us_length, sizeof(short));
data/curl-7.72.0/lib/socks_sspi.c:479:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq, &gss_enc, 1);
data/curl-7.72.0/lib/socks_sspi.c:523:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&us_length, socksreq + 2, sizeof(short));
data/curl-7.72.0/lib/socks_sspi.c:533:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  result = Curl_blockread_all(conn, sock, (char *)sspi_w_token[0].pvBuffer,
data/curl-7.72.0/lib/socks_sspi.c:577:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq, sspi_w_token[1].pvBuffer, sspi_w_token[1].cbBuffer);
data/curl-7.72.0/lib/socks_sspi.c:589:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(socksreq, sspi_w_token[0].pvBuffer, sspi_w_token[0].cbBuffer);
data/curl-7.72.0/lib/strdup.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newstr, str, len);
data/curl-7.72.0/lib/strdup.c:69:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, src, length);
data/curl-7.72.0/lib/strerror.c:663:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t wbuf[256];
data/curl-7.72.0/lib/strerror.c:767:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/curl-7.72.0/lib/strerror.c:780:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/curl-7.72.0/lib/strerror.c:977:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char txtbuf[80];
data/curl-7.72.0/lib/strerror.c:978:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msgbuf[256];
data/curl-7.72.0/lib/telnet.c:161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char subopt_ttype[32];             /* Set with suboption TTYPE */
data/curl-7.72.0/lib/telnet.c:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char subopt_xdisploc[128];         /* Set with suboption XDISPLOC */
data/curl-7.72.0/lib/telnet.c:168:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char subbuffer[SUBBUFSIZE];
data/curl-7.72.0/lib/telnet.c:348:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[3];
data/curl-7.72.0/lib/telnet.c:822:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char option_keyword[128] = "";
data/curl-7.72.0/lib/telnet.c:823:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char option_arg[256] = "";
data/curl-7.72.0/lib/telnet.c:890:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        binary_option = atoi(option_arg);
data/curl-7.72.0/lib/telnet.c:925:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char temp[2048];
data/curl-7.72.0/lib/telnet.c:929:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char varname[128] = "";
data/curl-7.72.0/lib/telnet.c:930:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char varval[128] = "";
data/curl-7.72.0/lib/tftp.c:507:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[64];
data/curl-7.72.0/lib/tftp.c:556:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/tftp.c:608:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/tftp.c:732:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/tftp.c:1057:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/tftp.c:1136:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&state->remote_addr, &fromaddr, fromlen);
data/curl-7.72.0/lib/tftp.c:1274:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/transfer.c:136:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer,
data/curl-7.72.0/lib/transfer.c:318:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hexbuffer[11] = "";
data/curl-7.72.0/lib/transfer.c:327:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data->req.upload_fromhere, hexbuffer, hexlen);
data/curl-7.72.0/lib/transfer.c:340:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data->req.upload_fromhere + nread,
data/curl-7.72.0/lib/url.c:1540:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/url.c:2179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char proxy_env[128];
data/curl-7.72.0/lib/url.c:2189:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(envp, "_proxy");
data/curl-7.72.0/lib/url.c:2671:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ubuf, login, ulen);
data/curl-7.72.0/lib/url.c:2679:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pbuf, psep + 1, plen);
data/curl-7.72.0/lib/url.c:2687:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(obuf, osep + 1, olen);
data/curl-7.72.0/lib/url.c:2711:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char portbuf[16];
data/curl-7.72.0/lib/urlapi.c:407:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newest, url_clone, urllen);
data/curl-7.72.0/lib/urlapi.c:541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char portbuf[7];
data/curl-7.72.0/lib/urlapi.c:606:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dest[16]; /* fits a binary IPv6 address */
data/curl-7.72.0/lib/urlapi.c:623:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zoneid[16];
data/curl-7.72.0/lib/urlapi.c:674:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char schemebuf[MAX_SCHEME_LEN + 1];
data/curl-7.72.0/lib/urlapi.c:818:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(hostname, hostp, len);
data/curl-7.72.0/lib/urlapi.c:827:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(path, p, len);
data/curl-7.72.0/lib/urlapi.c:1014:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char portbuf[7];
data/curl-7.72.0/lib/urlapi.c:1140:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(allochost, u->host, hostlen - 1);
data/curl-7.72.0/lib/urldata.h:373:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char nonce[8];
data/curl-7.72.0/lib/urldata.h:574:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dohbuffer[512];
data/curl-7.72.0/lib/urldata.h:846:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char socksreq[SOCKS_REQUEST_BUFSIZE];
data/curl-7.72.0/lib/urldata.h:898:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip_addr_str[MAX_IPADR_LEN];
data/curl-7.72.0/lib/urldata.h:936:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char primary_ip[MAX_IPADR_LEN];
data/curl-7.72.0/lib/urldata.h:943:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char local_ip[MAX_IPADR_LEN];
data/curl-7.72.0/lib/urldata.h:1127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char conn_primary_ip[MAX_IPADR_LEN];
data/curl-7.72.0/lib/urldata.h:1129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char conn_local_ip[MAX_IPADR_LEN];
data/curl-7.72.0/lib/urldata.h:1722:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *str[STRING_LAST]; /* array of strings, pointing to allocated memory */
data/curl-7.72.0/lib/vauth/cleartext.c:95:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(plainauth, authzid, zlen);
data/curl-7.72.0/lib/vauth/cleartext.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(plainauth + zlen + 1, authcid, clen);
data/curl-7.72.0/lib/vauth/cleartext.c:99:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(plainauth + zlen + clen + 2, passwd, plen);
data/curl-7.72.0/lib/vauth/cram.c:100:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[MD5_DIGEST_LEN];
data/curl-7.72.0/lib/vauth/digest.c:363:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[MD5_DIGEST_LEN];
data/curl-7.72.0/lib/vauth/digest.c:364:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char HA1_hex[2 * MD5_DIGEST_LEN + 1];
data/curl-7.72.0/lib/vauth/digest.c:365:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char HA2_hex[2 * MD5_DIGEST_LEN + 1];
data/curl-7.72.0/lib/vauth/digest.c:366:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resp_hash_hex[2 * MD5_DIGEST_LEN + 1];
data/curl-7.72.0/lib/vauth/digest.c:367:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nonce[64];
data/curl-7.72.0/lib/vauth/digest.c:368:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char realm[128];
data/curl-7.72.0/lib/vauth/digest.c:369:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char algorithm[64];
data/curl-7.72.0/lib/vauth/digest.c:370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qop_options[64];
data/curl-7.72.0/lib/vauth/digest.c:372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cnonce[33];
data/curl-7.72.0/lib/vauth/digest.c:539:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[DIGEST_MAX_VALUE_LENGTH];
data/curl-7.72.0/lib/vauth/digest.c:540:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char content[DIGEST_MAX_CONTENT_LENGTH];
data/curl-7.72.0/lib/vauth/digest.c:695:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char hashbuf[32]; /* 32 bytes/256 bits */
data/curl-7.72.0/lib/vauth/digest.c:696:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char request_digest[65];
data/curl-7.72.0/lib/vauth/digest.c:697:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ha1[65];    /* 64 digits and 1 zero byte */
data/curl-7.72.0/lib/vauth/digest.c:698:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ha2[65];    /* 64 digits and 1 zero byte */
data/curl-7.72.0/lib/vauth/digest.c:699:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char userh[65];
data/curl-7.72.0/lib/vauth/digest.c:711:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cnoncebuf[33];
data/curl-7.72.0/lib/vauth/digest.c:790:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hashed[65];
data/curl-7.72.0/lib/vauth/digest_sspi.c:280:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char value[DIGEST_MAX_VALUE_LENGTH];
data/curl-7.72.0/lib/vauth/digest_sspi.c:281:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char content[DIGEST_MAX_CONTENT_LENGTH];
data/curl-7.72.0/lib/vauth/digest_sspi.c:355:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char value[DIGEST_MAX_VALUE_LENGTH];
data/curl-7.72.0/lib/vauth/digest_sspi.c:356:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char content[DIGEST_MAX_CONTENT_LENGTH];
data/curl-7.72.0/lib/vauth/digest_sspi.c:641:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(resp, output_token, output_token_len);
data/curl-7.72.0/lib/vauth/krb5_gssapi.c:298:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&indata, output_token.value, 4);
data/curl-7.72.0/lib/vauth/krb5_gssapi.c:336:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(message, &outdata, sizeof(outdata));
data/curl-7.72.0/lib/vauth/krb5_gssapi.c:337:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(message + sizeof(outdata), username_token.value,
data/curl-7.72.0/lib/vauth/krb5_sspi.c:237:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(krb5->context, &context, sizeof(context));
data/curl-7.72.0/lib/vauth/krb5_sspi.c:372:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&indata, input_buf[1].pvBuffer, 4);
data/curl-7.72.0/lib/vauth/krb5_sspi.c:422:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(message, &outdata, sizeof(outdata));
data/curl-7.72.0/lib/vauth/krb5_sspi.c:476:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(appdata, wrap_buf[0].pvBuffer, wrap_buf[0].cbBuffer);
data/curl-7.72.0/lib/vauth/krb5_sspi.c:478:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(appdata + offset, wrap_buf[1].pvBuffer, wrap_buf[1].cbBuffer);
data/curl-7.72.0/lib/vauth/krb5_sspi.c:480:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(appdata + offset, wrap_buf[2].pvBuffer, wrap_buf[2].cbBuffer);
data/curl-7.72.0/lib/vauth/ntlm.c:199:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ntlm->target_info, &buffer[target_info_offset], target_info_len);
data/curl-7.72.0/lib/vauth/ntlm.c:314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ntlm->nonce, &type2[24], 8);
data/curl-7.72.0/lib/vauth/ntlm.c:394:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ntlmbuf[NTLM_BUFSIZE];
data/curl-7.72.0/lib/vauth/ntlm.c:522:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ntlmbuf[NTLM_BUFSIZE];
data/curl-7.72.0/lib/vauth/ntlm.c:524:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char lmresp[24]; /* fixed-size */
data/curl-7.72.0/lib/vauth/ntlm.c:528:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ntresp[24]; /* fixed-size */
data/curl-7.72.0/lib/vauth/ntlm.c:533:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[HOSTNAME_MAX + 1] = "";
data/curl-7.72.0/lib/vauth/ntlm.c:569:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ntbuffer[0x18];
data/curl-7.72.0/lib/vauth/ntlm.c:570:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char entropy[8];
data/curl-7.72.0/lib/vauth/ntlm.c:571:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ntlmv2hash[0x18];
data/curl-7.72.0/lib/vauth/ntlm.c:609:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ntbuffer[0x18];
data/curl-7.72.0/lib/vauth/ntlm.c:610:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[0x18];
data/curl-7.72.0/lib/vauth/ntlm.c:611:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md5sum[CURL_MD5_DIGEST_LENGTH];
data/curl-7.72.0/lib/vauth/ntlm.c:612:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char entropy[8];
data/curl-7.72.0/lib/vauth/ntlm.c:620:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(lmresp, entropy, 8);
data/curl-7.72.0/lib/vauth/ntlm.c:626:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, &ntlm->nonce[0], 8);
data/curl-7.72.0/lib/vauth/ntlm.c:627:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp + 8, entropy, 8);
data/curl-7.72.0/lib/vauth/ntlm.c:649:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ntbuffer[0x18];
data/curl-7.72.0/lib/vauth/ntlm.c:651:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char lmbuffer[0x18];
data/curl-7.72.0/lib/vauth/ntlm.c:777:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ntlmbuf[size], lmresp, 0x18);
data/curl-7.72.0/lib/vauth/ntlm.c:793:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&ntlmbuf[size], ptr_ntresp, ntresplen);
data/curl-7.72.0/lib/vauth/ntlm.c:823:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ntlmbuf[size], domain, domlen);
data/curl-7.72.0/lib/vauth/ntlm.c:831:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ntlmbuf[size], user, userlen);
data/curl-7.72.0/lib/vauth/ntlm.c:839:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ntlmbuf[size], host, hostlen);
data/curl-7.72.0/lib/vauth/spnego_sspi.c:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vauth/spnego_sspi.c:273:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/version.c:111:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char out[300];
data/curl-7.72.0/lib/version.c:114:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *src[VERSION_PARTS];
data/curl-7.72.0/lib/version.c:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ssl_version[200];
data/curl-7.72.0/lib/version.c:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z_version[40];
data/curl-7.72.0/lib/version.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char br_version[40] = "brotli/";
data/curl-7.72.0/lib/version.c:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zst_version[40] = "zstd/";
data/curl-7.72.0/lib/version.c:128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cares_version[40];
data/curl-7.72.0/lib/version.c:131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char idn_version[40];
data/curl-7.72.0/lib/version.c:134:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char psl_version[40];
data/curl-7.72.0/lib/version.c:137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char iconv_version[40]="iconv";
data/curl-7.72.0/lib/version.c:140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ssh_version[40];
data/curl-7.72.0/lib/version.c:143:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char h2_version[40];
data/curl-7.72.0/lib/version.c:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char h3_version[40];
data/curl-7.72.0/lib/version.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rtmp_version[40];
data/curl-7.72.0/lib/version.c:221:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char suff[2];
data/curl-7.72.0/lib/version.c:250:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(outp, src[j], n);
data/curl-7.72.0/lib/version.c:458:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ssh_buffer[80];
data/curl-7.72.0/lib/version.c:462:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ssl_buffer[200];
data/curl-7.72.0/lib/version.c:464:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ssl_buffer[80];
data/curl-7.72.0/lib/version.c:468:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char brotli_buffer[80];
data/curl-7.72.0/lib/version.c:471:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char zstd_buffer[80];
data/curl-7.72.0/lib/version.c:541:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char quicbuffer[80];
data/curl-7.72.0/lib/vquic/ngtcp2.c:236:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&crypto_data->buf[crypto_data->len], data, len);
data/curl-7.72.0/lib/vquic/ngtcp2.c:315:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char error_buffer[256];
data/curl-7.72.0/lib/vquic/ngtcp2.c:782:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipbuf[40];
data/curl-7.72.0/lib/vquic/ngtcp2.c:792:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vquic/ngtcp2.c:993:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(stream->mem, buf, len);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[14]; /* status line is always 13 characters long */
data/curl-7.72.0/lib/vquic/ngtcp2.c:1239:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(stream->mem, Curl_dyn_ptr(&stream->overflow), ncopy);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1361:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&out->buf[out->windex], stream->upload_mem, nread);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1461:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[0].namelen = strlen((char *)nva[0].name);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1479:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[1].namelen = strlen((char *)nva[1].name);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1485:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[2].namelen = strlen((char *)nva[2].name);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1490:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[2].valuelen = strlen((char *)nva[2].value);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1520:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      nva[i].namelen = strlen((char *)nva[i].name);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1525:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      Curl_strntolower((char *)hdbuf, hdbuf, nva[i].namelen);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1535:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    switch(inspect_header((const char *)nva[i].name, nva[i].namelen, hdbuf,
data/curl-7.72.0/lib/vquic/ngtcp2.c:1873:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&remote_addr, ps.path.remote.addr, ps.path.remote.addrlen);
data/curl-7.72.0/lib/vquic/quiche.c:246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vquic/quiche.c:251:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(conn->ip_addr_str, conn->primary_ip, MAX_IPADR_LEN);
data/curl-7.72.0/lib/vquic/quiche.c:648:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[0].name_len = strlen((char *)nva[0].name);
data/curl-7.72.0/lib/vquic/quiche.c:665:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[1].name_len = strlen((char *)nva[1].name);
data/curl-7.72.0/lib/vquic/quiche.c:670:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[2].name_len = strlen((char *)nva[2].name);
data/curl-7.72.0/lib/vquic/quiche.c:675:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  nva[2].value_len = strlen((char *)nva[2].value);
data/curl-7.72.0/lib/vquic/quiche.c:704:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      nva[i].name_len = strlen((char *)nva[i].name);
data/curl-7.72.0/lib/vquic/quiche.c:709:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      Curl_strntolower((char *)hdbuf, hdbuf, nva[i].name_len);
data/curl-7.72.0/lib/vquic/quiche.c:718:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    switch(inspect_header((const char *)nva[i].name, nva[i].namelen, hdbuf,
data/curl-7.72.0/lib/vquic/vquic.c:65:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hex[3];
data/curl-7.72.0/lib/vquic/vquic.c:73:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      int qlogfd = open(Curl_dyn_ptr(&fname), QLOGMODE,
data/curl-7.72.0/lib/vssh/libssh.c:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char md5buffer[33];
data/curl-7.72.0/lib/vssh/libssh.c:1449:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(sshc->readdir_line, sshc->readdir_longentry,
data/curl-7.72.0/lib/vssh/libssh2.c:613:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char md5buffer[33];
data/curl-7.72.0/lib/vssh/libssh2.c:703:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            port = atoi(kh_name_end + 2);
data/curl-7.72.0/lib/vssh/libssh2.c:1227:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tempHome[PATH_MAX];
data/curl-7.72.0/lib/vssh/wolfssh.c:508:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(sshc->homedir, name->fName, name->fSz);
data/curl-7.72.0/lib/vtls/bearssl.c:49:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[BR_SSL_BUFSIZE_BIDI];
data/curl-7.72.0/lib/vtls/bearssl.c:52:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *protocols[2];
data/curl-7.72.0/lib/vtls/bearssl.c:67:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dn[1024];
data/curl-7.72.0/lib/vtls/bearssl.c:81:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ca->dn + ca->dn_len, buf, len);
data/curl-7.72.0/lib/vtls/bearssl.c:104:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[BUFSIZ], *p;
data/curl-7.72.0/lib/vtls/bearssl.c:108:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "rb");
data/curl-7.72.0/lib/vtls/bearssl.c:194:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ta->dn.data, ca.dn, ca.dn_len);
data/curl-7.72.0/lib/vtls/bearssl.c:199:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(ta->pkey.key.rsa.n, pkey->key.rsa.n, pkey->key.rsa.nlen);
data/curl-7.72.0/lib/vtls/bearssl.c:201:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(ta->pkey.key.rsa.e, pkey->key.rsa.e, pkey->key.rsa.elen);
data/curl-7.72.0/lib/vtls/bearssl.c:205:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(ta->pkey.key.ec.q, pkey->key.ec.q, pkey->key.ec.qlen);
data/curl-7.72.0/lib/vtls/bearssl.c:614:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(app, buf, applen);
data/curl-7.72.0/lib/vtls/bearssl.c:637:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, app, applen);
data/curl-7.72.0/lib/vtls/gskit.c:527:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[CURL_MAX_WRITE_SIZE];
data/curl-7.72.0/lib/vtls/gskit.c:1171:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[120];
data/curl-7.72.0/lib/vtls/gtls.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[96];
data/curl-7.72.0/lib/vtls/gtls.c:176:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(file, "rb");
data/curl-7.72.0/lib/vtls/gtls.c:826:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char certname[65] = ""; /* limited to 64 chars by ASN.1 */
data/curl-7.72.0/lib/vtls/gtls.c:899:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *beg = (const char *) chainp[i].data;
data/curl-7.72.0/lib/vtls/gtls.c:1097:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char addrbuf[sizeof(struct use_addr)];
data/curl-7.72.0/lib/vtls/gtls.c:1108:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char certaddr[sizeof(struct use_addr)];
data/curl-7.72.0/lib/vtls/gtls.c:1491:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[120];
data/curl-7.72.0/lib/vtls/gtls.c:1643:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(md5sum, gcry_md_read(MD5pw, 0), md5len);
data/curl-7.72.0/lib/vtls/gtls.c:1663:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(sha256sum, gcry_md_read(SHA256pw, 0), sha256len);
data/curl-7.72.0/lib/vtls/keylog.c:53:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      keylog_file_fp = fopen(keylog_file_name, FOPEN_APPENDTEXT);
data/curl-7.72.0/lib/vtls/keylog.c:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/curl-7.72.0/lib/vtls/keylog.c:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, line, linelen);
data/curl-7.72.0/lib/vtls/keylog.c:115:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
Curl_tls_keylog_write(const char *label,
data/curl-7.72.0/lib/vtls/keylog.c:116:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      const unsigned char client_random[CLIENT_RANDOM_SIZE],
data/curl-7.72.0/lib/vtls/keylog.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[KEYLOG_LABEL_MAXLEN + 1 + 2 * CLIENT_RANDOM_SIZE + 1 +
data/curl-7.72.0/lib/vtls/keylog.c:134:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(line, label, pos);
data/curl-7.72.0/lib/vtls/keylog.h:46:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool Curl_tls_keylog_write(const char *label,
data/curl-7.72.0/lib/vtls/keylog.h:47:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           const unsigned char client_random[32],
data/curl-7.72.0/lib/vtls/mbedtls.c:75:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *protocols[3];
data/curl-7.72.0/lib/vtls/mbedtls.c:258:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errorbuf[128];
data/curl-7.72.0/lib/vtls/mbedtls.c:569:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorbuf[128];
data/curl-7.72.0/lib/vtls/mbedtls.c:629:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pubkey[PUB_DER_MAX_BYTES];
data/curl-7.72.0/lib/vtls/mbedtls.c:851:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errorbuf[128];
data/curl-7.72.0/lib/vtls/mesalink.c:311:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char error_buffer[MESALINK_MAX_ERROR_SZ];
data/curl-7.72.0/lib/vtls/mesalink.c:387:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[MESALINK_MAX_ERROR_SZ];
data/curl-7.72.0/lib/vtls/mesalink.c:432:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[MESALINK_MAX_ERROR_SZ];
data/curl-7.72.0/lib/vtls/nss.c:818:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[50];
data/curl-7.72.0/lib/vtls/nss.c:929:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timeString[256];
data/curl-7.72.0/lib/vtls/nss.c:2097:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char protocols[128];
data/curl-7.72.0/lib/vtls/nss.c:2106:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&protocols[cur], NGHTTP2_PROTO_VERSION_ID,
data/curl-7.72.0/lib/vtls/nss.c:2112:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&protocols[cur], ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH);
data/curl-7.72.0/lib/vtls/openssl.c:252:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char client_random[SSL3_RANDOM_SIZE];
data/curl-7.72.0/lib/vtls/openssl.c:253:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH];
data/curl-7.72.0/lib/vtls/openssl.c:270:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(master_key, session->master_key, session->master_key_length);
data/curl-7.72.0/lib/vtls/openssl.c:271:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(client_random, ssl->s3->client_random, SSL3_RANDOM_SIZE);
data/curl-7.72.0/lib/vtls/openssl.c:379:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, global_passwd, klen + 1);
data/curl-7.72.0/lib/vtls/openssl.c:399:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[256];
data/curl-7.72.0/lib/vtls/openssl.c:450:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char randb[64];
data/curl-7.72.0/lib/vtls/openssl.c:463:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&randb[i * sizeof(struct curltime)], &tv,
data/curl-7.72.0/lib/vtls/openssl.c:695:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[256];
data/curl-7.72.0/lib/vtls/openssl.c:1086:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, biomem->data, size);
data/curl-7.72.0/lib/vtls/openssl.c:1263:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/curl-7.72.0/lib/vtls/openssl.c:1359:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256]; /* We will use this for the OpenSSL error buffer, so it has
data/curl-7.72.0/lib/vtls/openssl.c:1712:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(peer_CN, ASN1_STRING_get0_data(tmp), j);
data/curl-7.72.0/lib/vtls/openssl.c:2013:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char unknown[32];
data/curl-7.72.0/lib/vtls/openssl.c:2070:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ssl_buf[1024];
data/curl-7.72.0/lib/vtls/openssl.c:2091:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      msg_type = (((char *)buf)[0] << 8) + ((char *)buf)[1];
data/curl-7.72.0/lib/vtls/openssl.c:2091:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      msg_type = (((char *)buf)[0] << 8) + ((char *)buf)[1];
data/curl-7.72.0/lib/vtls/openssl.c:2492:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[256];
data/curl-7.72.0/lib/vtls/openssl.c:2706:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char protocols[128];
data/curl-7.72.0/lib/vtls/openssl.c:2716:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&protocols[cur], NGHTTP2_PROTO_VERSION_ID,
data/curl-7.72.0/lib/vtls/openssl.c:2724:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&protocols[cur], ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH);
data/curl-7.72.0/lib/vtls/openssl.c:2853:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char cert_name[256];
data/curl-7.72.0/lib/vtls/openssl.c:2863:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          strcpy(cert_name, "Unknown");
data/curl-7.72.0/lib/vtls/openssl.c:3250:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char error_buffer[256]="";
data/curl-7.72.0/lib/vtls/openssl.c:3281:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          strcpy(error_buffer, "SSL certificate verification failed");
data/curl-7.72.0/lib/vtls/openssl.c:3303:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char extramsg[80]="";
data/curl-7.72.0/lib/vtls/openssl.c:3398:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char namebuf[32];
data/curl-7.72.0/lib/vtls/openssl.c:3434:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char namebuf[128];
data/curl-7.72.0/lib/vtls/openssl.c:3752:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[256]="";
data/curl-7.72.0/lib/vtls/openssl.c:3753:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[2048];
data/curl-7.72.0/lib/vtls/openssl.c:4115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[256];
data/curl-7.72.0/lib/vtls/openssl.c:4166:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ver[120];
data/curl-7.72.0/lib/vtls/openssl.c:4193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[256];
data/curl-7.72.0/lib/vtls/openssl.c:4306:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sub[3];
data/curl-7.72.0/lib/vtls/schannel.c:206:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[LONGEST_ALG_ID] = { 0 };
data/curl-7.72.0/lib/vtls/schannel.c:416:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char alpn_buffer[128];
data/curl-7.72.0/lib/vtls/schannel.c:616:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          fInCert = fopen(data->set.ssl.cert, "rb");
data/curl-7.72.0/lib/vtls/schannel.c:682:25:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            str_w_len = MultiByteToWideChar(CP_UTF8,
data/curl-7.72.0/lib/vtls/schannel.c:806:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel.c:860:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&alpn_buffer[cur], NGHTTP2_PROTO_ALPN, NGHTTP2_PROTO_ALPN_LEN);
data/curl-7.72.0/lib/vtls/schannel.c:867:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&alpn_buffer[cur], ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH);
data/curl-7.72.0/lib/vtls/schannel.c:923:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel.c:1104:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(inbuf[0].pvBuffer, BACKEND->encdata_buffer,
data/curl-7.72.0/lib/vtls/schannel.c:1171:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel.c:1643:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(outbuf[1].pvBuffer, buf, len);
data/curl-7.72.0/lib/vtls/schannel.c:1899:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(BACKEND->decdata_buffer + BACKEND->decdata_offset,
data/curl-7.72.0/lib/vtls/schannel.c:1984:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel.c:2035:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, BACKEND->decdata_buffer, size);
data/curl-7.72.0/lib/vtls/schannel.c:2147:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel.c:2292:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:162:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:225:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:254:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:554:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:580:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:608:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/schannel_verify.c:632:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[STRERROR_LEN];
data/curl-7.72.0/lib/vtls/sectransp.c:906:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  *major = atoi(os_version_major);
data/curl-7.72.0/lib/vtls/sectransp.c:907:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  *minor = atoi(os_version_minor);
data/curl-7.72.0/lib/vtls/sectransp.c:2060:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[512], *data;
data/curl-7.72.0/lib/vtls/sectransp.c:2062:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(file, 0);
data/curl-7.72.0/lib/vtls/sectransp.c:2093:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data + len, buf, n);
data/curl-7.72.0/lib/vtls/sectransp.c:2357:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(realpubkey, spkiHeader, spkiHeaderLength);
data/curl-7.72.0/lib/vtls/sectransp.c:2358:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(realpubkey + spkiHeaderLength, pubkey, pubkeylen);
data/curl-7.72.0/lib/vtls/sectransp.c:2993:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[120];
data/curl-7.72.0/lib/vtls/vtls.c:106:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d->data, src->data, src->len);
data/curl-7.72.0/lib/vtls/vtls.c:775:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&output[labellen + 1], value, valuelen);
data/curl-7.72.0/lib/vtls/vtls.c:927:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pinkeycopy, pinnedpubkey, pinkeylen);
data/curl-7.72.0/lib/vtls/vtls.c:960:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(pinnedpubkey, "rb");
data/curl-7.72.0/lib/vtls/vtls.c:1305:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char backends[200];
data/curl-7.72.0/lib/vtls/vtls.c:1321:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char vb[200];
data/curl-7.72.0/lib/vtls/wolfssl.c:119:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char client_random[SSL3_RANDOM_SIZE];
data/curl-7.72.0/lib/vtls/wolfssl.c:469:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char protocols[128];
data/curl-7.72.0/lib/vtls/wolfssl.c:513:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char error_buffer[WOLFSSL_MAX_ERROR_SZ];
data/curl-7.72.0/lib/vtls/wolfssl.c:597:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char error_buffer[WOLFSSL_MAX_ERROR_SZ];
data/curl-7.72.0/lib/vtls/wolfssl.c:808:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[WOLFSSL_MAX_ERROR_SZ];
data/curl-7.72.0/lib/vtls/wolfssl.c:856:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[WOLFSSL_MAX_ERROR_SZ];
data/curl-7.72.0/lib/x509asn1.c:302:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, from, outlength);
data/curl-7.72.0/packages/OS400/ccsidcurl.c:59:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
makeOS400IconvCode(char buf[ICONV_ID_SIZE], unsigned int ccsid)
data/curl-7.72.0/packages/OS400/ccsidcurl.c:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fromcode[ICONV_ID_SIZE];
data/curl-7.72.0/packages/OS400/ccsidcurl.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tocode[ICONV_ID_SIZE];
data/curl-7.72.0/packages/OS400/ccsidcurl.c:134:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(d, s, i);
data/curl-7.72.0/packages/OS400/ccsidcurl.c:479:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *) id, (char *) p, sizeof(*p));
data/curl-7.72.0/packages/OS400/ccsidcurl.c:485:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cp, (char *) p->protocols, i);
data/curl-7.72.0/packages/OS400/ccsidcurl.c:745:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          free((char *) forms[nargs].value);
data/curl-7.72.0/packages/OS400/os400sys.c:783:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf->value, t, i);
data/curl-7.72.0/packages/OS400/os400sys.c:803:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *) &in, (char *) in_name, sizeof(in));
data/curl-7.72.0/packages/OS400/os400sys.c:1246:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *) dstaddr, (char *) srcaddr, srclen);
data/curl-7.72.0/packages/OS400/os400sys.c:1283:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *) dstaddr, (char *) srcaddr, srclen);
data/curl-7.72.0/packages/vms/curl_crtl_init.c:201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char unix_shell_name[255];
data/curl-7.72.0/src/tool_cb_dbg.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timebuf[20];
data/curl-7.72.0/src/tool_cb_dbg.c:84:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      config->trace_stream = fopen(config->trace_dump, FOPEN_WRITETEXT);
data/curl-7.72.0/src/tool_cb_hdr.c:246:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(copy, ptr, len);
data/curl-7.72.0/src/tool_cb_hdr.c:316:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[512]; /* suitably large */
data/curl-7.72.0/src/tool_cb_prg.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/curl-7.72.0/src/tool_cb_prg.c:84:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buf[bar->bar], "-=O=-", 5);
data/curl-7.72.0/src/tool_cb_prg.c:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[MAX_BARLENGTH + 1];
data/curl-7.72.0/src/tool_cb_prg.c:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char format[40];
data/curl-7.72.0/src/tool_cb_wrt.c:61:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(outs->filename, O_CREAT | O_WRONLY | O_EXCL | O_BINARY,
data/curl-7.72.0/src/tool_cb_wrt.c:76:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(outs->filename, "wb");
data/curl-7.72.0/src/tool_cb_wrt.c:192:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    wc_len = MultiByteToWideChar(CP_UTF8, 0, buffer, in_len,  NULL, 0);
data/curl-7.72.0/src/tool_cb_wrt.c:198:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    wc_len = MultiByteToWideChar(CP_UTF8, 0, buffer, in_len, wc_buf, wc_len);
data/curl-7.72.0/src/tool_doswin.c:313:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dos_name[PATH_MAX];
data/curl-7.72.0/src/tool_doswin.c:409:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(d, "plus", 4);
data/curl-7.72.0/src/tool_doswin.c:465:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[PATH_MAX];
data/curl-7.72.0/src/tool_doswin.c:630:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR buf[PATH_MAX];
data/curl-7.72.0/src/tool_doswin.c:680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(mod.szExePath) * 2];
data/curl-7.72.0/src/tool_easysrc.c:181:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(o, FOPEN_WRITETEXT);
data/curl-7.72.0/src/tool_formparse.c:200:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, sip->data + curlx_sotouz(sip->curpos), nitems);
data/curl-7.72.0/src/tool_formparse.c:280:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(cp, m->data, size + 1);
data/curl-7.72.0/src/tool_formparse.c:422:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdrbuf[999]; /* Max. header length + 1. */
data/curl-7.72.0/src/tool_formparse.c:488:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type_major[128] = "";
data/curl-7.72.0/src/tool_formparse.c:489:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type_minor[128] = "";
data/curl-7.72.0/src/tool_formparse.c:573:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fp = fopen(hdrfile, FOPEN_READTEXT);
data/curl-7.72.0/src/tool_getparam.c:798:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          FILE *newfile = fopen(nextarg, FOPEN_WRITETEXT);
data/curl-7.72.0/src/tool_getparam.c:962:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char lrange[7];  /* 16bit base 10 is 5 digits, but we allow 6 so that
data/curl-7.72.0/src/tool_getparam.c:1364:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            file = fopen(p, "rb");
data/curl-7.72.0/src/tool_getparam.c:1430:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          file = fopen(nextarg, "rb");
data/curl-7.72.0/src/tool_getparam.c:1486:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(config->postfields, oldpost, (size_t)oldlen);
data/curl-7.72.0/src/tool_getparam.c:1489:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&config->postfields[oldlen + 1], postdata, size);
data/curl-7.72.0/src/tool_getparam.c:1785:38:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *file = use_stdin?stdin:fopen(&nextarg[1], FOPEN_READTEXT);
data/curl-7.72.0/src/tool_getparam.c:1997:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[32];
data/curl-7.72.0/src/tool_getparam.c:2134:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          file = fopen(nextarg, FOPEN_READTEXT);
data/curl-7.72.0/src/tool_getpass.c:232:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open("/dev/tty", O_RDONLY);
data/curl-7.72.0/src/tool_help.c:609:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *featp[ sizeof(feats) / sizeof(feats[0]) + 1];
data/curl-7.72.0/src/tool_help.c:615:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        featp[numfeat++] = (char *)feats[i].name;
data/curl-7.72.0/src/tool_main.c:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname[CURL_MT_LOGFNAME_BUFSIZE];
data/curl-7.72.0/src/tool_metalink.c:134:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx)
data/curl-7.72.0/src/tool_metalink.c:152:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void SHA1_Final(unsigned char digest[20], SHA_CTX *ctx)
data/curl-7.72.0/src/tool_metalink.c:170:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx)
data/curl-7.72.0/src/tool_metalink.c:190:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx)
data/curl-7.72.0/src/tool_metalink.c:192:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(digest, gcry_md_read(*ctx, 0), 16);
data/curl-7.72.0/src/tool_metalink.c:209:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void SHA1_Final(unsigned char digest[20], SHA_CTX *ctx)
data/curl-7.72.0/src/tool_metalink.c:211:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(digest, gcry_md_read(*ctx, 0), 20);
data/curl-7.72.0/src/tool_metalink.c:228:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx)
data/curl-7.72.0/src/tool_metalink.c:230:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(digest, gcry_md_read(*ctx, 0), 32);
data/curl-7.72.0/src/tool_metalink.c:282:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void MD5_Final(unsigned char digest[16], MD5_CTX *pctx)
data/curl-7.72.0/src/tool_metalink.c:299:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void SHA1_Final(unsigned char digest[20], SHA_CTX *pctx)
data/curl-7.72.0/src/tool_metalink.c:316:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void SHA256_Final(unsigned char digest[32], SHA256_CTX *pctx)
data/curl-7.72.0/src/tool_metalink.c:353:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx)
data/curl-7.72.0/src/tool_metalink.c:374:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void SHA1_Final(unsigned char digest[20], SHA_CTX *ctx)
data/curl-7.72.0/src/tool_metalink.c:395:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx)
data/curl-7.72.0/src/tool_metalink.c:506:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[3];
data/curl-7.72.0/src/tool_metalink.c:543:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(filename, flags);
data/curl-7.72.0/src/tool_metalink.c:565:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4096];
data/curl-7.72.0/src/tool_operate.c:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[8192];
data/curl-7.72.0/src/tool_operate.c:168:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file = fopen(name, "r"); /* VMS */
data/curl-7.72.0/src/tool_operate.c:297:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        per->infd = open(per->uploadfile, O_RDONLY | O_BINARY);
data/curl-7.72.0/src/tool_operate.c:300:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        per->infd = open(per->uploadfile, O_RDONLY | O_BINARY,
data/curl-7.72.0/src/tool_operate.c:306:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      per->infd = open(per->uploadfile, O_RDONLY | O_BINARY);
data/curl-7.72.0/src/tool_operate.c:878:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            newfile = fopen(config->headerfile, per->prev == NULL?"wb":"ab");
data/curl-7.72.0/src/tool_operate.c:915:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          FILE *file = fopen(config->etag_compare_file, FOPEN_READTEXT);
data/curl-7.72.0/src/tool_operate.c:957:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE *newfile = fopen(config->etag_save_file, "wb");
data/curl-7.72.0/src/tool_operate.c:1086:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE *file = fopen(outfile, "ab",
data/curl-7.72.0/src/tool_operate.c:1090:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE *file = fopen(per->outfile, "ab");
data/curl-7.72.0/src/tool_operate.c:1563:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE *fInCert = fopen(config->cert + 8, "rb");
data/curl-7.72.0/src/tool_operate.c:1606:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE *fInCert = fopen(config->key + 8, "rb");
data/curl-7.72.0/src/tool_operate.h:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errorbuffer[CURL_ERROR_SIZE];
data/curl-7.72.0/src/tool_operhlp.c:185:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[512]; /* suitably large */
data/curl-7.72.0/src/tool_paramhlp.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/curl-7.72.0/src/tool_paramhlp.c:482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char passwd[256] = "";
data/curl-7.72.0/src/tool_paramhlp.c:483:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prompt[256];
data/curl-7.72.0/src/tool_paramhlp.c:517:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&passptr[userlen + 1], passwd, passwdlen + 1);
data/curl-7.72.0/src/tool_parsecfg.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filebuffer[512];
data/curl-7.72.0/src/tool_parsecfg.c:63:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        return fopen(filebuffer, FOPEN_READTEXT);
data/curl-7.72.0/src/tool_parsecfg.c:110:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(pathalloc, FOPEN_READTEXT);
data/curl-7.72.0/src/tool_parsecfg.c:131:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      file = fopen(filename, FOPEN_READTEXT);
data/curl-7.72.0/src/tool_parsecfg.c:343:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4096];
data/curl-7.72.0/src/tool_progress.c:118:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(r, "--:--:--");
data/curl-7.72.0/src/tool_progress.c:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char time_left[10];
data/curl-7.72.0/src/tool_progress.c:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char time_total[10];
data/curl-7.72.0/src/tool_progress.c:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char time_spent[10];
data/curl-7.72.0/src/tool_progress.c:187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[3][6];
data/curl-7.72.0/src/tool_progress.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dlpercen[4]="--";
data/curl-7.72.0/src/tool_progress.c:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ulpercen[4]="--";
data/curl-7.72.0/src/tool_setopt.c:243:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(e, "\\n");
data/curl-7.72.0/src/tool_setopt.c:247:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(e, "\\r");
data/curl-7.72.0/src/tool_setopt.c:251:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(e, "\\t");
data/curl-7.72.0/src/tool_setopt.c:255:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(e, "\\\\");
data/curl-7.72.0/src/tool_setopt.c:259:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(e, "\\\"");
data/curl-7.72.0/src/tool_setopt.c:321:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char preamble[80];          /* should accommodate any symbol name */
data/curl-7.72.0/src/tool_setopt.c:364:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char preamble[80];
data/curl-7.72.0/src/tool_setopt.c:468:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(cp, part->data, size + 1);
data/curl-7.72.0/src/tool_setopt.c:630:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/curl-7.72.0/src/tool_strdup.c:39:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newstr, str, len);
data/curl-7.72.0/src/tool_urlglob.c:54:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pat->content.Set.elements[0], fixed, len);
data/curl-7.72.0/src/tool_urlglob.c:331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname[MAX_IP6LEN];
data/curl-7.72.0/src/tool_urlglob.c:347:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(hostname, str, hlen);
data/curl-7.72.0/src/tool_urlglob.c:380:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(buf, pattern, skip);
data/curl-7.72.0/src/tool_urlglob.c:469:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char text[512];
data/curl-7.72.0/src/tool_urlglob.c:614:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char numbuf[18];
data/curl-7.72.0/src/tool_urlglob.c:701:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&target[stringlen], appendthis, appendlen);
data/curl-7.72.0/tests/libtest/chkdecimalpoint.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zero[TOTAL_STR_LEN] = {'\0'};
data/curl-7.72.0/tests/libtest/chkhostname.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[HOSTNAME_MAX];
data/curl-7.72.0/tests/libtest/first.c:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname[CURL_MT_LOGFNAME_BUFSIZE];
data/curl-7.72.0/tests/libtest/first.c:121:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char dump[200 * 3 + 1];
data/curl-7.72.0/tests/libtest/lib1156.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char urlbuf[256];
data/curl-7.72.0/tests/libtest/lib1502.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char redirect[160];
data/curl-7.72.0/tests/libtest/lib1506.c:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char target_url[256];
data/curl-7.72.0/tests/libtest/lib1506.c:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsentry[256];
data/curl-7.72.0/tests/libtest/lib1510.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char target_url[256];
data/curl-7.72.0/tests/libtest/lib1510.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsentry[256];
data/curl-7.72.0/tests/libtest/lib1512.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsentry[256];
data/curl-7.72.0/tests/libtest/lib1512.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char target_url[256];
data/curl-7.72.0/tests/libtest/lib1515.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dns_entry[256];
data/curl-7.72.0/tests/libtest/lib1515.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char target_url[256];
data/curl-7.72.0/tests/libtest/lib1517.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, pooh->readptr, tocopy);/* copy requested data */
data/curl-7.72.0/tests/libtest/lib1520.c:63:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, data, len);
data/curl-7.72.0/tests/libtest/lib1522.c:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char g_Data[40 * 1024]; /* POST 40KB */
data/curl-7.72.0/tests/libtest/lib1523.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[CURL_ERROR_SIZE];
data/curl-7.72.0/tests/libtest/lib1525.c:42:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, data, strlen(data));
data/curl-7.72.0/tests/libtest/lib1526.c:41:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, data, strlen(data));
data/curl-7.72.0/tests/libtest/lib1527.c:41:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, data, strlen(data));
data/curl-7.72.0/tests/libtest/lib1529.c:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bURL[512];
data/curl-7.72.0/tests/libtest/lib1555.c:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[256];
data/curl-7.72.0/tests/libtest/lib1560.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/curl-7.72.0/tests/libtest/lib1560.c:654:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[80];
data/curl-7.72.0/tests/libtest/lib1560.c:655:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char part[80];
data/curl-7.72.0/tests/libtest/lib1560.c:656:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char value[80];
data/curl-7.72.0/tests/libtest/lib1560.c:660:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, p, n);
data/curl-7.72.0/tests/libtest/lib1591.c:49:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, data, amount);
data/curl-7.72.0/tests/libtest/lib1900.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *urlstring[MAX_URLS];
data/curl-7.72.0/tests/libtest/lib1900.c:35:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *site_blocklist[MAX_BLOCKLIST];
data/curl-7.72.0/tests/libtest/lib1900.c:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *server_blocklist[MAX_BLOCKLIST];
data/curl-7.72.0/tests/libtest/lib1900.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[200];
data/curl-7.72.0/tests/libtest/lib1900.c:61:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(filename, "rb");
data/curl-7.72.0/tests/libtest/lib1900.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char urlbuf[256];
data/curl-7.72.0/tests/libtest/lib1906.c:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[CURL_ERROR_SIZE] = "";
data/curl-7.72.0/tests/libtest/lib1907.c:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[CURL_ERROR_SIZE] = "";
data/curl-7.72.0/tests/libtest/lib500.c:97:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *moo = fopen(libtest_arg2, "wb");
data/curl-7.72.0/tests/libtest/lib505.c:55:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hd_src = fopen(libtest_arg2, "rb");
data/curl-7.72.0/tests/libtest/lib510.c:55:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, data, len);
data/curl-7.72.0/tests/libtest/lib518.c:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char msgbuff[256];
data/curl-7.72.0/tests/libtest/lib518.c:85:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fpa[i] = fopen(DEV_NULL, FOPEN_READTEXT);
data/curl-7.72.0/tests/libtest/lib518.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strbuff[256];
data/curl-7.72.0/tests/libtest/lib518.c:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strbuff1[81];
data/curl-7.72.0/tests/libtest/lib518.c:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strbuff2[81];
data/curl-7.72.0/tests/libtest/lib518.c:132:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(strbuff, "INFINITY");
data/curl-7.72.0/tests/libtest/lib518.c:140:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(strbuff, "INFINITY");
data/curl-7.72.0/tests/libtest/lib518.c:198:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(strbuff, "INFINITY");
data/curl-7.72.0/tests/libtest/lib518.c:206:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(strbuff, "INFINITY");
data/curl-7.72.0/tests/libtest/lib518.c:324:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd[0] = open(DEV_NULL, O_RDONLY);
data/curl-7.72.0/tests/libtest/lib525.c:55:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hd_src = fopen(libtest_arg2, "rb");
data/curl-7.72.0/tests/libtest/lib530.c:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char target_url[256];
data/curl-7.72.0/tests/libtest/lib537.c:54:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char msgbuff[256];
data/curl-7.72.0/tests/libtest/lib537.c:86:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fpa[i] = fopen(DEV_NULL, FOPEN_READTEXT);
data/curl-7.72.0/tests/libtest/lib537.c:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strbuff[256];
data/curl-7.72.0/tests/libtest/lib537.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strbuff1[81];
data/curl-7.72.0/tests/libtest/lib537.c:133:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(strbuff, "INFINITY");
data/curl-7.72.0/tests/libtest/lib537.c:141:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(strbuff, "INFINITY");
data/curl-7.72.0/tests/libtest/lib537.c:193:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(strbuff, "INFINITY");
data/curl-7.72.0/tests/libtest/lib537.c:201:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(strbuff, "INFINITY");
data/curl-7.72.0/tests/libtest/lib537.c:318:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd[0] = open(DEV_NULL, O_RDONLY);
data/curl-7.72.0/tests/libtest/lib540.c:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[246]; /* naively fixed-size */
data/curl-7.72.0/tests/libtest/lib541.c:47:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hd_src = fopen(libtest_arg2, "rb");
data/curl-7.72.0/tests/libtest/lib544.c:73:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(teststring, "FAIL");
data/curl-7.72.0/tests/libtest/lib552.c:127:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char databuf[70000]; /* MUST be more than 64k OR
data/curl-7.72.0/tests/libtest/lib552.c:137:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, databuf + current_offset, given);
data/curl-7.72.0/tests/libtest/lib553.c:36:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[1024];
data/curl-7.72.0/tests/libtest/lib553.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, buf, size);
data/curl-7.72.0/tests/libtest/lib553.c:56:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buf[SIZE_HEADERS + 100];
data/curl-7.72.0/tests/libtest/lib556.c:81:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/curl-7.72.0/tests/libtest/lib557.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[BUFSZ];   /* result string   */
data/curl-7.72.0/tests/libtest/lib557.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[BUFSZ];   /* result string   */
data/curl-7.72.0/tests/libtest/lib557.c:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[BUFSZ];   /* result string   */
data/curl-7.72.0/tests/libtest/lib557.c:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[BUFSZ];   /* result string   */
data/curl-7.72.0/tests/libtest/lib557.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[BUFSZ];   /* result string   */
data/curl-7.72.0/tests/libtest/lib557.c:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[BUFSZ];   /* result string   */
data/curl-7.72.0/tests/libtest/lib557.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[BUFSZ];   /* result string   */
data/curl-7.72.0/tests/libtest/lib557.c:1415:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/curl-7.72.0/tests/libtest/lib557.c:1448:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/curl-7.72.0/tests/libtest/lib557.c:1564:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512]; /* larger than max float size */
data/curl-7.72.0/tests/libtest/lib566.c:54:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    moo = fopen(libtest_arg2, "wb");
data/curl-7.72.0/tests/libtest/lib568.c:79:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  sdp = open("log/file568.txt", O_RDONLY);
data/curl-7.72.0/tests/libtest/lib568.c:83:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  sdpf = fopen("log/file568.txt", "rb");
data/curl-7.72.0/tests/libtest/lib569.c:43:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *idfile = fopen(libtest_arg2, "wb");
data/curl-7.72.0/tests/libtest/lib571.c:108:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *protofile = fopen(libtest_arg2, "wb");
data/curl-7.72.0/tests/libtest/lib572.c:98:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  params = open("log/file572.txt", O_RDONLY);
data/curl-7.72.0/tests/libtest/lib572.c:102:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  paramsf = fopen("log/file572.txt", "rb");
data/curl-7.72.0/tests/libtest/lib578.c:34:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *moo = fopen(libtest_arg2, "wb");
data/curl-7.72.0/tests/libtest/lib579.c:55:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *moo = fopen(libtest_arg2, "ab");
data/curl-7.72.0/tests/libtest/lib579.c:79:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, data, len);
data/curl-7.72.0/tests/libtest/lib582.c:244:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hd_src = fopen(libtest_arg2, "rb");
data/curl-7.72.0/tests/libtest/lib591.c:48:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  upload = fopen(libtest_arg3, "rb");
data/curl-7.72.0/tests/libtest/lib599.c:83:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    moo = fopen(libtest_arg2, "wb");
data/curl-7.72.0/tests/libtest/lib650.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char flbuf[32];
data/curl-7.72.0/tests/libtest/lib651.c:26:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buffer[17000]; /* more than 16K */
data/curl-7.72.0/tests/libtest/lib652.c:26:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buffer[17000]; /* more than 16K */
data/curl-7.72.0/tests/libtest/lib666.c:26:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buffer[17000]; /* more than 16K */
data/curl-7.72.0/tests/libtest/lib668.c:49:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, pooh->readptr, len);
data/curl-7.72.0/tests/libtest/stub_gssapi.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char creds[MAX_CREDS_LENGTH];
data/curl-7.72.0/tests/libtest/testtrace.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timebuf[20];
data/curl-7.72.0/tests/server/fake_ntlm.c:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/curl-7.72.0/tests/server/fake_ntlm.c:113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char logfilename[256];
data/curl-7.72.0/tests/server/getpart.c:93:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(convbuf, indata, insize);
data/curl-7.72.0/tests/server/getpart.c:212:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*dst_buf + *dst_len, src_buf, src_len);
data/curl-7.72.0/tests/server/getpart.c:247:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*buf, buf64, src_len);
data/curl-7.72.0/tests/server/getpart.c:282:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char couter[MAX_TAG_LEN + 1]; /* current outermost section */
data/curl-7.72.0/tests/server/getpart.c:283:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmain[MAX_TAG_LEN + 1];  /* current main section */
data/curl-7.72.0/tests/server/getpart.c:284:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char csub[MAX_TAG_LEN + 1];   /* current sub section */
data/curl-7.72.0/tests/server/getpart.c:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ptag[MAX_TAG_LEN + 1];   /* potential tag */
data/curl-7.72.0/tests/server/getpart.c:286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char patt[MAX_TAG_LEN + 1];   /* potential attributes */
data/curl-7.72.0/tests/server/getpart.c:346:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ptag, ptr, len.uns);
data/curl-7.72.0/tests/server/getpart.c:408:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ptag, ptr, len.uns);
data/curl-7.72.0/tests/server/getpart.c:428:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(patt, ptr, len.uns);
data/curl-7.72.0/tests/server/mqttd.c:145:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen(configfile, FOPEN_READTEXT);
data/curl-7.72.0/tests/server/mqttd.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[512];
data/curl-7.72.0/tests/server/mqttd.c:151:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char key[32];
data/curl-7.72.0/tests/server/mqttd.c:152:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char value[32];
data/curl-7.72.0/tests/server/mqttd.c:171:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          config.testnum = atoi(value);
data/curl-7.72.0/tests/server/mqttd.c:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[12000];
data/curl-7.72.0/tests/server/mqttd.c:212:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[12000] = "";
data/curl-7.72.0/tests/server/mqttd.c:398:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rembuffer[4];
data/curl-7.72.0/tests/server/mqttd.c:410:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&packet[1], rembuffer, encodedlen);
data/curl-7.72.0/tests/server/mqttd.c:417:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&packet[3 + encodedlen], topic, topiclen);
data/curl-7.72.0/tests/server/mqttd.c:420:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&packet[payloadindex], payload, payloadlen);
data/curl-7.72.0/tests/server/mqttd.c:440:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char topic[MAX_TOPIC_LENGTH + 1];
data/curl-7.72.0/tests/server/mqttd.c:448:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[10];
data/curl-7.72.0/tests/server/mqttd.c:479:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[10*1024];
data/curl-7.72.0/tests/server/mqttd.c:487:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char client_id[MAX_CLIENT_ID_LENGTH];
data/curl-7.72.0/tests/server/mqttd.c:490:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char protocol[7] = {
data/curl-7.72.0/tests/server/mqttd.c:495:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *dump = fopen(REQUEST_DUMP, "ab");
data/curl-7.72.0/tests/server/mqttd.c:539:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(client_id, &buffer[14], payload_len);
data/curl-7.72.0/tests/server/mqttd.c:576:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(topic, &buffer[4], topic_len);
data/curl-7.72.0/tests/server/rtspd.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char reqbuf[REQBUFSIZ]; /* buffer area for the incoming request */
data/curl-7.72.0/tests/server/rtspd.c:103:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  bool open;      /* keep connection open info, as found in the request */
data/curl-7.72.0/tests/server/rtspd.c:208:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char request[REQUEST_KEYWORD_SIZE];
data/curl-7.72.0/tests/server/rtspd.c:209:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char doc[MAXDOCNAMELEN];
data/curl-7.72.0/tests/server/rtspd.c:210:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char prot_str[5];
data/curl-7.72.0/tests/server/rtspd.c:228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char logbuf[256];
data/curl-7.72.0/tests/server/rtspd.c:369:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(rtp_scratch + 4 + i, RTP_DATA, RTP_DATA_SIZE);
data/curl-7.72.0/tests/server/rtspd.c:380:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(req->rtp_buffer + req->rtp_buffersize, rtp_scratch,
data/curl-7.72.0/tests/server/rtspd.c:553:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     req->open &&
data/curl-7.72.0/tests/server/rtspd.c:609:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dump = fopen(REQUEST_DUMP, "ab");
data/curl-7.72.0/tests/server/rtspd.c:774:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char weare[256];
data/curl-7.72.0/tests/server/rtspd.c:804:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msgbuf[64];
data/curl-7.72.0/tests/server/rtspd.c:849:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char partbuf[80]="data";
data/curl-7.72.0/tests/server/rtspd.c:914:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  dump = fopen(RESPONSE_DUMP, "ab");
data/curl-7.72.0/tests/server/rtspd.c:998:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char command[32];
data/curl-7.72.0/tests/server/rtspd.c:1332:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if(!req.open) {
data/curl-7.72.0/tests/server/rtspd.c:1337:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if(req.open)
data/curl-7.72.0/tests/server/rtspd.c:1340:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    } while(req.open || (req.testno == DOCNUMBER_CONNECT));
data/curl-7.72.0/tests/server/sockfilt.c:347:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[120];
data/curl-7.72.0/tests/server/sockfilt.c:916:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[17010];
data/curl-7.72.0/tests/server/sockfilt.c:917:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[16];
data/curl-7.72.0/tests/server/socksd.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addr[32]; /* backend IPv4 numerical */
data/curl-7.72.0/tests/server/socksd.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char user[256];
data/curl-7.72.0/tests/server/socksd.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[256];
data/curl-7.72.0/tests/server/socksd.c:159:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(config.user, "user");
data/curl-7.72.0/tests/server/socksd.c:160:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(config.password, "password");
data/curl-7.72.0/tests/server/socksd.c:177:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen(configfile, FOPEN_READTEXT);
data/curl-7.72.0/tests/server/socksd.c:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[512];
data/curl-7.72.0/tests/server/socksd.c:183:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char key[32];
data/curl-7.72.0/tests/server/socksd.c:184:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char value[32];
data/curl-7.72.0/tests/server/socksd.c:235:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[1200];
data/curl-7.72.0/tests/server/socksd.c:304:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char response[256 + 16];
data/curl-7.72.0/tests/server/socksd.c:335:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&response[2], &buffer[SOCKS4_DSTPORT], 6);
data/curl-7.72.0/tests/server/socksd.c:356:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[256 + 16];
data/curl-7.72.0/tests/server/socksd.c:357:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char response[256 + 16];
data/curl-7.72.0/tests/server/socksd.c:558:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&response[SOCKS5_BNDADDR], address, len);
data/curl-7.72.0/tests/server/socksd.c:561:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&response[SOCKS5_BNDADDR + len],
data/curl-7.72.0/tests/server/socksd.c:594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[512];
data/curl-7.72.0/tests/server/socksd.c:925:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        backendport = (unsigned short)atoi(argv[arg++]);
data/curl-7.72.0/tests/server/sws.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char reqbuf[REQBUFSIZ]; /* buffer area for the incoming request */
data/curl-7.72.0/tests/server/sws.c:105:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  bool open;      /* keep connection open info, as found in the request */
data/curl-7.72.0/tests/server/sws.c:242:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/curl-7.72.0/tests/server/sws.c:243:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen(cmdfile, FOPEN_READTEXT);
data/curl-7.72.0/tests/server/sws.c:361:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char request[REQUEST_KEYWORD_SIZE];
data/curl-7.72.0/tests/server/sws.c:362:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char doc[MAXDOCNAMELEN];
data/curl-7.72.0/tests/server/sws.c:363:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char logbuf[456];
data/curl-7.72.0/tests/server/sws.c:749:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if(req->open &&
data/curl-7.72.0/tests/server/sws.c:802:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dump = fopen(dumpfile, "ab");
data/curl-7.72.0/tests/server/sws.c:961:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char weare[256];
data/curl-7.72.0/tests/server/sws.c:989:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msgbuf[64];
data/curl-7.72.0/tests/server/sws.c:1019:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char partbuf[80];
data/curl-7.72.0/tests/server/sws.c:1093:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  dump = fopen(responsedump, "ab");
data/curl-7.72.0/tests/server/sws.c:1168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char command[32];
data/curl-7.72.0/tests/server/sws.c:1330:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char readclient[2][256];
data/curl-7.72.0/tests/server/sws.c:1331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char readserver[2][256];
data/curl-7.72.0/tests/server/sws.c:1830:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if(!req->open) {
data/curl-7.72.0/tests/server/sws.c:1855:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if(req->open) {
data/curl-7.72.0/tests/server/sws.c:1883:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char port_str[11];
data/curl-7.72.0/tests/server/sws.c:2294:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if(!req.open)
data/curl-7.72.0/tests/server/tftp.h:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char th_data[1];         /* data or error string */
data/curl-7.72.0/tests/server/tftpd.c:131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char storage[PKTSIZE];
data/curl-7.72.0/tests/server/tftpd.c:378:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dp->th_data, test->rptr, copy_n);
data/curl-7.72.0/tests/server/tftpd.c:451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outfile[256];
data/curl-7.72.0/tests/server/tftpd.c:454:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    test->ofile = open(outfile, O_CREAT|O_RDWR|O_BINARY, 0777);
data/curl-7.72.0/tests/server/tftpd.c:456:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    test->ofile = open(outfile, O_CREAT|O_RDWR, 0777);
data/curl-7.72.0/tests/server/tftpd.c:518:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rbuf[PKTSIZE];
data/curl-7.72.0/tests/server/tftpd.c:898:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *server = fopen(REQUEST_DUMP, "ab");
data/curl-7.72.0/tests/server/tftpd.c:1072:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char weare[128];
data/curl-7.72.0/tests/server/tftpd.c:1088:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char partbuf[80]="data";
data/curl-7.72.0/tests/server/tftpd.c:1356:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(tp->th_msg, pe->e_msg, length + 1);
data/curl-7.72.0/tests/server/util.c:78:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[256*3];
data/curl-7.72.0/tests/server/util.c:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[2048 + 1];
data/curl-7.72.0/tests/server/util.c:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timebuf[20];
data/curl-7.72.0/tests/server/util.c:133:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  logfp = fopen(serverlogfile, "ab");
data/curl-7.72.0/tests/server/util.c:151:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/curl-7.72.0/tests/server/util.c:201:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256];
data/curl-7.72.0/tests/server/util.c:204:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  stream = fopen(filename, "rb");
data/curl-7.72.0/tests/server/util.c:210:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  stream = fopen(filename, "rb");
data/curl-7.72.0/tests/server/util.c:278:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pidfile = fopen(filename, "wb");
data/curl-7.72.0/tests/server/util.c:301:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *portfile = fopen(filename, "wb");
data/curl-7.72.0/tests/server/util.c:319:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    lockfile = fopen(filename, "wb");
data/curl-7.72.0/tests/unit/unit1304.c:28:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filename[64];
data/curl-7.72.0/tests/unit/unit1304.c:54:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(filename, filename1, strlen(filename1));
data/curl-7.72.0/tests/unit/unit1305.c:90:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ai->ai_canonname, dummy, namelen);
data/curl-7.72.0/tests/unit/unit1398.c:32:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buf[3] = {'b', 'u', 'g'};
data/curl-7.72.0/tests/unit/unit1398.c:35:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char output[24];
data/curl-7.72.0/tests/unit/unit1399.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[64];
data/curl-7.72.0/tests/unit/unit1600.c:50:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char output[21];
data/curl-7.72.0/tests/unit/unit1601.c:41:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char output[MD5_DIGEST_LEN];
data/curl-7.72.0/tests/unit/unit1607.c:53:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *address[10];
data/curl-7.72.0/tests/unit/unit1607.c:143:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ipaddress[MAX_IPADR_LEN] = {0};
data/curl-7.72.0/tests/unit/unit1609.c:53:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *address[10];
data/curl-7.72.0/tests/unit/unit1609.c:151:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ipaddress[MAX_IPADR_LEN] = {0};
data/curl-7.72.0/tests/unit/unit1610.c:41:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char output[SHA256_DIGEST_LENGTH];
data/curl-7.72.0/tests/unit/unit1611.c:41:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char output[MD4_DIGEST_LENGTH];
data/curl-7.72.0/tests/unit/unit1612.c:43:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char output[HMAC_MD5_LENGTH];
data/curl-7.72.0/tests/unit/unit1621.c:74:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    url = (char *)tests[i].input;
data/curl-7.72.0/tests/unit/unit1650.c:157:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[256];
data/curl-7.72.0/tests/unit/unit1650.c:177:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             hexdump((unsigned char *)req[i].packet, size));
data/curl-7.72.0/tests/unit/unit1650.c:189:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    rc = doh_decode((const unsigned char *)resp[i].packet, resp[i].size,
data/curl-7.72.0/tests/unit/unit1650.c:232:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    if(resp[i].out && strcmp((char *)buffer, resp[i].out)) {
data/curl-7.72.0/tests/unit/unit1652.c:35:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char input[4096];
data/curl-7.72.0/tests/unit/unit1652.c:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char result[4096];
data/curl-7.72.0/tests/unit/unit1652.c:55:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(result, buf, size);
data/curl-7.72.0/tests/unit/unit1654.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outname[256];
data/curl-7.72.0/tests/unit/unit1655.c:87:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dohbuffer[255 + 16]; /* deliberately short buffer */
data/curl-7.72.0/tests/unit/unit1655.c:141:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[128];
data/curl-7.72.0/docs/examples/anyauthput.c:89:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  retcode = read(fd, ptr, (READ_3RD_ARG)(size * nmemb));
data/curl-7.72.0/docs/examples/crawler.c:131:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(!link || strlen(link) < 20)
data/curl-7.72.0/docs/examples/crawler.c:146:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ctype != NULL && strlen(ctype) > 10 && strstr(ctype, "text/html");
data/curl-7.72.0/docs/examples/curlx.c:452:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(hostporturl) + 9;
data/curl-7.72.0/docs/examples/curlx.c:495:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  contenttype = malloc(15 + strlen(mimetype));
data/curl-7.72.0/docs/examples/curlx.c:496:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  snprintf(contenttype, 15 + strlen(mimetype), "Content-type: %s", mimetype);
data/curl-7.72.0/docs/examples/ephiperfifo.c:225:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  err = read(g->tfd, &count, sizeof(uint64_t));
data/curl-7.72.0/docs/examples/ephiperfifo.c:400:10:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    rv = fscanf(g->input, "%1023s%n", s, &n);
data/curl-7.72.0/docs/examples/evhiperfifo.c:379:10:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    rv = fscanf(g->input, "%1023s%n", s, &n);
data/curl-7.72.0/docs/examples/fopen.c:485:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fwrite(buffer, 1, strlen(buffer), outf);
data/curl-7.72.0/docs/examples/ftpuploadfrommem.c:75:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  upload.sizeleft = strlen(data);
data/curl-7.72.0/docs/examples/hiperfifo.c:371:10:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    rv = fscanf(g->input, "%1023s%n", s, &n);
data/curl-7.72.0/docs/examples/imap-append.c:74:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(data);
data/curl-7.72.0/docs/examples/imap-append.c:115:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      infilesize += (long)strlen(*p);
data/curl-7.72.0/docs/examples/post-callback.c:72:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  wt.sizeleft = strlen(data);
data/curl-7.72.0/docs/examples/postinmemory.c:86:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, (long)strlen(postthis));
data/curl-7.72.0/docs/examples/rtsp.c:53:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ch = getchar();
data/curl-7.72.0/docs/examples/rtsp.c:221:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *uri = malloc(strlen(url) + 32);
data/curl-7.72.0/docs/examples/rtsp.c:222:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *sdp_filename = malloc(strlen(url) + 32);
data/curl-7.72.0/docs/examples/rtsp.c:223:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *control = malloc(strlen(url) + 32);
data/curl-7.72.0/docs/examples/rtsp.c:225:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    get_sdp_filename(url, sdp_filename, strlen(url) + 32);
data/curl-7.72.0/docs/examples/rtsp.c:246:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(uri, strlen(url) + 32, "%s", url);
data/curl-7.72.0/docs/examples/rtsp.c:256:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(uri, strlen(url) + 32, "%s/%s", url, control);
data/curl-7.72.0/docs/examples/rtsp.c:260:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(uri, strlen(url) + 32, "%s/", url);
data/curl-7.72.0/docs/examples/sendrecv.c:64:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t request_len = strlen(request);
data/curl-7.72.0/docs/examples/simplepost.c:44:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, (long)strlen(postthis));
data/curl-7.72.0/docs/examples/smtp-authzid.c:82:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(data);
data/curl-7.72.0/docs/examples/smtp-mail.c:79:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(data);
data/curl-7.72.0/docs/examples/smtp-multi.c:76:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(data);
data/curl-7.72.0/docs/examples/smtp-ssl.c:76:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(data);
data/curl-7.72.0/docs/examples/smtp-tls.c:76:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(data);
data/curl-7.72.0/docs/examples/synctime.c:154:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if(strlen((char *)(ptr)) > 50) /* Can prevent buffer overflow to
data/curl-7.72.0/docs/examples/synctime.c:192:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(proxy_port) > 0)
data/curl-7.72.0/docs/examples/synctime.c:195:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(proxy_user_password) > 0)
data/curl-7.72.0/lib/base64.c:118:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  srclen = strlen(src);
data/curl-7.72.0/lib/base64.c:195:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    insize = strlen(indata);
data/curl-7.72.0/lib/base64.c:273:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *outlen = strlen(base64data);
data/curl-7.72.0/lib/conncache.c:191:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bundle = Curl_hash_pick(&connc->hash, key, strlen(key));
data/curl-7.72.0/lib/conncache.c:201:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  void *p = Curl_hash_add(&connc->hash, key, strlen(key), bundle);
data/curl-7.72.0/lib/connect.c:274:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(dev && (strlen(dev)<255) ) {
data/curl-7.72.0/lib/connect.c:282:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strncmp(if_prefix, dev, strlen(if_prefix)) == 0) {
data/curl-7.72.0/lib/connect.c:283:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dev += strlen(if_prefix);
data/curl-7.72.0/lib/connect.c:286:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    else if(strncmp(host_prefix, dev, strlen(host_prefix)) == 0) {
data/curl-7.72.0/lib/connect.c:287:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dev += strlen(host_prefix);
data/curl-7.72.0/lib/connect.c:310:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    dev, (curl_socklen_t)strlen(dev) + 1) == 0) {
data/curl-7.72.0/lib/content_encoding.c:866:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen(ce->name) + 2;
data/curl-7.72.0/lib/content_encoding.c:879:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p += strlen(p);
data/curl-7.72.0/lib/cookie.c:123:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t cookie_domain_len = strlen(cooke_domain);
data/curl-7.72.0/lib/cookie.c:124:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t hostname_len = strlen(hostname);
data/curl-7.72.0/lib/cookie.c:181:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cookie_path_len = strlen(cookie_path);
data/curl-7.72.0/lib/cookie.c:195:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(0 == strlen(uri_path) || uri_path[0] != '/') {
data/curl-7.72.0/lib/cookie.c:211:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  uri_path_len = strlen(uri_path);
data/curl-7.72.0/lib/cookie.c:252:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(domain);
data/curl-7.72.0/lib/cookie.c:309:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(new_path);
data/curl-7.72.0/lib/cookie.c:468:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t linelength = strlen(lineptr);
data/curl-7.72.0/lib/cookie.c:493:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(what);
data/curl-7.72.0/lib/cookie.c:494:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t nlen = strlen(name);
data/curl-7.72.0/lib/cookie.c:1002:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              cllen = strlen(clist->spath);
data/curl-7.72.0/lib/cookie.c:1191:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l1 = c1->path ? strlen(c1->path) : 0;
data/curl-7.72.0/lib/cookie.c:1192:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l2 = c2->path ? strlen(c2->path) : 0;
data/curl-7.72.0/lib/cookie.c:1198:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l1 = c1->domain ? strlen(c1->domain) : 0;
data/curl-7.72.0/lib/cookie.c:1199:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l2 = c2->domain ? strlen(c2->domain) : 0;
data/curl-7.72.0/lib/cookie.c:1205:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l1 = c1->name ? strlen(c1->name) : 0;
data/curl-7.72.0/lib/cookie.c:1206:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l2 = c2->name ? strlen(c2->name) : 0;
data/curl-7.72.0/lib/curl_addrinfo.c:131:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t namelen = ai->ai_canonname ? strlen(ai->ai_canonname) + 1 : 0;
data/curl-7.72.0/lib/curl_addrinfo.c:280:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t namelen = strlen(he->h_name) + 1; /* include zero termination */
data/curl-7.72.0/lib/curl_addrinfo.c:488:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  path_len = strlen(path) + 1;
data/curl-7.72.0/lib/curl_get_line.c:40:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t rlen = strlen(b);
data/curl-7.72.0/lib/curl_gethostname.c:69:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, force_hostname, namelen);
data/curl-7.72.0/lib/curl_ntlm_core.c:452:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = CURLMIN(strlen(password), 14);
data/curl-7.72.0/lib/curl_ntlm_core.c:541:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(password);
data/curl-7.72.0/lib/curl_ntlm_wb.c:264:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len_in = strlen(input), len_out = 0;
data/curl-7.72.0/lib/curl_ntlm_wb.c:342:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  header += strlen("NTLM");
data/curl-7.72.0/lib/curl_path.c:64:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t homelen = strlen(homedir);
data/curl-7.72.0/lib/curl_path.c:132:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fullPathLength = strlen(cp) + strlen(homedir) + 2;
data/curl-7.72.0/lib/curl_path.c:132:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fullPathLength = strlen(cp) + strlen(homedir) + 2;
data/curl-7.72.0/lib/curl_path.c:142:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i = j = 0; i <= strlen(cp); i++) {
data/curl-7.72.0/lib/curl_path.c:182:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pathLength = strlen(homedir);
data/curl-7.72.0/lib/curl_sasl.c:396:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       strlen(mech) + len > sasl->params->maxirlen) {
data/curl-7.72.0/lib/curl_setup_once.h:130:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define sread(x,y,z) (ssize_t)read((RECV_TYPE_ARG1)(x), \
data/curl-7.72.0/lib/curl_sspi.c:181:39:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  identity->UserLength = curlx_uztoul(_tcslen(dup_user.tchar_ptr));
data/curl-7.72.0/lib/curl_sspi.c:190:3:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  _tcsncpy(dup_domain.tchar_ptr, domain.tchar_ptr, domlen);
data/curl-7.72.0/lib/curl_sspi.c:208:43:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  identity->PasswordLength = curlx_uztoul(_tcslen(dup_passwd.tchar_ptr));
data/curl-7.72.0/lib/doh.c:85:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t hostlen = strlen(host);
data/curl-7.72.0/lib/doh.c:143:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      labellen = strlen(hostp);
data/curl-7.72.0/lib/doh.c:766:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(ptr);
data/curl-7.72.0/lib/doh.c:806:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t hostlen = strlen(hostname) + 1; /* include zero terminator */
data/curl-7.72.0/lib/dotdot.c:55:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t inlen = strlen(input);
data/curl-7.72.0/lib/dotdot.c:176:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qlen = strlen(&input[oindex]);
data/curl-7.72.0/lib/dynbuf.c:168:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = strlen(str);
data/curl-7.72.0/lib/dynbuf.c:187:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    CURLcode result = dyn_nappend(s, (unsigned char *)str, strlen(str));
data/curl-7.72.0/lib/escape.c:91:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = (inlength?(size_t)inlength:strlen(string));
data/curl-7.72.0/lib/escape.c:156:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  alloc = (length?length:strlen(string)) + 1;
data/curl-7.72.0/lib/file.c:515:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    nread = read(fd, buf, bytestoread);
data/curl-7.72.0/lib/formdata.c:83:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    post->namelength = (long)(name?(namelength?namelength:strlen(name)):0);
data/curl-7.72.0/lib/formdata.c:608:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                   strlen(form->name) + 1);
data/curl-7.72.0/lib/formdata.c:622:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          clen = strlen(form->value) + 1;
data/curl-7.72.0/lib/ftp.c:948:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     (strlen(data->set.str[STRING_FTPPORT]) > 1)) {
data/curl-7.72.0/lib/ftp.c:951:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t addrlen = INET6_ADDRSTRLEN > strlen(string_ftpport) ?
data/curl-7.72.0/lib/ftp.c:952:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      INET6_ADDRSTRLEN : strlen(string_ftpport);
data/curl-7.72.0/lib/ftp.c:954:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t addrlen = INET_ADDRSTRLEN > strlen(string_ftpport) ?
data/curl-7.72.0/lib/ftp.c:955:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      INET_ADDRSTRLEN : strlen(string_ftpport);
data/curl-7.72.0/lib/ftp.c:972:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(addr, ip_start, ip_end - ip_start);
data/curl-7.72.0/lib/ftp.c:994:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(addr, string_ftpport, ip_end - ip_start);
data/curl-7.72.0/lib/ftp.c:3217:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          pathLen -= ftpc->file?strlen(ftpc->file):0; /* file is url-decoded */
data/curl-7.72.0/lib/ftp.c:3966:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  write_len = strlen(cmd);
data/curl-7.72.0/lib/ftp.c:4151:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(ftpc->dirs[0], rawPath, dirlen);
data/curl-7.72.0/lib/ftp.c:4194:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(comp, curPos, compLen);
data/curl-7.72.0/lib/ftp.c:4230:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        n -= ftpc->file?strlen(ftpc->file):0;
data/curl-7.72.0/lib/ftp.c:4232:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if((strlen(oldPath) == n) && !strncmp(rawPath, oldPath, n)) {
data/curl-7.72.0/lib/gopher.c:106:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(gopherpath) <= 2) {
data/curl-7.72.0/lib/gopher.c:108:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(sel);
data/curl-7.72.0/lib/hostcheck.c:76:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(hostname);
data/curl-7.72.0/lib/hostcheck.c:79:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(pattern);
data/curl-7.72.0/lib/hostip.c:173:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/curl-7.72.0/lib/hostip.c:268:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  entry_len = strlen(entry_id);
data/curl-7.72.0/lib/hostip.c:276:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    entry_len = strlen(entry_id);
data/curl-7.72.0/lib/hostip.c:441:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  entry_len = strlen(entry_id);
data/curl-7.72.0/lib/hostip.c:896:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      entry_len = strlen(entry_id);
data/curl-7.72.0/lib/hostip.c:948:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          addr_end = addr_begin + strlen(addr_begin);
data/curl-7.72.0/lib/hostip.c:1006:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      entry_len = strlen(entry_id);
data/curl-7.72.0/lib/http.c:207:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t thislen = strlen(thisheader);
data/curl-7.72.0/lib/http.c:315:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result = Curl_base64_encode(data, out, strlen(out), &authorization, &size);
data/curl-7.72.0/lib/http.c:1344:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t hlen = strlen(header);
data/curl-7.72.0/lib/http.c:1372:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  clen = strlen(content); /* length of the word to find */
data/curl-7.72.0/lib/http.c:2222:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memmove(cookiehost, cookiehost + 1, strlen(cookiehost) - 1);
data/curl-7.72.0/lib/http.c:2342:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if(!*data->state.up.path && path[strlen(path) - 1] != '/') {
data/curl-7.72.0/lib/http.c:3010:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t ch = CURLMIN(strlen(prefix), len);
data/curl-7.72.0/lib/http.c:3033:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(CURLE_OK != Curl_convert_from_network(data, scratch, strlen(s) + 1)) {
data/curl-7.72.0/lib/http.c:3073:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(CURLE_OK != Curl_convert_from_network(data, scratch, strlen(s) + 1)) {
data/curl-7.72.0/lib/http.c:3564:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(&scratch[0], headp, SCRATCHSIZE);
data/curl-7.72.0/lib/http.c:3742:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = Curl_convert_from_network(data, headp, strlen(headp));
data/curl-7.72.0/lib/http.c:3928:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      k->timeofdoc = Curl_getdate_capped(headp + strlen("Last-Modified:"));
data/curl-7.72.0/lib/http.c:4007:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 &headp[ strlen("Alt-Svc:") ],
data/curl-7.72.0/lib/http2.c:417:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(header);
data/curl-7.72.0/lib/http2.c:1976:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[0].namelen = strlen((char *)nva[0].name);
data/curl-7.72.0/lib/http2.c:1998:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[1].namelen = strlen((char *)nva[1].name);
data/curl-7.72.0/lib/http2.c:2008:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[2].namelen = strlen((char *)nva[2].name);
data/curl-7.72.0/lib/http2.c:2013:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[2].valuelen = strlen((char *)nva[2].value);
data/curl-7.72.0/lib/http2.c:2046:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nva[i].namelen = strlen((char *)nva[i].name);
data/curl-7.72.0/lib/http_digest.c:64:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  header += strlen("Digest");
data/curl-7.72.0/lib/http_negotiate.c:85:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  header += strlen("Negotiate");
data/curl-7.72.0/lib/http_negotiate.c:89:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(header);
data/curl-7.72.0/lib/http_ntlm.c:76:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    header += strlen("NTLM");
data/curl-7.72.0/lib/http_proxy.c:517:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  strlen("Content-Length:"), NULL, 10, &s->cl);
data/curl-7.72.0/lib/idn_win32.c:96:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t in_len = wcslen(in_w) + 1;
data/curl-7.72.0/lib/if2ip.c:201:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(interf);
data/curl-7.72.0/lib/imap.c:209:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t cmd_len = strlen(cmd);
data/curl-7.72.0/lib/imap.c:250:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t id_len = strlen(id);
data/curl-7.72.0/lib/imap.c:348:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(buffer);
data/curl-7.72.0/lib/imap.c:1029:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(line);
data/curl-7.72.0/lib/imap.c:1439:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(imapc->resptag, "*");
data/curl-7.72.0/lib/imap.c:1809:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  newlen = strlen(str) + backsp_count + quote_count + (escape_only ? 0 : 2);
data/curl-7.72.0/lib/inet_ntop.c:64:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(tmp);
data/curl-7.72.0/lib/inet_ntop.c:148:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tp += strlen(tp);
data/curl-7.72.0/lib/krb5.c:202:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    input_buffer.length = strlen(stringp);
data/curl-7.72.0/lib/ldap.c:531:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name_len = strlen(name);
data/curl-7.72.0/lib/ldap.c:591:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      attr_len = strlen(attr);
data/curl-7.72.0/lib/memdebug.c:227:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(str) + 1;
data/curl-7.72.0/lib/memdebug.c:251:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  wsiz = wcslen(str) + 1;
data/curl-7.72.0/lib/mime.c:321:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(hdr);
data/curl-7.72.0/lib/mime.c:756:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t tsz = strlen(trail);
data/curl-7.72.0/lib/mime.c:934:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            hdr->data, strlen(hdr->data), "\r\n");
data/curl-7.72.0/lib/mime.c:1037:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          strlen(mime->boundary), part? "\r\n": "--\r\n");
data/curl-7.72.0/lib/mime.c:1412:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      datasize = strlen(data);
data/curl-7.72.0/lib/mime.c:1655:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t skiplen = skip? strlen(skip): 0;
data/curl-7.72.0/lib/mime.c:1659:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size += strlen(s->data) + overhead;
data/curl-7.72.0/lib/mime.c:1673:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  boundarysize = 4 + strlen(mime->boundary) + 2;
data/curl-7.72.0/lib/mime.c:1767:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len1 = strlen(filename);
data/curl-7.72.0/lib/mime.c:1772:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len2 = strlen(ctts[i].extension);
data/curl-7.72.0/lib/mime.c:1783:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(target);
data/curl-7.72.0/lib/mprintf.c:834:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(str);
data/curl-7.72.0/lib/mprintf.c:892:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t left = sizeof(formatbuf)-strlen(formatbuf);
data/curl-7.72.0/lib/mprintf.c:961:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        DEBUGASSERT(strlen(work) <= sizeof(work));
data/curl-7.72.0/lib/mqtt.c:145:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t curl_len = strlen("curl");
data/curl-7.72.0/lib/mqtt.c:213:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(path) > 1) {
data/curl-7.72.0/lib/openldap.c:294:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      passwd.bv_len = strlen(passwd.bv_val);
data/curl-7.72.0/lib/parsedate.c:360:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/curl-7.72.0/lib/pingpong.c:197:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  write_len = strlen(s);
data/curl-7.72.0/lib/pop3.c:246:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(buffer);
data/curl-7.72.0/lib/pop3.c:433:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(pop3c->apoptimestamp)));
data/curl-7.72.0/lib/pop3.c:436:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(conn->passwd)));
data/curl-7.72.0/lib/pop3.c:610:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(line);
data/curl-7.72.0/lib/pop3.c:669:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(line);
data/curl-7.72.0/lib/rand.c:51:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t elen = strlen(force_entropy);
data/curl-7.72.0/lib/rand.c:80:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ssize_t nread = read(fd, &randseed, sizeof(randseed));
data/curl-7.72.0/lib/rtsp.c:507:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (data->set.postfields? (curl_off_t)strlen(data->set.postfields):0);
data/curl-7.72.0/lib/rtsp.c:790:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(data->set.str[STRING_RTSP_SESSION_ID]))  != 0) {
data/curl-7.72.0/lib/sendf.c:247:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(fmt);
data/curl-7.72.0/lib/sendf.c:254:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(print_buffer);
data/curl-7.72.0/lib/sendf.c:271:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(error);
data/curl-7.72.0/lib/sendf.c:304:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  write_len = strlen(s);
data/curl-7.72.0/lib/sendf.c:646:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(ptr);
data/curl-7.72.0/lib/setopt.c:65:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(str);
data/curl-7.72.0/lib/setopt.c:120:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = Curl_parse_login_details(option, strlen(option),
data/curl-7.72.0/lib/setopt.c:2673:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       strncasecompare(argptr, "SRP", strlen("SRP")))
data/curl-7.72.0/lib/setopt.c:2682:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       strncasecompare(argptr, "SRP", strlen("SRP")))
data/curl-7.72.0/lib/smb.c:128:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p += strlen(str);
data/curl-7.72.0/lib/smb.c:133:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p += strlen(str) + 1;
data/curl-7.72.0/lib/smb.c:440:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  byte_count += strlen(smbc->user) + strlen(smbc->domain);
data/curl-7.72.0/lib/smb.c:440:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  byte_count += strlen(smbc->user) + strlen(smbc->domain);
data/curl-7.72.0/lib/smb.c:441:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  byte_count += strlen(OS) + strlen(CLIENTNAME) + 4; /* 4 null chars */
data/curl-7.72.0/lib/smb.c:441:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  byte_count += strlen(OS) + strlen(CLIENTNAME) + 4; /* 4 null chars */
data/curl-7.72.0/lib/smb.c:485:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t byte_count = strlen(conn->host.name) + strlen(smbc->share);
data/curl-7.72.0/lib/smb.c:485:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t byte_count = strlen(conn->host.name) + strlen(smbc->share);
data/curl-7.72.0/lib/smb.c:486:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  byte_count += strlen(SERVICENAME) + 5; /* 2 nulls and 3 backslashes */
data/curl-7.72.0/lib/smb.c:512:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if((strlen(req->path) + 1) > sizeof(msg.bytes))
data/curl-7.72.0/lib/smb.c:518:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  byte_count = strlen(req->path);
data/curl-7.72.0/lib/smtp.c:244:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(buffer);
data/curl-7.72.0/lib/smtp.c:842:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(line);
data/curl-7.72.0/lib/smtp.c:994:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(line);
data/curl-7.72.0/lib/smtp.c:1762:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(dup);
data/curl-7.72.0/lib/socketpair.c:103:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  dlen = strlen(data[0]);
data/curl-7.72.0/lib/socks.c:317:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t plen = strlen(proxy_user);
data/curl-7.72.0/lib/socks.c:331:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen((char *)socksreq + 8); /* size including NUL */
data/curl-7.72.0/lib/socks.c:341:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        hostnamelen = strlen(hostname) + 1; /* length including NUL */
data/curl-7.72.0/lib/socks.c:515:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t hostname_len = strlen(hostname);
data/curl-7.72.0/lib/socks.c:664:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      proxy_user_len = strlen(proxy_user);
data/curl-7.72.0/lib/socks.c:665:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      proxy_password_len = strlen(proxy_password);
data/curl-7.72.0/lib/socks.c:800:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    destlen = strlen(dest);
data/curl-7.72.0/lib/socks_gssapi.c:126:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t serviceptr_length = strlen(serviceptr);
data/curl-7.72.0/lib/socks_gssapi.c:149:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           strlen(conn->socks_proxy.host.name) + 2);
data/curl-7.72.0/lib/socks_gssapi.c:153:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strlen(conn->socks_proxy.host.name) + 1;
data/curl-7.72.0/lib/socks_sspi.c:90:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t service_length = strlen(service);
data/curl-7.72.0/lib/socks_sspi.c:108:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          strlen(conn->socks_proxy.host.name) + 2);
data/curl-7.72.0/lib/socks_sspi.c:112:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(conn->socks_proxy.host.name) + 2, "%s/%s",
data/curl-7.72.0/lib/strcase.h:46:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define checkprefix(a,b)    curl_strnequal(a,b,strlen(a))
data/curl-7.72.0/lib/strdup.c:42:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(str) + 1;
data/curl-7.72.0/lib/strerror.c:639:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buf, p, len);
data/curl-7.72.0/lib/strerror.c:737:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, strerror(err), max);
data/curl-7.72.0/lib/strerror.c:770:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, msg, max);
data/curl-7.72.0/lib/strerror.c:782:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, buffer, max);
data/curl-7.72.0/lib/strerror.c:790:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, msg, max);
data/curl-7.72.0/lib/strerror.c:843:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, txt, buflen);
data/curl-7.72.0/lib/strerror.c:985:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, txtbuf, buflen);
data/curl-7.72.0/lib/strerror.c:995:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buf, txt, buflen);
data/curl-7.72.0/lib/system_win32.c:217:28:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t filenamelen = _tcslen(filename);
data/curl-7.72.0/lib/system_win32.c:221:24:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        _tcscpy(path + _tcslen(path), TEXT("\\"));
data/curl-7.72.0/lib/system_win32.c:222:24:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        _tcscpy(path + _tcslen(path), filename);
data/curl-7.72.0/lib/telnet.c:844:8:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    if(sscanf(head->data, "%127[^= ]%*[ =]%255s",
data/curl-7.72.0/lib/telnet.c:849:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(tn->subopt_ttype, option_arg, 31);
data/curl-7.72.0/lib/telnet.c:857:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(tn->subopt_xdisploc, option_arg, 127);
data/curl-7.72.0/lib/telnet.c:937:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(tn->subopt_ttype) + 4 + 2;
data/curl-7.72.0/lib/telnet.c:949:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(tn->subopt_xdisploc) + 4 + 2;
data/curl-7.72.0/lib/telnet.c:967:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t tmplen = (strlen(v->data) + 1);
data/curl-7.72.0/lib/telnet.c:970:14:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
          if(sscanf(v->data, "%127[^,],%127s", varname, varval)) {
data/curl-7.72.0/lib/telnet.c:1649:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          nread = read(pfd[1].fd, buf, data->set.buffer_size);
data/curl-7.72.0/lib/tftp.c:328:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *value = &buf[strlen(*option) + 1];
data/curl-7.72.0/lib/tftp.c:409:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(( strlen(option) + *csize + 1) > (size_t)state->blksize)
data/curl-7.72.0/lib/tftp.c:412:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *csize += strlen(option) + 1;
data/curl-7.72.0/lib/tftp.c:494:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(filename) > (state->blksize - strlen(mode) - 4)) {
data/curl-7.72.0/lib/tftp.c:494:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(filename) > (state->blksize - strlen(mode) - 4)) {
data/curl-7.72.0/lib/tftp.c:503:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sbytes = 4 + strlen(filename) + strlen(mode);
data/curl-7.72.0/lib/tftp.c:503:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sbytes = 4 + strlen(filename) + strlen(mode);
data/curl-7.72.0/lib/tftp.c:513:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(buf, "0"); /* the destination is large enough */
data/curl-7.72.0/lib/transfer.c:99:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t thislen = strlen(thisheader);
data/curl-7.72.0/lib/transfer.c:342:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(endofline_network));
data/curl-7.72.0/lib/transfer.c:389:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nread += strlen(endofline_network); /* for the added end of line */
data/curl-7.72.0/lib/transfer.c:1484:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      data->state.infilesize = (curl_off_t)strlen(data->set.postfields);
data/curl-7.72.0/lib/url.c:1483:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(host->name);
data/curl-7.72.0/lib/url.c:1970:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hlen = strlen(hostname);
data/curl-7.72.0/lib/url.c:2098:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    no_proxy_len = strlen(no_proxy);
data/curl-7.72.0/lib/url.c:2108:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      namelen = strlen(name);
data/curl-7.72.0/lib/url.c:2361:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(host);
data/curl-7.72.0/lib/url.c:2609:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t llen = strlen(login);
data/curl-7.72.0/lib/url.c:2990:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hostname_to_match_len = strlen(hostname_to_match);
data/curl-7.72.0/lib/urlapi.c:119:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sep = url + strlen(url);
data/curl-7.72.0/lib/urlapi.c:122:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    query = url + strlen(url);
data/curl-7.72.0/lib/urlapi.c:396:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  urllen = strlen(url_clone);
data/curl-7.72.0/lib/urlapi.c:589:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t n = strlen(part);
data/curl-7.72.0/lib/urlapi.c:602:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t hlen = strlen(hostname);
data/curl-7.72.0/lib/urlapi.c:686:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  urllen = strlen(url);
data/curl-7.72.0/lib/urlapi.c:700:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    schemelen = strlen(schemebuf);
data/curl-7.72.0/lib/urlapi.c:766:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memmove(path, &path[1], strlen(&path[1]) + 1);
data/curl-7.72.0/lib/urlapi.c:826:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(p);
data/curl-7.72.0/lib/urlapi.c:842:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *newp = malloc(strlen(path) * 3);
data/curl-7.72.0/lib/urlapi.c:911:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(0 == strlen(hostname) && (flags & CURLU_NO_AUTHORITY)) {
data/curl-7.72.0/lib/urlapi.c:1135:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t hostlen = strlen(u->host);
data/curl-7.72.0/lib/urlapi.c:1136:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t alen = hostlen + 3 + strlen(u->zoneid) + 1;
data/curl-7.72.0/lib/urlapi.c:1266:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(part) > MAX_SCHEME_LEN)
data/curl-7.72.0/lib/urlapi.c:1383:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t nalloc = strlen(part);
data/curl-7.72.0/lib/urlapi.c:1452:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t querylen = u->query ? strlen(u->query) : 0;
data/curl-7.72.0/lib/urlapi.c:1455:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t newplen = strlen(newp);
data/curl-7.72.0/lib/urlapi.c:1473:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if(0 == strlen(newp) && (flags & CURLU_NO_AUTHORITY)) {
data/curl-7.72.0/lib/vauth/cleartext.c:79:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  zlen = (authzid == NULL ? 0 : strlen(authzid));
data/curl-7.72.0/lib/vauth/cleartext.c:80:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  clen = strlen(authcid);
data/curl-7.72.0/lib/vauth/cleartext.c:81:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  plen = strlen(passwd);
data/curl-7.72.0/lib/vauth/cleartext.c:128:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t vlen = strlen(valuep);
data/curl-7.72.0/lib/vauth/cram.c:61:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t chlg64len = strlen(chlg64);
data/curl-7.72.0/lib/vauth/cram.c:104:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    chlglen = strlen(chlg);
data/curl-7.72.0/lib/vauth/cram.c:109:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        curlx_uztoui(strlen(passwdp)));
data/curl-7.72.0/lib/vauth/digest.c:65:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result = Curl_convert_to_network(a, b, strlen(b)); \
data/curl-7.72.0/lib/vauth/digest.c:206:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  find_pos += strlen(key);
data/curl-7.72.0/lib/vauth/digest.c:276:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t chlg64len = strlen(chlg64);
data/curl-7.72.0/lib/vauth/digest.c:300:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(realm, "");
data/curl-7.72.0/lib/vauth/digest.c:412:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(userp)));
data/curl-7.72.0/lib/vauth/digest.c:415:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(realm)));
data/curl-7.72.0/lib/vauth/digest.c:418:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(passwdp)));
data/curl-7.72.0/lib/vauth/digest.c:428:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(nonce)));
data/curl-7.72.0/lib/vauth/digest.c:431:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(cnonce)));
data/curl-7.72.0/lib/vauth/digest.c:452:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(method)));
data/curl-7.72.0/lib/vauth/digest.c:455:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(spn)));
data/curl-7.72.0/lib/vauth/digest.c:472:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(nonce)));
data/curl-7.72.0/lib/vauth/digest.c:476:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(nonceCount)));
data/curl-7.72.0/lib/vauth/digest.c:479:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(cnonce)));
data/curl-7.72.0/lib/vauth/digest.c:482:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  curlx_uztoui(strlen(qop)));
data/curl-7.72.0/lib/vauth/digest.c:717:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = Curl_base64_encode(data, cnoncebuf, strlen(cnoncebuf),
data/curl-7.72.0/lib/vauth/digest.c:731:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hash(hashbuf, (unsigned char *) hashthis, strlen(hashthis));
data/curl-7.72.0/lib/vauth/digest.c:753:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hash(hashbuf, (unsigned char *) hashthis, strlen(hashthis));
data/curl-7.72.0/lib/vauth/digest.c:766:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hash(hashbuf, (unsigned char *) tmp, strlen(tmp));
data/curl-7.72.0/lib/vauth/digest.c:805:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hash(hashbuf, (unsigned char *) hashthis, strlen(hashthis));
data/curl-7.72.0/lib/vauth/digest.c:821:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hash(hashbuf, (unsigned char *) hashthis, strlen(hashthis));
data/curl-7.72.0/lib/vauth/digest.c:914:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *outlen = strlen(response);
data/curl-7.72.0/lib/vauth/digest_sspi.c:118:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(chlg64) && *chlg64 != '=') {
data/curl-7.72.0/lib/vauth/digest_sspi.c:304:49:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          identity->DomainLength = curlx_uztoul(_tcslen(dup_domain.tchar_ptr));
data/curl-7.72.0/lib/vauth/digest_sspi.c:345:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t chlglen = strlen(chlg);
data/curl-7.72.0/lib/vauth/digest_sspi.c:475:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    chlg_buf[1].cbBuffer   = curlx_uztoul(strlen((const char *) request));
data/curl-7.72.0/lib/vauth/digest_sspi.c:478:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    chlg_buf[2].cbBuffer   = curlx_uztoul(strlen((const char *) uripath));
data/curl-7.72.0/lib/vauth/digest_sspi.c:573:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    chlg_buf[1].cbBuffer   = curlx_uztoul(strlen((const char *) request));
data/curl-7.72.0/lib/vauth/krb5_gssapi.c:113:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    spn_token.length = strlen(spn);
data/curl-7.72.0/lib/vauth/krb5_gssapi.c:232:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(chlg64) && *chlg64 != '=') {
data/curl-7.72.0/lib/vauth/krb5_sspi.c:302:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(chlg64) && *chlg64 != '=') {
data/curl-7.72.0/lib/vauth/krb5_sspi.c:407:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  messagelen = sizeof(outdata) + strlen(user_name) + 1;
data/curl-7.72.0/lib/vauth/ntlm.c:290:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(type2msg) && *type2msg != '=') {
data/curl-7.72.0/lib/vauth/ntlm.c:555:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userlen = strlen(user);
data/curl-7.72.0/lib/vauth/ntlm.c:564:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hostlen = strlen(host);
data/curl-7.72.0/lib/vauth/ntlm_sspi.c:215:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(type2msg) && *type2msg != '=') {
data/curl-7.72.0/lib/vauth/oauth2.c:82:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result = Curl_base64_encode(data, oauth, strlen(oauth), outptr, outlen);
data/curl-7.72.0/lib/vauth/oauth2.c:119:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result = Curl_base64_encode(data, xoauth, strlen(xoauth), outptr, outlen);
data/curl-7.72.0/lib/vauth/spnego_gssapi.c:112:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    spn_token.length = strlen(spn);
data/curl-7.72.0/lib/vauth/vauth.c:136:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    valid = (p != NULL && p > user && p < user + strlen(user) - 1 ? TRUE :
data/curl-7.72.0/lib/version.c:158:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(out, debugversion, sizeof(out)-1);
data/curl-7.72.0/lib/version.c:241:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t n = strlen(src[j]);
data/curl-7.72.0/lib/vquic/ngtcp2.c:548:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  gnutls_server_name_set(qs->ssl, GNUTLS_NAME_DNS, hostname, strlen(hostname));
data/curl-7.72.0/lib/vquic/ngtcp2.c:1461:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[0].namelen = strlen((char *)nva[0].name);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1479:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[1].namelen = strlen((char *)nva[1].name);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1485:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[2].namelen = strlen((char *)nva[2].name);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1490:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[2].valuelen = strlen((char *)nva[2].value);
data/curl-7.72.0/lib/vquic/ngtcp2.c:1520:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nva[i].namelen = strlen((char *)nva[i].name);
data/curl-7.72.0/lib/vquic/quiche.c:442:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  olen = strlen(headers->dest);
data/curl-7.72.0/lib/vquic/quiche.c:648:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[0].name_len = strlen((char *)nva[0].name);
data/curl-7.72.0/lib/vquic/quiche.c:665:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[1].name_len = strlen((char *)nva[1].name);
data/curl-7.72.0/lib/vquic/quiche.c:670:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[2].name_len = strlen((char *)nva[2].name);
data/curl-7.72.0/lib/vquic/quiche.c:675:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nva[2].value_len = strlen((char *)nva[2].value);
data/curl-7.72.0/lib/vquic/quiche.c:704:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nva[i].name_len = strlen((char *)nva[i].name);
data/curl-7.72.0/lib/vssh/libssh.c:396:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      knownkey.len = strlen(known_base64);
data/curl-7.72.0/lib/vssh/libssh.c:466:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    foundkey.len = strlen(found_base64);
data/curl-7.72.0/lib/vssh/libssh.c:1151:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        result = Curl_client_write(conn, CLIENTWRITE_HEADER, tmp, strlen(tmp));
data/curl-7.72.0/lib/vssh/libssh.c:1190:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(protop->path[strlen(protop->path)-1] == '/')
data/curl-7.72.0/lib/vssh/libssh.c:1243:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             (strlen(protop->path) > 1))) {
data/curl-7.72.0/lib/vssh/libssh.c:1335:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if(strlen(protop->path) > 1) {
data/curl-7.72.0/lib/vssh/libssh.c:1409:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sshc->readdir_len = strlen(sshc->readdir_filename);
data/curl-7.72.0/lib/vssh/libssh.c:1440:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          sshc->readdir_currLen = strlen(sshc->readdir_longentry);
data/curl-7.72.0/lib/vssh/libssh.c:1501:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          sshc->readdir_len = strlen(sshc->readdir_tmp);
data/curl-7.72.0/lib/vssh/libssh.c:1506:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sshc->readdir_len = strlen(sshc->readdir_link_attrs->name);
data/curl-7.72.0/lib/vssh/libssh.c:2641:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      Curl_debug(data, CURLINFO_HEADER_IN, tmp, strlen(tmp));
data/curl-7.72.0/lib/vssh/libssh.c:2646:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = Curl_client_write(conn, CLIENTWRITE_HEADER, tmp, strlen(tmp));
data/curl-7.72.0/lib/vssh/libssh2.c:97:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  libssh2_sftp_symlink_ex((s), (p), curlx_uztoui(strlen(p)),    \
data/curl-7.72.0/lib/vssh/libssh2.c:207:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    responses[0].length = curlx_uztoui(strlen(conn->passwd));
data/curl-7.72.0/lib/vssh/libssh2.c:629:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(pubkey_md5 && strlen(pubkey_md5) == 32) {
data/curl-7.72.0/lib/vssh/libssh2.c:705:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              kh_name_size = strlen(store->name) - 1 - strlen(kh_name_end);
data/curl-7.72.0/lib/vssh/libssh2.c:705:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              kh_name_size = strlen(store->name) - 1 - strlen(kh_name_end);
data/curl-7.72.0/lib/vssh/libssh2.c:866:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             curlx_uztoui(strlen(conn->user)));
data/curl-7.72.0/lib/vssh/libssh2.c:985:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                    strlen(conn->user)),
data/curl-7.72.0/lib/vssh/libssh2.c:1023:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        curlx_uztoui(strlen(conn->user)),
data/curl-7.72.0/lib/vssh/libssh2.c:1025:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        curlx_uztoui(strlen(conn->passwd)),
data/curl-7.72.0/lib/vssh/libssh2.c:1164:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                      strlen(conn->user)),
data/curl-7.72.0/lib/vssh/libssh2.c:1338:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          Curl_debug(data, CURLINFO_HEADER_IN, tmp, strlen(tmp));
data/curl-7.72.0/lib/vssh/libssh2.c:1343:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        result = Curl_client_write(conn, CLIENTWRITE_HEADER, tmp, strlen(tmp));
data/curl-7.72.0/lib/vssh/libssh2.c:1527:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  curlx_uztoui(strlen(sshc->quote_path2)),
data/curl-7.72.0/lib/vssh/libssh2.c:1598:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                curlx_uztoui(strlen(sshc->quote_path2)),
data/curl-7.72.0/lib/vssh/libssh2.c:1620:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                   curlx_uztoui(strlen(sshc->quote_path1)),
data/curl-7.72.0/lib/vssh/libssh2.c:1622:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                   curlx_uztoui(strlen(sshc->quote_path2)),
data/curl-7.72.0/lib/vssh/libssh2.c:1643:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 curlx_uztoui(strlen(sshc->quote_path1)),
data/curl-7.72.0/lib/vssh/libssh2.c:1663:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  curlx_uztoui(strlen(sshc->quote_path1)),
data/curl-7.72.0/lib/vssh/libssh2.c:1665:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  curlx_uztoui(strlen(sshc->quote_path2)),
data/curl-7.72.0/lib/vssh/libssh2.c:1689:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 curlx_uztoui(strlen(sshc->quote_path1)));
data/curl-7.72.0/lib/vssh/libssh2.c:1708:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  curlx_uztoui(strlen(sshc->quote_path1)));
data/curl-7.72.0/lib/vssh/libssh2.c:1729:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                curlx_uztoui(strlen(sshc->quote_path1)),
data/curl-7.72.0/lib/vssh/libssh2.c:1766:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        result = Curl_client_write(conn, CLIENTWRITE_HEADER, tmp, strlen(tmp));
data/curl-7.72.0/lib/vssh/libssh2.c:1794:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                curlx_uztoui(strlen(sftp_scp->path)),
data/curl-7.72.0/lib/vssh/libssh2.c:1811:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(sftp_scp->path[strlen(sftp_scp->path)-1] == '/')
data/curl-7.72.0/lib/vssh/libssh2.c:1832:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    curlx_uztoui(strlen(sftp_scp->path)),
data/curl-7.72.0/lib/vssh/libssh2.c:1863:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             curlx_uztoui(strlen(sftp_scp->path)),
data/curl-7.72.0/lib/vssh/libssh2.c:1892:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (strlen(sftp_scp->path) > 1))) {
data/curl-7.72.0/lib/vssh/libssh2.c:2002:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if(strlen(sftp_scp->path) > 1) {
data/curl-7.72.0/lib/vssh/libssh2.c:2026:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 curlx_uztoui(strlen(sftp_scp->path)),
data/curl-7.72.0/lib/vssh/libssh2.c:2067:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                 strlen(sftp_scp->path)),
data/curl-7.72.0/lib/vssh/libssh2.c:2255:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             curlx_uztoui(strlen(sftp_scp->path)),
data/curl-7.72.0/lib/vssh/libssh2.c:2280:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                curlx_uztoui(strlen(sftp_scp->path)),
data/curl-7.72.0/lib/vssh/wolfssh.c:345:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    authdata->sf.password.passwordSz = (word32) strlen(conn->passwd);
data/curl-7.72.0/lib/vssh/wolfssh.c:548:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(sftp_scp->path[strlen(sftp_scp->path)-1] == '/')
data/curl-7.72.0/lib/vssh/wolfssh.c:861:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                     line, strlen(line));
data/curl-7.72.0/lib/vtls/gskit.c:332:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(cipherlist) + 1;
data/curl-7.72.0/lib/vtls/gskit.c:368:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          ciphers[i].ptr += strlen(ctp->gsktoken);
data/curl-7.72.0/lib/vtls/gskit.c:575:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = read(BACKEND->remotefd, buf, sizeof(buf));
data/curl-7.72.0/lib/vtls/gskit.c:1205:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    nread = read(conn->sock[sockindex], buf, sizeof(buf));
data/curl-7.72.0/lib/vtls/gtls.c:549:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen(hostname)) < 0))
data/curl-7.72.0/lib/vtls/gtls.c:595:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(prioritylist);
data/curl-7.72.0/lib/vtls/keylog.c:96:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  linelen = strlen(line);
data/curl-7.72.0/lib/vtls/keylog.c:128:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pos = strlen(label);
data/curl-7.72.0/lib/vtls/mesalink.c:103:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t hostname_len = strlen(hostname);
data/curl-7.72.0/lib/vtls/nss.c:475:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                (CK_ULONG)strlen(filename) + 1);
data/curl-7.72.0/lib/vtls/openssl.c:339:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, (error ? "Unknown error" : "No error"), size);
data/curl-7.72.0/lib/vtls/openssl.c:377:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int klen = curlx_uztosi(strlen((char *)global_passwd));
data/curl-7.72.0/lib/vtls/openssl.c:1506:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                strlen(match_pattern2)) == CURLE_OK) {
data/curl-7.72.0/lib/vtls/openssl.c:1643:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if((altlen == strlen(altptr)) &&
data/curl-7.72.0/lib/vtls/openssl.c:1720:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(peer_CN && (curlx_uztosi(strlen((char *)peer_CN)) != j)) {
data/curl-7.72.0/lib/vtls/openssl.c:1734:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                           strlen((char *)peer_CN));
data/curl-7.72.0/lib/vtls/openssl.c:4147:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(error_buffer, SSL_ERROR_to_str(err), sizeof(error_buffer));
data/curl-7.72.0/lib/vtls/openssl.c:4237:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(error_buffer, SSL_ERROR_to_str(err), sizeof(error_buffer));
data/curl-7.72.0/lib/vtls/schannel.c:209:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    min(strlen(name), LONGEST_ALG_ID - 1);
data/curl-7.72.0/lib/vtls/schannel.c:210:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, name, n);
data/curl-7.72.0/lib/vtls/schannel.c:398:6:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(_tcslen(*thumbprint) != CERT_THUMBPRINT_STR_LEN)
data/curl-7.72.0/lib/vtls/schannel.c:678:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          pwd_len = strlen(data->set.ssl.key_passwd);
data/curl-7.72.0/lib/vtls/schannel_verify.c:186:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  END_CERT_LEN = strlen(END_CERT);
data/curl-7.72.0/lib/vtls/schannel_verify.c:192:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(!begin_cert_ptr || !is_cr_or_lf(begin_cert_ptr[strlen(BEGIN_CERT)])) {
data/curl-7.72.0/lib/vtls/schannel_verify.c:397:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    current_length = wcslen(entry->pwszDNSName) + 1;
data/curl-7.72.0/lib/vtls/schannel_verify.c:503:29:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cert_hostname_len = _tcslen(
data/curl-7.72.0/lib/vtls/sectransp.c:213:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rrtn = read(sock, currData, bytesToGo);
data/curl-7.72.0/lib/vtls/sectransp.c:1010:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  attr.length = (UInt32)strlen(label);
data/curl-7.72.0/lib/vtls/sectransp.c:1155:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                              strlen(cPath), false);
data/curl-7.72.0/lib/vtls/sectransp.c:1650:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(SSL_SET_OPTION(cert_type))) != 0)
data/curl-7.72.0/lib/vtls/sectransp.c:1793:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strlen(hostname));
data/curl-7.72.0/lib/vtls/sectransp.c:1967:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ssl_sessionid_len = strlen(ssl_sessionid);
data/curl-7.72.0/lib/vtls/sectransp.c:2073:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = read(fd, buf, sizeof(buf));
data/curl-7.72.0/lib/vtls/sectransp.c:3025:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    nread = read(conn->sock[sockindex], buf, sizeof(buf));
data/curl-7.72.0/lib/vtls/vtls.c:764:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t labellen = strlen(label);
data/curl-7.72.0/lib/vtls/vtls.c:800:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t valuelen = strlen(value);
data/curl-7.72.0/lib/vtls/vtls.c:921:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pinkeylen = strlen(pinnedpubkey) + 1;
data/curl-7.72.0/lib/vtls/vtls.c:940:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if(encodedlen == strlen(begin_pos + 8) &&
data/curl-7.72.0/lib/vtls/vtls.c:1337:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer, backends, size - 1);
data/curl-7.72.0/lib/vtls/wolfssl.c:425:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t hostname_len = strlen(hostname);
data/curl-7.72.0/lib/vtls/wolfssl.c:477:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strcpy(protocols + strlen(protocols), NGHTTP2_PROTO_VERSION_ID ",");
data/curl-7.72.0/lib/vtls/wolfssl.c:482:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strcpy(protocols + strlen(protocols), ALPN_HTTP_1_1);
data/curl-7.72.0/lib/vtls/wolfssl.c:486:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       (unsigned)strlen(protocols),
data/curl-7.72.0/lib/warnless.c:448:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return (ssize_t)read(fd, buf, curlx_uztoui(count));
data/curl-7.72.0/lib/warnless.h:77:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  undef  read
data/curl-7.72.0/lib/warnless.h:78:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define read(fd, buf, count)  curlx_read(fd, buf, count)
data/curl-7.72.0/lib/x509asn1.c:1208:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if(len > 0 && (size_t)len == strlen(dnsname))
data/curl-7.72.0/lib/x509asn1.c:1266:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(dnsname) != (size_t) len)         /* Nul byte in string ? */
data/curl-7.72.0/packages/OS400/ccsidcurl.c:130:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lslen = slen >= 0? slen: strlen(s) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:175:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  dlen = (size_t) (slen < 0? strlen(s): slen) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:254:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(aversion) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:327:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *outlength = strlen(s);
data/curl-7.72.0/packages/OS400/ccsidcurl.c:437:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n += strlen(p->protocols[nproto++]);
data/curl-7.72.0/packages/OS400/ccsidcurl.c:443:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(p->version) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:446:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(p->host) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:449:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(p->ssl_version) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:452:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(p->libz_version) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:455:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(p->ares) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:458:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(p->libidn) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:461:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(p->libssh_version) + 1;
data/curl-7.72.0/packages/OS400/ccsidcurl.c:533:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = MAX_CONV_EXPANSION * (strlen(s) + 1);
data/curl-7.72.0/packages/OS400/ccsidcurl.c:559:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = MAX_CONV_EXPANSION * (strlen(s) + 1);
data/curl-7.72.0/packages/OS400/ccsidcurl.c:585:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = MAX_CONV_EXPANSION * (strlen(s) + 1);
data/curl-7.72.0/packages/OS400/ccsidcurl.c:766:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(forms[formx].value) + 1;
data/curl-7.72.0/packages/OS400/os400sys.c:252:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(s) + 1;
data/curl-7.72.0/packages/OS400/os400sys.c:296:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nodenamelen - 1, strlen(enodename));
data/curl-7.72.0/packages/OS400/os400sys.c:302:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        servnamelen - 1, strlen(eservname));
data/curl-7.72.0/packages/OS400/os400sys.c:328:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(nodename);
data/curl-7.72.0/packages/OS400/os400sys.c:339:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(servname);
data/curl-7.72.0/packages/OS400/os400sys.c:533:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bufSize = strlen(buffer);
data/curl-7.72.0/packages/OS400/os400sys.c:950:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(host);
data/curl-7.72.0/packages/OS400/os400sys.c:976:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(dn);
data/curl-7.72.0/packages/OS400/os400sys.c:987:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(passwd);
data/curl-7.72.0/packages/OS400/os400sys.c:1024:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(base);
data/curl-7.72.0/packages/OS400/os400sys.c:1036:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(filter);
data/curl-7.72.0/packages/OS400/os400sys.c:1056:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i = strlen(attrs[j]);
data/curl-7.72.0/packages/OS400/os400sys.c:1098:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int i = strlen(attr);
data/curl-7.72.0/packages/OS400/os400sys.c:1142:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(cp);
data/curl-7.72.0/packages/OS400/os400sys.c:1175:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(cp);
data/curl-7.72.0/packages/OS400/os400sys.c:1208:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(cp);
data/curl-7.72.0/packages/vms/curl_crtl_init.c:124:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_dsc.dsc$w_length = strlen(logname);
data/curl-7.72.0/packages/vms/curl_crtl_init.c:153:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    proc_table_dsc.dsc$w_length = strlen(proc_table);
data/curl-7.72.0/packages/vms/curl_crtl_init.c:158:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    logname_dsc.dsc$w_length = strlen(logname);
data/curl-7.72.0/packages/vms/curl_crtl_init.c:162:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    item_list[0].buflen = strlen(value);
data/curl-7.72.0/packages/vms/report_openssl_version.c:84:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      symbol_dsc.dsc$w_length = strlen(argv[2]);
data/curl-7.72.0/packages/vms/report_openssl_version.c:89:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      value_dsc.dsc$w_length = strlen(version);
data/curl-7.72.0/src/tool_cb_hdr.c:295:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(copy, p, strlen(p) + 1);
data/curl-7.72.0/src/tool_cb_prg.c:228:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((endptr != colp) && (endptr == colp + strlen(colp)) && (num > 20) &&
data/curl-7.72.0/src/tool_cb_rea.c:43:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  rc = read(in->fd, buffer, sz*nmemb);
data/curl-7.72.0/src/tool_dirhie.c:111:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  outlen = strlen(outfile);
data/curl-7.72.0/src/tool_dirhie.c:133:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t dlen = strlen(dirbuildup);
data/curl-7.72.0/src/tool_doswin.c:141:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(file_name);
data/curl-7.72.0/src/tool_doswin.c:154:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(target, file_name, len);
data/curl-7.72.0/src/tool_doswin.c:208:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(target);
data/curl-7.72.0/src/tool_doswin.c:222:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(target);
data/curl-7.72.0/src/tool_doswin.c:267:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(path);
data/curl-7.72.0/src/tool_doswin.c:332:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(file_name) > PATH_MAX-1 &&
data/curl-7.72.0/src/tool_doswin.c:482:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(file_name);
data/curl-7.72.0/src/tool_doswin.c:486:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(*sanitized, file_name, len + 1);
data/curl-7.72.0/src/tool_doswin.c:491:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strlen(file_name) > PATH_MAX-1 &&
data/curl-7.72.0/src/tool_doswin.c:496:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(fname, file_name, PATH_MAX-1);
data/curl-7.72.0/src/tool_doswin.c:539:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p_len = strlen(p);
data/curl-7.72.0/src/tool_doswin.c:542:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(fname) == PATH_MAX-1) {
data/curl-7.72.0/src/tool_doswin.c:566:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t blen = strlen(base);
data/curl-7.72.0/src/tool_doswin.c:568:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if(strlen(fname) == PATH_MAX-1) {
data/curl-7.72.0/src/tool_formparse.c:274:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t size = strlen(m->data);
data/curl-7.72.0/src/tool_formparse.c:425:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int c = getc(fp);
data/curl-7.72.0/src/tool_formparse.c:529:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      p = type + strlen(type_major) + strlen(type_minor) + 1;
data/curl-7.72.0/src/tool_formparse.c:529:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      p = type + strlen(type_major) + strlen(type_minor) + 1;
data/curl-7.72.0/src/tool_getparam.c:346:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t param_length = strlen(cert_parameter);
data/curl-7.72.0/src/tool_getparam.c:375:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(certname_place, param_place, span);
data/curl-7.72.0/src/tool_getparam.c:469:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if(strlen(unit) > 1)
data/curl-7.72.0/src/tool_getparam.c:528:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t fnam = strlen(word);
data/curl-7.72.0/src/tool_getparam.c:969:16:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
          rc = sscanf(p, " - %6s", lrange);
data/curl-7.72.0/src/tool_getparam.c:1381:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size = strlen(postdata);
data/curl-7.72.0/src/tool_getparam.c:1398:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t outlen = nlen + strlen(enc) + 2;
data/curl-7.72.0/src/tool_getparam.c:1442:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size = strlen(postdata);
data/curl-7.72.0/src/tool_getparam.c:1461:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size = strlen(postdata);
data/curl-7.72.0/src/tool_getparam.c:1467:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(convert_to_network(postdata, strlen(postdata))) {
data/curl-7.72.0/src/tool_getparam.c:1562:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(!config->hostpubmd5 || strlen(config->hostpubmd5) != 32)
data/curl-7.72.0/src/tool_getpass.c:91:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   prompt, strlen(prompt));
data/curl-7.72.0/src/tool_getpass.c:104:19:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define getch() getchar()
data/curl-7.72.0/src/tool_getpass.c:239:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  nread = read(fd, password, buflen);
data/curl-7.72.0/src/tool_main.c:111:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(env) >= CURL_MT_LOGFNAME_BUFSIZE)
data/curl-7.72.0/src/tool_main.c:125:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((endptr != env) && (endptr == env + strlen(env)) && (num > 0))
data/curl-7.72.0/src/tool_metalink.c:566:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t len = read(fd, buf, sizeof(buf));
data/curl-7.72.0/src/tool_metalink.c:618:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(hex_digest);
data/curl-7.72.0/src/tool_metalink.c:858:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t media_type_len = strlen(media_type);
data/curl-7.72.0/src/tool_msgs.c:42:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t width = (79 - strlen(prefix));
data/curl-7.72.0/src/tool_msgs.c:51:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(print_buffer);
data/curl-7.72.0/src/tool_operate.c:1561:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if(config->cert && (strlen(config->cert) > 8) &&
data/curl-7.72.0/src/tool_operate.c:1604:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if(config->key && (strlen(config->key) > 8) &&
data/curl-7.72.0/src/tool_panykey.c:41:3:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  getchar();
data/curl-7.72.0/src/tool_paramhlp.c:80:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buflen = strlen(buffer);
data/curl-7.72.0/src/tool_paramhlp.c:163:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(str);
data/curl-7.72.0/src/tool_paramhlp.c:189:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((endptr != str) && (endptr == str + strlen(str))) {
data/curl-7.72.0/src/tool_paramhlp.c:264:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((endptr != str) && (endptr == str + strlen(str))) {
data/curl-7.72.0/src/tool_paramhlp.c:457:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if((endptr != str) && (endptr == str + strlen(str)))
data/curl-7.72.0/src/tool_paramhlp.c:485:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t userlen = strlen(*userpwd);
data/curl-7.72.0/src/tool_paramhlp.c:503:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    passwdlen = strlen(passwd);
data/curl-7.72.0/src/tool_parsecfg.c:60:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      remaining = sizeof(filebuffer) - strlen(filebuffer);
data/curl-7.72.0/src/tool_parsecfg.c:61:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if(strlen(filename) < remaining - 1) {
data/curl-7.72.0/src/tool_parsecfg.c:190:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        param = malloc(strlen(line) + 1); /* parameter */
data/curl-7.72.0/src/tool_parsecfg.c:357:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t linelen = strlen(line);
data/curl-7.72.0/src/tool_parsecfg.c:358:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ptr = realloc(line, linelen + strlen(buf) + 1);
data/curl-7.72.0/src/tool_setopt.c:229:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/curl-7.72.0/src/tool_setopt.c:335:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msnprintf(preamble, sizeof(preamble), "%*s", strlen(preamble), "");
data/curl-7.72.0/src/tool_setopt.c:378:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msnprintf(preamble, sizeof(preamble), "%*s", strlen(preamble), "");
data/curl-7.72.0/src/tool_setopt.c:464:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t size = strlen(part->data);
data/curl-7.72.0/src/tool_strdup.c:33:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(str) + 1;
data/curl-7.72.0/src/tool_urlglob.c:451:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glob_buffer = malloc(strlen(url) + 1);
data/curl-7.72.0/src/tool_urlglob.c:461:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glob_expand->urllen = strlen(url);
data/curl-7.72.0/src/tool_urlglob.c:577:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/curl-7.72.0/src/tool_urlglob.c:593:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(buf);
data/curl-7.72.0/src/tool_urlglob.c:625:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  allocsize = strlen(filename) + 1; /* make it at least one byte to store the
data/curl-7.72.0/src/tool_urlglob.c:655:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(pat->content.Set.elements[pat->content.Set.ptr_s]);
data/curl-7.72.0/src/tool_urlglob.c:669:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          appendlen = strlen(numbuf);
data/curl-7.72.0/src/tool_writeout_json.c:44:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char *in_end = in + strlen(in);
data/curl-7.72.0/src/tool_xattr.c:110:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        err = fsetxattr(fd, mappings[i].attr, value, strlen(value), 0, 0);
data/curl-7.72.0/src/tool_xattr.c:112:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        err = fsetxattr(fd, mappings[i].attr, value, strlen(value), 0);
data/curl-7.72.0/src/tool_xattr.c:116:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      mappings[i].attr, value, strlen(value));
data/curl-7.72.0/tests/libtest/first.c:95:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(env) >= CURL_MT_LOGFNAME_BUFSIZE)
data/curl-7.72.0/tests/libtest/first.c:109:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((endptr != env) && (endptr == env + strlen(env)) && (num > 0))
data/curl-7.72.0/tests/libtest/lib1517.c:62:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pooh.sizeleft = strlen(data);
data/curl-7.72.0/tests/libtest/lib1520.c:62:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(data);
data/curl-7.72.0/tests/libtest/lib1525.c:38:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(amount < strlen(data)) {
data/curl-7.72.0/tests/libtest/lib1525.c:39:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(data);
data/curl-7.72.0/tests/libtest/lib1525.c:42:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(ptr, data, strlen(data));
data/curl-7.72.0/tests/libtest/lib1525.c:43:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(data);
data/curl-7.72.0/tests/libtest/lib1525.c:85:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  test_setopt(curl, CURLOPT_INFILESIZE, (long)strlen(data));
data/curl-7.72.0/tests/libtest/lib1526.c:37:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(amount < strlen(data)) {
data/curl-7.72.0/tests/libtest/lib1526.c:38:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(data);
data/curl-7.72.0/tests/libtest/lib1526.c:41:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(ptr, data, strlen(data));
data/curl-7.72.0/tests/libtest/lib1526.c:42:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(data);
data/curl-7.72.0/tests/libtest/lib1526.c:88:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  test_setopt(curl, CURLOPT_INFILESIZE, (long)strlen(data));
data/curl-7.72.0/tests/libtest/lib1527.c:37:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(amount < strlen(data)) {
data/curl-7.72.0/tests/libtest/lib1527.c:38:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(data);
data/curl-7.72.0/tests/libtest/lib1527.c:41:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(ptr, data, strlen(data));
data/curl-7.72.0/tests/libtest/lib1527.c:42:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(data);
data/curl-7.72.0/tests/libtest/lib1527.c:86:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  test_setopt(curl, CURLOPT_INFILESIZE, (long)strlen(data));
data/curl-7.72.0/tests/libtest/lib1537.c:56:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  raw = curl_easy_unescape(NULL, ptr, (int)strlen(ptr), &outlen);
data/curl-7.72.0/tests/libtest/lib1537.c:63:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  raw = curl_unescape(ptr, (int)strlen(ptr));
data/curl-7.72.0/tests/libtest/lib1537.c:68:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  outlen = (int)strlen(raw);
data/curl-7.72.0/tests/libtest/lib1560.c:75:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(bufp);
data/curl-7.72.0/tests/libtest/lib1591.c:39:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(consumed == strlen(data)) {
data/curl-7.72.0/tests/libtest/lib1591.c:43:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(amount > strlen(data)-consumed) {
data/curl-7.72.0/tests/libtest/lib1591.c:44:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    amount = strlen(data);
data/curl-7.72.0/tests/libtest/lib1900.c:66:8:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    if(fscanf(f, "%d %199s\n", &filetime, buf)) {
data/curl-7.72.0/tests/libtest/lib1900.c:73:8:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    if(fscanf(f, "blocklist_site %199s\n", buf)) {
data/curl-7.72.0/tests/libtest/lib508.c:58:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pooh.sizeleft = strlen(data);
data/curl-7.72.0/tests/libtest/lib510.c:50:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(data);
data/curl-7.72.0/tests/libtest/lib547.c:55:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(size * nmemb > strlen(UPLOADTHIS)) {
data/curl-7.72.0/tests/libtest/lib547.c:58:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(UPLOADTHIS);
data/curl-7.72.0/tests/libtest/lib547.c:114:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  test_setopt(curl, CURLOPT_POSTFIELDSIZE, (long)strlen(UPLOADTHIS));
data/curl-7.72.0/tests/libtest/lib554.c:79:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pooh.sizeleft = strlen(data);
data/curl-7.72.0/tests/libtest/lib554.c:109:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pooh2.sizeleft = strlen(data);
data/curl-7.72.0/tests/libtest/lib555.c:62:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(size * nmemb > strlen(uploadthis)) {
data/curl-7.72.0/tests/libtest/lib555.c:65:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(uploadthis);
data/curl-7.72.0/tests/libtest/lib555.c:109:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  easy_setopt(curl, CURLOPT_POSTFIELDSIZE, (long)strlen(uploadthis));
data/curl-7.72.0/tests/libtest/lib556.c:75:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    res = curl_easy_send(curl, request, strlen(request), &iolen);
data/curl-7.72.0/tests/libtest/lib557.c:212:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(us_test[i].expected))) {
data/curl-7.72.0/tests/libtest/lib557.c:382:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(ss_test[i].expected))) {
data/curl-7.72.0/tests/libtest/lib557.c:532:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(ui_test[i].expected))) {
data/curl-7.72.0/tests/libtest/lib557.c:760:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(si_test[i].expected))) {
data/curl-7.72.0/tests/libtest/lib557.c:909:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(ul_test[i].expected))) {
data/curl-7.72.0/tests/libtest/lib557.c:1137:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(sl_test[i].expected))) {
data/curl-7.72.0/tests/libtest/lib557.c:1366:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(co_test[i].expected))) {
data/curl-7.72.0/tests/libtest/lib557.c:1396:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t buflen = strlen(buf);
data/curl-7.72.0/tests/libtest/lib579.c:78:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(data);
data/curl-7.72.0/tests/libtest/lib582.c:41:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  struct Sockets read, write;
data/curl-7.72.0/tests/libtest/lib582.c:114:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    addFd(&sockets->read, s, "read");
data/curl-7.72.0/tests/libtest/lib582.c:120:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    removeFd(&sockets->read, s, 1);
data/curl-7.72.0/tests/libtest/lib582.c:308:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    updateFdSet(&sockets.read, &readSet, &maxFd);
data/curl-7.72.0/tests/libtest/lib582.c:324:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    checkFdSet(m, &sockets.read, &readSet, CURL_CSELECT_IN, "read");
data/curl-7.72.0/tests/libtest/lib582.c:353:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  free(sockets.read.sockets);
data/curl-7.72.0/tests/libtest/lib643.c:93:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  datasize = (curl_off_t)strlen(data);
data/curl-7.72.0/tests/libtest/lib643.c:148:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  datasize = (curl_off_t)strlen(data);
data/curl-7.72.0/tests/libtest/lib650.c:98:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  contentlength = (long)(strlen(data) - 1);
data/curl-7.72.0/tests/libtest/lib650.c:110:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        CURLFORM_NAMELENGTH, strlen(name) - 1,
data/curl-7.72.0/tests/libtest/lib654.c:102:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pooh.sizeleft = (curl_off_t) strlen(data);
data/curl-7.72.0/tests/libtest/lib667.c:92:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pooh.sizeleft = (curl_off_t) strlen(data);
data/curl-7.72.0/tests/libtest/lib668.c:42:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(pooh->readptr);
data/curl-7.72.0/tests/libtest/lib668.c:86:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pooh1.sizeleft = (curl_off_t) strlen(data);
data/curl-7.72.0/tests/libtest/lib668.c:94:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  curl_mime_data_cb(part, (curl_off_t) strlen(data),
data/curl-7.72.0/tests/libtest/libauthretry.c:34:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(url) + 4 + 1;
data/curl-7.72.0/tests/libtest/libntlmconnect.c:95:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t urllen = strlen(url) + 4 + 1;
data/curl-7.72.0/tests/libtest/sethostname.c:34:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, force_hostname, namelen);
data/curl-7.72.0/tests/libtest/stub_gssapi.c:104:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(!creds || strlen(creds) >= MAX_CREDS_LENGTH) {
data/curl-7.72.0/tests/libtest/stub_gssapi.c:339:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      status_string->length = strlen(status_string->value);
data/curl-7.72.0/tests/server/fake_ntlm.c:63:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    inlength = strlen(inbuf);
data/curl-7.72.0/tests/server/fake_ntlm.c:164:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((endptr != env + strlen(env)) || (lnum < 1L)) {
data/curl-7.72.0/tests/server/fake_ntlm.c:243:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    else if(strncmp(buf, type3_input, strlen(type3_input)) == 0) {
data/curl-7.72.0/tests/server/getpart.c:135:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = offset + strlen(*buffer + offset);
data/curl-7.72.0/tests/server/getpart.c:185:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t src_len = strlen(src_buf);
data/curl-7.72.0/tests/server/mqttd.c:153:15:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
      if(2 == sscanf(buffer, "%31s %31s", key, value)) {
data/curl-7.72.0/tests/server/mqttd.c:391:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t topiclen = strlen(topic);
data/curl-7.72.0/tests/server/mqttd.c:604:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        publish(dump, fd, packet_id, topic, def, strlen(def));
data/curl-7.72.0/tests/server/mqttd.c:917:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if((endptr != argv[arg] + strlen(argv[arg])) ||
data/curl-7.72.0/tests/server/rtspd.c:220:6:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
     sscanf(line,
data/curl-7.72.0/tests/server/rtspd.c:250:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if((strlen(doc) + strlen(request)) < 200)
data/curl-7.72.0/tests/server/rtspd.c:250:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if((strlen(doc) + strlen(request)) < 200)
data/curl-7.72.0/tests/server/rtspd.c:321:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if(!strncmp(CMD_AUTH_REQUIRED, ptr, strlen(CMD_AUTH_REQUIRED))) {
data/curl-7.72.0/tests/server/rtspd.c:325:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            else if(!strncmp(CMD_IDLE, ptr, strlen(CMD_IDLE))) {
data/curl-7.72.0/tests/server/rtspd.c:330:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            else if(!strncmp(CMD_STREAM, ptr, strlen(CMD_STREAM))) {
data/curl-7.72.0/tests/server/rtspd.c:447:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    req->checkindex += (end - line) + strlen(END_OF_HEADERS);
data/curl-7.72.0/tests/server/rtspd.c:491:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen("Transfer-Encoding: chunked"))) {
data/curl-7.72.0/tests/server/rtspd.c:556:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     req->reqbuf + req->offset > end + strlen(END_OF_HEADERS) &&
data/curl-7.72.0/tests/server/rtspd.c:557:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     (!strncmp(req->reqbuf, "GET", strlen("GET")) ||
data/curl-7.72.0/tests/server/rtspd.c:558:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      !strncmp(req->reqbuf, "HEAD", strlen("HEAD")))) {
data/curl-7.72.0/tests/server/rtspd.c:561:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    req->checkindex = (end - req->reqbuf) + strlen(END_OF_HEADERS);
data/curl-7.72.0/tests/server/rtspd.c:573:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    req->checkindex += (end - line) + strlen(END_OF_HEADERS);
data/curl-7.72.0/tests/server/rtspd.c:585:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(req->cl <= req->offset - (end - req->reqbuf) - strlen(END_OF_HEADERS))
data/curl-7.72.0/tests/server/rtspd.c:784:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    count = strlen(STREAMTHIS);
data/curl-7.72.0/tests/server/rtspd.c:816:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      msglen = strlen(msgbuf);
data/curl-7.72.0/tests/server/rtspd.c:845:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    count = strlen(buffer);
data/curl-7.72.0/tests/server/rtspd.c:1003:15:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
      if(2 == sscanf(ptr, "%31s %d", command, &num)) {
data/curl-7.72.0/tests/server/sockfilt.c:164:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(fd, buf, count);
data/curl-7.72.0/tests/server/sockfilt.c:180:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef  read
data/curl-7.72.0/tests/server/sockfilt.c:181:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define read(a,b,c) read_wincon(a,b,c)
data/curl-7.72.0/tests/server/sockfilt.c:232:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t rc = read(filedes,
data/curl-7.72.0/tests/server/sockfilt.c:1049:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buffer_len = (ssize_t)strlen((char *)buffer);
data/curl-7.72.0/tests/server/sockfilt.c:1390:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if((endptr != argv[arg] + strlen(argv[arg])) ||
data/curl-7.72.0/tests/server/socksd.c:185:15:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
      if(2 == sscanf(buffer, "%31s %31s", key, value)) {
data/curl-7.72.0/tests/server/socksd.c:441:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((ulen != strlen(config.user)) ||
data/curl-7.72.0/tests/server/socksd.c:442:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (plen != strlen(config.password)) ||
data/curl-7.72.0/tests/server/sws.c:292:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if(!strncmp(CMD_AUTH_REQUIRED, cmd, strlen(CMD_AUTH_REQUIRED))) {
data/curl-7.72.0/tests/server/sws.c:296:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      else if(!strncmp(CMD_IDLE, cmd, strlen(CMD_IDLE))) {
data/curl-7.72.0/tests/server/sws.c:301:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      else if(!strncmp(CMD_STREAM, cmd, strlen(CMD_STREAM))) {
data/curl-7.72.0/tests/server/sws.c:306:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(CMD_CONNECTIONMONITOR))) {
data/curl-7.72.0/tests/server/sws.c:310:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      else if(!strncmp(CMD_UPGRADE, cmd, strlen(CMD_UPGRADE))) {
data/curl-7.72.0/tests/server/sws.c:314:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      else if(!strncmp(CMD_SWSCLOSE, cmd, strlen(CMD_SWSCLOSE))) {
data/curl-7.72.0/tests/server/sws.c:322:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      else if(!strncmp(CMD_NOEXPECT, cmd, strlen(CMD_NOEXPECT))) {
data/curl-7.72.0/tests/server/sws.c:399:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if((strlen(doc) + strlen(request)) < 400)
data/curl-7.72.0/tests/server/sws.c:399:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if((strlen(doc) + strlen(request)) < 400)
data/curl-7.72.0/tests/server/sws.c:651:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen("Transfer-Encoding: chunked"))) {
data/curl-7.72.0/tests/server/sws.c:657:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen("Expect: 100-continue"))) {
data/curl-7.72.0/tests/server/sws.c:752:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     req->reqbuf + req->offset > end + strlen(end_of_headers) &&
data/curl-7.72.0/tests/server/sws.c:754:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     (!strncmp(req->reqbuf, "GET", strlen("GET")) ||
data/curl-7.72.0/tests/server/sws.c:755:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      !strncmp(req->reqbuf, "HEAD", strlen("HEAD")))) {
data/curl-7.72.0/tests/server/sws.c:758:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    req->checkindex = (end - req->reqbuf) + strlen(end_of_headers);
data/curl-7.72.0/tests/server/sws.c:777:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(req->cl <= req->offset - (end - req->reqbuf) - strlen(end_of_headers))
data/curl-7.72.0/tests/server/sws.c:969:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    count = strlen(STREAMTHIS);
data/curl-7.72.0/tests/server/sws.c:1000:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      msglen = strlen(msgbuf);
data/curl-7.72.0/tests/server/sws.c:1016:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    count = strlen(buffer);
data/curl-7.72.0/tests/server/sws.c:1173:15:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
      if(2 == sscanf(ptr, "%31s %d", command, &num)) {
data/curl-7.72.0/tests/server/sws.c:1947:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(strlen(unix_socket) >= sizeof(me.sau.sun_path)) {
data/curl-7.72.0/tests/server/sws.c:1964:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if((endptr != argv[arg] + strlen(argv[arg])) ||
data/curl-7.72.0/tests/server/sws.c:2067:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(me.sau.sun_path, unix_socket, sizeof(me.sau.sun_path) - 1);
data/curl-7.72.0/tests/server/sws.c:2291:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              storerequest(keepopen, strlen(keepopen));
data/curl-7.72.0/tests/server/tftpd.c:1352:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = (int)strlen(pe->e_msg);
data/curl-7.72.0/tests/unit/unit1304.c:54:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(filename, filename1, strlen(filename1));
data/curl-7.72.0/tests/unit/unit1305.c:125:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    key_len = strlen(data_key);
data/curl-7.72.0/tests/unit/unit1396.c:105:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    outlen = (int)strlen(out);
data/curl-7.72.0/tests/unit/unit1601.c:44:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Curl_md5it(output, (const unsigned char *) string1, strlen(string1));
data/curl-7.72.0/tests/unit/unit1601.c:49:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Curl_md5it(output, (const unsigned char *) string2, strlen(string2));
data/curl-7.72.0/tests/unit/unit1603.c:63:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(Curl_hash_str(key1, strlen(key1), slots) != 1 ||
data/curl-7.72.0/tests/unit/unit1603.c:64:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     Curl_hash_str(key2, strlen(key2), slots) != 0 ||
data/curl-7.72.0/tests/unit/unit1603.c:65:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     Curl_hash_str(key3, strlen(key3), slots) != 2 ||
data/curl-7.72.0/tests/unit/unit1603.c:66:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     Curl_hash_str(key4, strlen(key4), slots) != 1)
data/curl-7.72.0/tests/unit/unit1603.c:70:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_add(&hash_static, &key1, strlen(key1), &key1);
data/curl-7.72.0/tests/unit/unit1603.c:72:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key1, strlen(key1));
data/curl-7.72.0/tests/unit/unit1603.c:75:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_add(&hash_static, &key2, strlen(key2), &key2);
data/curl-7.72.0/tests/unit/unit1603.c:77:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key2, strlen(key2));
data/curl-7.72.0/tests/unit/unit1603.c:80:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_add(&hash_static, &key3, strlen(key3), &key3);
data/curl-7.72.0/tests/unit/unit1603.c:82:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key3, strlen(key3));
data/curl-7.72.0/tests/unit/unit1603.c:86:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_add(&hash_static, &key4, strlen(key4), &key4);
data/curl-7.72.0/tests/unit/unit1603.c:88:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key4, strlen(key4));
data/curl-7.72.0/tests/unit/unit1603.c:92:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key1, strlen(key1));
data/curl-7.72.0/tests/unit/unit1603.c:94:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key2, strlen(key2));
data/curl-7.72.0/tests/unit/unit1603.c:96:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key3, strlen(key3));
data/curl-7.72.0/tests/unit/unit1603.c:98:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key4, strlen(key4));
data/curl-7.72.0/tests/unit/unit1603.c:102:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rc = Curl_hash_delete(&hash_static, &key4, strlen(key4));
data/curl-7.72.0/tests/unit/unit1603.c:104:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key1, strlen(key1));
data/curl-7.72.0/tests/unit/unit1603.c:106:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key4, strlen(key4));
data/curl-7.72.0/tests/unit/unit1603.c:110:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_add(&hash_static, &key4, strlen(key4), &key4);
data/curl-7.72.0/tests/unit/unit1603.c:112:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key4, strlen(key4));
data/curl-7.72.0/tests/unit/unit1603.c:116:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rc = Curl_hash_delete(&hash_static, &key1, strlen(key1));
data/curl-7.72.0/tests/unit/unit1603.c:118:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key1, strlen(key1));
data/curl-7.72.0/tests/unit/unit1603.c:120:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key4, strlen(key4));
data/curl-7.72.0/tests/unit/unit1603.c:124:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rc = Curl_hash_delete(&hash_static, &key4, strlen(key4));
data/curl-7.72.0/tests/unit/unit1603.c:126:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key1, strlen(key1));
data/curl-7.72.0/tests/unit/unit1603.c:128:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key4, strlen(key4));
data/curl-7.72.0/tests/unit/unit1603.c:132:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rc = Curl_hash_delete(&hash_static, &key4, strlen(key4));
data/curl-7.72.0/tests/unit/unit1603.c:136:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_add(&hash_static, &key1, strlen(key1), &notakey);
data/curl-7.72.0/tests/unit/unit1603.c:138:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key1, strlen(key1));
data/curl-7.72.0/tests/unit/unit1603.c:142:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key2, strlen(key2));
data/curl-7.72.0/tests/unit/unit1603.c:144:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nodep = Curl_hash_pick(&hash_static, &key3, strlen(key3));
data/curl-7.72.0/tests/unit/unit1607.c:135:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dns = Curl_hash_pick(easy->dns.hostcache, entry_id, strlen(entry_id) + 1);
data/curl-7.72.0/tests/unit/unit1609.c:143:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dns = Curl_hash_pick(easy->dns.hostcache, entry_id, strlen(entry_id) + 1);
data/curl-7.72.0/tests/unit/unit1610.c:44:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Curl_sha256it(output, (const unsigned char *) string1, strlen(string1));
data/curl-7.72.0/tests/unit/unit1610.c:51:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Curl_sha256it(output, (const unsigned char *) string2, strlen(string2));
data/curl-7.72.0/tests/unit/unit1611.c:44:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Curl_md4it(output, (const unsigned char *) string1, strlen(string1));
data/curl-7.72.0/tests/unit/unit1611.c:50:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Curl_md4it(output, (const unsigned char *) string2, strlen(string2));
data/curl-7.72.0/tests/unit/unit1612.c:47:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              (const unsigned char *) password, strlen(password),
data/curl-7.72.0/tests/unit/unit1612.c:48:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              (const unsigned char *) string1, strlen(string1),
data/curl-7.72.0/tests/unit/unit1612.c:56:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              (const unsigned char *) password, strlen(password),
data/curl-7.72.0/tests/unit/unit1612.c:57:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              (const unsigned char *) string2, strlen(string2),
data/curl-7.72.0/tests/unit/unit1620.c:72:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          hostname, strlen(hostname), NULL, NULL, NULL);
data/curl-7.72.0/tests/unit/unit1650.c:205:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        o = strlen(ptr);
data/curl-7.72.0/tests/unit/unit1650.c:215:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          l = strlen(ptr);
data/curl-7.72.0/tests/unit/unit1650.c:227:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      o = strlen(ptr);
data/curl-7.72.0/tests/unit/unit1652.c:94:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
fail_unless(strlen(result) == 0, "Empty string");
data/curl-7.72.0/tests/unit/unit1652.c:102:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
fail_unless(strlen(result) == 2048, "No truncation of infof input");
data/curl-7.72.0/tests/unit/unit1652.c:110:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
fail_unless(strlen(result) == 2048, "Truncation of infof input 1");
data/curl-7.72.0/tests/unit/unit1652.c:119:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
fail_unless(strlen(result) == 2048, "Truncation of infof input 2");
data/curl-7.72.0/tests/unit/unit1652.c:128:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
fail_unless(strlen(result) == 2048, "Truncation of infof input 3");
data/curl-7.72.0/tests/unit/unit1655.c:132:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fail_unless(olen > strlen(name), "unrealistic low size");
data/curl-7.72.0/tests/unit/unit1655.c:155:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fail_unless(olen1 > strlen(sunshine1), "bad out length");

ANALYSIS SUMMARY:

Hits = 1969
Lines analyzed = 229730 in approximately 6.44 seconds (35686 lines/second)
Physical Source Lines of Code (SLOC) = 153786
Hits@level = [0] 1575 [1] 741 [2] 1070 [3]  56 [4] 102 [5]   0
Hits@level+ = [0+] 3544 [1+] 1969 [2+] 1228 [3+] 158 [4+] 102 [5+]   0
Hits/KSLOC@level+ = [0+] 23.045 [1+] 12.8035 [2+] 7.98512 [3+] 1.0274 [4+] 0.663259 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.