Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/dazzdb-1.0+git20200727.d22ae58/Catrack.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DAM2fasta.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DB.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DB.h
Examining data/dazzdb-1.0+git20200727.d22ae58/DB2arrow.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DB2fasta.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DB2quiva.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBa2b.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBb2a.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBdump.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBdust.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBmv.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBrm.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBshow.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBsplit.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBstats.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBtrim.c
Examining data/dazzdb-1.0+git20200727.d22ae58/DBwipe.c
Examining data/dazzdb-1.0+git20200727.d22ae58/QV.c
Examining data/dazzdb-1.0+git20200727.d22ae58/QV.h
Examining data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c
Examining data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c
Examining data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c
Examining data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c
Examining data/dazzdb-1.0+git20200727.d22ae58/rangen.c
Examining data/dazzdb-1.0+git20200727.d22ae58/simulator.c

FINAL RESULTS:

data/dazzdb-1.0+git20200727.d22ae58/DB.c:179:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(cat,"%s%s%s%s",path,sep,root,suffix);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:200:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sfx,"%s%d%s",left,num,right);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:223:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(cat,"%s%s%s%s",path,sep,root,suffix);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:244:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sfx,"%s%d%s",left,num,right);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:506:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(dbfile,DB_NFILE,&nfiles) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:538:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    { if (fscanf(dbfile,DB_FDATA,&nread,buf1,buf2) != 3)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:554:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(dbfile,DB_NBLOCK,&nblocks) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:557:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(dbfile,DB_PARAMS,&size,&cutoff,&all) != 3)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:567:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if (fscanf(dbfile,DB_BDATA,stub->ublocks+i,stub->tblocks+i) != 2)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:604:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(dbfile,DB_NFILE,&nfiles) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:609:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(dbfile,DB_NBLOCK,&nblocks) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:617:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(dbfile,DB_PARAMS,&size,&cutoff,&all) != 3)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:620:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (fscanf(dbfile,DB_BDATA,&ufirst,&tfirst) != 2)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:622:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(dbfile,DB_BDATA,&ulast,&tlast) != 2)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:761:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (fscanf(dbvis,DB_NFILE,&nfiles) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:766:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (fscanf(dbvis,DB_FDATA,&tlast,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:770:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (fscanf(dbvis,DB_NBLOCK,&nblocks) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:781:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      { if (fscanf(dbvis,DB_PARAMS,&size,&cutoff,&all) != 3)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:793:15:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          if (fscanf(dbvis,DB_BDATA,&ufirst,&tfirst) != 2)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:797:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if (fscanf(dbvis,DB_BDATA,&ulast,&tlast) != 2)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2363:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (fscanf(istub,DB_NFILE,&nfiles) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2381:17:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          { if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2392:17:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2413:16:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        (void) fscanf(istub,DB_NFILE,&nfiles);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2417:20:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          { (void) fscanf(istub,DB_FDATA,&last,fname,prolog);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2422:20:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          { (void) fscanf(istub,DB_FDATA,&last,fname,prolog);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2481:17:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          { if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2779:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(parse->slice,"%s/%s",parse->pwd,parse->root);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2781:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(parse->slice,"%s/%s%c%d-%d%s",parse->pwd,parse->root,BLOCK_SYMBOL,parse->next+1,
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2883:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (fscanf(dbfile,DB_NFILE,&nfiles) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2888:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (fscanf(dbfile,DB_NBLOCK,&nblocks) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.h:39:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define EPRINTF sprintf
data/dazzdb-1.0+git20200727.d22ae58/DB.h:45:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define EPRINTF fprintf
data/dazzdb-1.0+git20200727.d22ae58/DB.h:159:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  { if (fprintf(file,__VA_ARGS__) < 0)	\
data/dazzdb-1.0+git20200727.d22ae58/DB.h:164:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  { if (printf(__VA_ARGS__) < 0)	\
data/dazzdb-1.0+git20200727.d22ae58/DB.h:194:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  { if (fscanf(file,__VA_ARGS__) != Count_Args(#__VA_ARGS__)-1)				\
data/dazzdb-1.0+git20200727.d22ae58/DB2arrow.c:140:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(lname,fname);
data/dazzdb-1.0+git20200727.d22ae58/DB2fasta.c:138:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(lname,fname);
data/dazzdb-1.0+git20200727.d22ae58/DB2quiva.c:142:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(lname,fname);
data/dazzdb-1.0+git20200727.d22ae58/DBa2b.c:35:17:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
                scanf(" %s",mname[mno]);
data/dazzdb-1.0+git20200727.d22ae58/DBa2b.c:80:11:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          scanf(" %s",buffer[(int) code]);
data/dazzdb-1.0+git20200727.d22ae58/DBa2b.c:93:11:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          scanf(" %s",buffer[(int) code]);
data/dazzdb-1.0+git20200727.d22ae58/DBmv.c:38:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(cat,"%s%s%s%s%s",path,sep1,root,sep2,suffix);
data/dazzdb-1.0+git20200727.d22ae58/DBtrim.c:221:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(dbfile,DB_BDATA,0,0);
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:163:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(istub,DB_NFILE,&nfiles) != 1)
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:240:23:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
                { if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:283:23:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
                { if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:320:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(lname,fname);
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:321:17:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:270:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      { if (fscanf(istub,DB_NFILE,&ofiles) != 1)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:302:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(ostub,DB_NFILE,ofiles+ifiles);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:308:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:315:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(ostub,DB_FDATA,last,fname,prolog);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:521:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(ostub,DB_FDATA,ureads,core,core);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:569:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (fscanf(istub,DB_NBLOCK,&nblock) != 1)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:574:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(ostub,DB_NBLOCK,0);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:575:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (fscanf(istub,DB_PARAMS,&size,&cutoff,&allflag) != 3)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:579:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(ostub,DB_PARAMS,size,cutoff,allflag);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:587:15:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        { if (fscanf(istub,DB_BDATA,&ufirst,&tfirst) != 2)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:591:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          fprintf(ostub,DB_BDATA,ufirst,tfirst);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:621:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        { fprintf(ostub,DB_BDATA,ureads,tfirst);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:629:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(ostub,DB_NBLOCK,nblock);    //  Rewind and record the new number of blocks
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:635:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(ostub,DB_NFILE,ofiles);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:263:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      { if (fscanf(istub,DB_NFILE,&ocells) != 1)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:298:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if (fprintf(ostub,DB_NFILE,ocells+ifiles) < 0)   //  Will write again with correct value at end
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:307:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:317:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        if (fprintf(ostub,DB_FDATA,last,fname,prolog) < 0)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:454:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              strcpy(prolog,read+1);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:459:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              strcpy(prolog,read+1);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:490:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                { fprintf(ostub,DB_FDATA,ureads,core,prolog);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:492:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(prolog,read+(rlen+1));
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:601:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(ostub,DB_FDATA,ureads,core,prolog);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:650:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (fscanf(istub,DB_NBLOCK,&nblock) != 1)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:655:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(ostub,DB_NBLOCK,0);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:656:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (fscanf(istub,DB_PARAMS,&size,&cutoff,&allflag) != 3)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:660:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(ostub,DB_PARAMS,size,cutoff,allflag);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:668:15:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        { if (fscanf(istub,DB_BDATA,&ufirst,&tfirst) != 2)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:672:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          fprintf(ostub,DB_BDATA,ufirst,tfirst);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:702:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        { fprintf(ostub,DB_BDATA,ureads,tfirst);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:709:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(ostub,DB_NBLOCK,nblock);    //  Rewind and record the new number of blocks
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:718:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(ostub,DB_NFILE,ocells);
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:169:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(istub,DB_NFILE,&nfiles) != 1)
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:248:23:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
                { if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:295:23:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
                { if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:332:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(lname,fname);
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:333:17:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            if (fscanf(istub,DB_FDATA,&last,fname,prolog) != 3)
data/dazzdb-1.0+git20200727.d22ae58/rangen.c:52:13:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      { x = drand48();
data/dazzdb-1.0+git20200727.d22ae58/rangen.c:66:13:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      { x = drand48();
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:265:19:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            { x = drand48();
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:366:40:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      scf = bin_search(nscaffs,weights,drand48()) - 1;   //  Pick a scaffold with probabilitye
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:369:13:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      uni = drand48();
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:377:21:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      rbeg = (int) (drand48()*slen);          //  Pick a spot for read start
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:381:15:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        { if (drand48() < .5)                 //  Pick direction and trim if necessary
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:408:22:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        { double x = drand48();
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:430:24:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      while ((len+1) * drand48() < ins)
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:431:29:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        { *t++ = (char) (4.*drand48());
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:435:21:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        { if (len * drand48() >= sdl)
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:437:26:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          else if (sdl * drand48() >= del)
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:438:29:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            { double x = 3.*drand48();
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:451:24:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          while (len * drand48() < ins)
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:452:33:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            { *t++ = (char) (4.*drand48());
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:458:11:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      if (drand48() >= FLIP_RATE)    //  Complement the string with probability FLIP_RATE.
data/dazzdb-1.0+git20200727.d22ae58/Catrack.c:106:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char  data[1024];
data/dazzdb-1.0+git20200727.d22ae58/Catrack.c:120:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      aout = fopen(Catenate(prefix,argv[c],".","anno"),"r");
data/dazzdb-1.0+git20200727.d22ae58/Catrack.c:129:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      dout = fopen(Catenate(prefix,argv[c],".","data"),"r");
data/dazzdb-1.0+git20200727.d22ae58/Catrack.c:168:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          afile = fopen(afile_name,"r");
data/dazzdb-1.0+git20200727.d22ae58/Catrack.c:174:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          dfile = fopen(dfile_name,"r");
data/dazzdb-1.0+git20200727.d22ae58/DAM2fasta.c:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        nstring[WIDTH+1];
data/dazzdb-1.0+git20200727.d22ae58/DAM2fasta.c:124:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  prolog[MAX_NAME], fname[MAX_NAME], header[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DB.c:42:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char Ebuffer[1000];
data/dazzdb-1.0+git20200727.d22ae58/DB.c:107:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen(name,mode)) == NULL)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:334:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    *s++ = (char ) ((s0[i] << 6) | (s1[i] << 4) | (s2[i] << 2) | s3[i]);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:368:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char letter[4] = { 'a', 'c', 'g', 't' };
data/dazzdb-1.0+git20200727.d22ae58/DB.c:376:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char letter[4] = { 'A', 'C', 'G', 'T' };
data/dazzdb-1.0+git20200727.d22ae58/DB.c:384:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char letter[4] = { '1', '2', '3', '4' };
data/dazzdb-1.0+git20200727.d22ae58/DB.c:394:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char number[128] =
data/dazzdb-1.0+git20200727.d22ae58/DB.c:419:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char arrow[128] =
data/dazzdb-1.0+git20200727.d22ae58/DB.c:444:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char change[128] =
data/dazzdb-1.0+git20200727.d22ae58/DB.c:482:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buf1[MAX_NAME+100];
data/dazzdb-1.0+git20200727.d22ae58/DB.c:483:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buf2[MAX_NAME+100];
data/dazzdb-1.0+git20200727.d22ae58/DB.c:592:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buffer[2*MAX_NAME+100];
data/dazzdb-1.0+git20200727.d22ae58/DB.c:728:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((dbvis = fopen(cat,"r")) == NULL)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:740:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((dbvis = fopen(cat,"r")) == NULL)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:758:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  fname[MAX_NAME], prolog[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1650:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    { afile  = fopen(MyCatenate(db->path,MyNumbered_Suffix(".",db->part,"."),track,".anno"),"r");
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1654:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    { afile  = fopen(MyCatenate(db->path,".",track,".anno"),"r");
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1818:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    { afile  = fopen(MyCatenate(db->path,MyNumbered_Suffix(".",db->part,"."),track,".anno"),"r");
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1822:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    { afile = fopen(MyCatenate(db->path,".",track,".anno"),"r");
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1842:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  dfile = fopen(name,"r");
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2360:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  prolog[MAX_NAME], fname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2700:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((input = fopen(MyCatenate(parse->pwd,"/",disp,".las"),"r")) == NULL)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2867:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char  buffer[2*MAX_NAME+100];
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2873:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      dbfile = fopen(dbname,"r");
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2876:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          dbfile = fopen(dbname,"r");
data/dazzdb-1.0+git20200727.d22ae58/DB2arrow.c:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        lname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DB2arrow.c:105:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  prolog[MAX_NAME], fname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DB2fasta.c:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        lname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DB2fasta.c:103:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  prolog[MAX_NAME], fname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DB2quiva.c:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        lname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DB2quiva.c:105:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  prolog[MAX_NAME], fname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DBa2b.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  *buffer[256];
data/dazzdb-1.0+git20200727.d22ae58/DBb2a.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  *buffer[256];
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:50:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char nbuffer[MAX_BUFFER];
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:567:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  { char header[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:655:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        qvname[5] = { 'd', 'c', 'i', 'm', 's' };
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:730:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  { char header[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:129:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((afile = fopen(fname,"r+")) == NULL || db->part > 0)
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:55:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char nbuffer[MAX_BUFFER];
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:511:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              { char header[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/DBsplit.c:136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buffer[2*MAX_NAME+100];
data/dazzdb-1.0+git20200727.d22ae58/DBtrim.c:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buffer[2*MAX_NAME+100];
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:63:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char nbuffer[MAX_NAME+8];
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:126:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            INFILE = fopen(argv[i]+2,"r");
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:211:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           lname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:230:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char  prolog[MAX_NAME], fname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char number[128] =
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:86:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char nbuffer[MAX_NAME+8];
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:154:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            IFILE = fopen(argv[i]+2,"r");
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:165:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                temp = fopen(PIPE,"w");
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:250:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    istub = fopen(dbname,"r");
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:306:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char prolog[MAX_NAME], fname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char number[128] =
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:86:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char nbuffer[MAX_NAME+8];
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:154:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            IFILE = fopen(argv[i]+2,"r");
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:165:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                temp = fopen(PIPE,"w");
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:248:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    istub = fopen(dbname,"r");
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:305:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char prolog[MAX_NAME], fname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:362:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  prolog[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:63:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char nbuffer[MAX_NAME+8];
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:129:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            INFILE = fopen(argv[i]+2,"r");
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           lname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:238:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char  prolog[MAX_NAME], fname[MAX_NAME];
data/dazzdb-1.0+git20200727.d22ae58/Catrack.c:72:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    plen = strlen(argv[1]);
data/dazzdb-1.0+git20200727.d22ae58/DAM2fasta.c:106:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char       *read;
data/dazzdb-1.0+git20200727.d22ae58/DAM2fasta.c:188:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            Load_Read(db,i,read,UPPER);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:147:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { epos  = strlen(find);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:148:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      epos -= strlen(suffix);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:167:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len =  strlen(path);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:168:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(sep);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:169:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(root);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:170:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(suffix);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:190:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len =  strlen(left);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:191:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(right) + 40;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:211:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len =  strlen(path);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:212:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(sep);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:213:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(root);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:214:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(suffix);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:234:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len =  strlen(left);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:235:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(right) + 40;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:697:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  plen = strlen(path);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1045:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    + strlen(db->path)+1
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1060:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         + strlen(t->name)+1
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1093:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  plen   = strlen(path);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1098:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rlen = strlen(root);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1136:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dlen = strlen(name);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1213:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
{ char *read;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1227:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int Load_Read(DAZZ_DB *db, int i, char *read, int ascii)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1240:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(read,(char *) bases + r[i].boff,len);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1240:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      strncpy(read,(char *) bases + r[i].boff,len);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1242:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        { if (*read < 4)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1243:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read[-1] = read[len] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1243:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read[-1] = read[len] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1245:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            { read[len] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1246:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              Number_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1247:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              read[-1] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1251:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        { if (*read < 4)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1252:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            { read[len] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1254:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                Lower_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1256:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                Upper_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1257:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              read[-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1260:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            { read[len] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1261:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              if ((ascii == 1) != islower(*read))
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1262:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                Change_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1264:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          read[-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1276:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { if (fread(read,clen,1,bases) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1281:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Uncompress_Read(len,read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1283:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { Lower_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1284:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read[-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1287:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { Upper_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1288:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read[-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1291:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    read[-1] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1303:64:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
char *Load_Subread(DAZZ_DB *db, int i, int beg, int end, char *read, int ascii)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1317:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(read,(char *) bases + r[i].boff + beg,len);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1317:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      strncpy(read,(char *) bases + r[i].boff + beg,len);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1319:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        { if (*read < 4)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1320:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read[-1] = read[len] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1320:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read[-1] = read[len] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1322:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            { read[len] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1323:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              Number_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1324:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              read[-1] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1328:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        { if (*read < 4)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1329:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            { read[len] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1331:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                Lower_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1333:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                Upper_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1334:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              read[-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1337:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            { read[len] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1338:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              if ((ascii == 1) != islower(*read))
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1339:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                Change_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1341:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          read[-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1343:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      return (read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1356:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { if (fread(read,clen,1,bases) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1361:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Uncompress_Read(4*clen,read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1363:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  read[len] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1365:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { Lower_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1366:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read[-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1369:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { Upper_Read(read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1370:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read[-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1373:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    read[-1] = 4;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1375:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return (read);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1705:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  DAZZ_READ   read;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1731:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          { if (fread(&read,sizeof(DAZZ_READ),1,indx) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1736:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((read.flags & DB_BEST) >= allflag && read.rlen >= cutoff)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1736:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((read.flags & DB_BEST) >= allflag && read.rlen >= cutoff)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1750:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          { if (fread(&read,sizeof(DAZZ_READ),1,indx) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1755:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((read.flags & DB_BEST) >= allflag && read.rlen >= cutoff)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1755:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((read.flags & DB_BEST) >= allflag && read.rlen >= cutoff)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1770:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          { if (fread(&read,sizeof(DAZZ_READ),1,indx) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1775:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((read.flags & DB_BEST) >= allflag && read.rlen >= cutoff)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:1775:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((read.flags & DB_BEST) >= allflag && read.rlen >= cutoff)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2034:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    { strncpy(data,(void *) track->data + off,len);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2266:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  slen = strlen(extra->name);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2426:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              { DAZZ_READ read;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2429:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                if (fread(&read,sizeof(DAZZ_READ),1,indx) != 1)
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2434:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                fseeko(quiva,read.coff,SEEK_SET);
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2767:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { int size = strlen(parse->pwd) + strlen(Block_Arg_Root(parse)) + 30;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2767:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { int size = strlen(parse->pwd) + strlen(Block_Arg_Root(parse)) + 30;
data/dazzdb-1.0+git20200727.d22ae58/DB.c:2799:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { int len = strlen(arg);
data/dazzdb-1.0+git20200727.d22ae58/DB.h:537:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int  Load_Read(DAZZ_DB *db, int i, char *read, int ascii);
data/dazzdb-1.0+git20200727.d22ae58/DB.h:546:64:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
char *Load_Subread(DAZZ_DB *db, int i, int beg, int end, char *read, int ascii);
data/dazzdb-1.0+git20200727.d22ae58/DB.h:573:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int  Load_Arrow(DAZZ_DB *db, int i, char *read, int ascii);
data/dazzdb-1.0+git20200727.d22ae58/DB2arrow.c:96:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char       *read;
data/dazzdb-1.0+git20200727.d22ae58/DB2arrow.c:164:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            Load_Arrow(db,i,read,1);
data/dazzdb-1.0+git20200727.d22ae58/DB2fasta.c:94:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char       *read;
data/dazzdb-1.0+git20200727.d22ae58/DB2fasta.c:158:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            Load_Read(db,i,read,UPPER);
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:34:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int    read;
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:66:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  x = sscanf(nbuffer," %d %d %d",&(it->read),&(it->beg),&(it->end));
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:164:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fprintf(stderr,"       %*s %s\n",(int) strlen(Prog_Name),"",Usage[1]);
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:516:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            e = iter->read;
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:553:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  { ten = strlen(ffile[map+1]);
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:571:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    header[strlen(header)-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:572:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    ten = strlen(header);
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:580:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    ten = strlen(fhead[map]);
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:631:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        PRINTF("@ T%d %lld %ld %s\n",m,trkmax[m],strlen(MASK[m]),MASK[m])
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:651:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char       *read, *arrow, **entry;
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:682:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            e = iter->read;
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:721:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  { PRINTF("F %ld %s\n",strlen(ffile[map+1]),ffile[map+1])
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:734:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    header[strlen(header)-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:735:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    PRINTF("H %ld %s\n",strlen(header),header)
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:741:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        PRINTF("H %ld %s\n",strlen(fhead[map]),fhead[map])
data/dazzdb-1.0+git20200727.d22ae58/DBdump.c:763:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              Load_Read(db,i,read,UPPER);
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:166:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char      *read, *lag2;
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:209:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        Load_Read(db,i,read,0);
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:211:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = (read[0] << 2) | read[1];     //   Convert to triple codes
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:211:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = (read[0] << 2) | read[1];     //   Convert to triple codes
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:213:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          { c = ((c << 2) & 0x3f) | read[j];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:230:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              { c = read[j];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:242:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  { d = read[++wb];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:248:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  { d = read[++lb];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:255:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      { d = read[++lb];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:285:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  { d = read[c];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:312:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  { d = read[c];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:324:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              { c = read[j];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:336:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  { d = read[++wb];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:342:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  { d = read[++lb];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:349:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      { d = read[++lb];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:379:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  { d = read[c];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:406:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  { d = read[c];
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:450:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          Load_Read(db,i,read,0);
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:457:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                printf("%c",Caps[(int) read[c]]);
data/dazzdb-1.0+git20200727.d22ae58/DBdust.c:459:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                printf("%c",Lowr[(int) read[c]]);
data/dazzdb-1.0+git20200727.d22ae58/DBmv.c:33:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(path) + strlen(sep1) + strlen(root) + strlen(sep2) + strlen(suffix);
data/dazzdb-1.0+git20200727.d22ae58/DBmv.c:33:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(path) + strlen(sep1) + strlen(root) + strlen(sep2) + strlen(suffix);
data/dazzdb-1.0+git20200727.d22ae58/DBmv.c:33:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(path) + strlen(sep1) + strlen(root) + strlen(sep2) + strlen(suffix);
data/dazzdb-1.0+git20200727.d22ae58/DBmv.c:33:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(path) + strlen(sep1) + strlen(root) + strlen(sep2) + strlen(suffix);
data/dazzdb-1.0+git20200727.d22ae58/DBmv.c:33:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(path) + strlen(sep1) + strlen(root) + strlen(sep2) + strlen(suffix);
data/dazzdb-1.0+git20200727.d22ae58/DBmv.c:82:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strcmp(argv[1]+(strlen(argv[1])-4),".dam") == 0)
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:39:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int    read;
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:71:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  x = sscanf(nbuffer," %d %d %d",&(it->read),&(it->beg),&(it->end));
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:170:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fprintf(stderr,"       %*s %s\n",(int) strlen(Prog_Name),"",Usage[1]);
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:419:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char       *read, *arrow, **entry;
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:466:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            e = iter->read;
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:515:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                header[strlen(header)-1] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:539:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              Load_Read(db,i,read,UPPER);
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:559:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                              if (iscase(read[m]))
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:560:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                read[m] = (char) (read[m] + hilight);
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:560:51:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                read[m] = (char) (read[m] + hilight);
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:626:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if (read[k] != last)
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:627:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            { PRINTF("%c",read[k]);
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:628:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              last = read[k];
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:633:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read[k] != last)
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:634:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        { PRINTF("%c",read[k]);
data/dazzdb-1.0+git20200727.d22ae58/DBshow.c:635:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          last = read[k];
data/dazzdb-1.0+git20200727.d22ae58/QV.c:386:55:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
static void Encode(HScheme *scheme, FILE *out, uint8 *read, int rlen)
data/dazzdb-1.0+git20200727.d22ae58/QV.c:428:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { x = read[k];
data/dazzdb-1.0+git20200727.d22ae58/QV.c:448:72:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
static void Encode_Run(HScheme *neme, HScheme *reme, FILE *out, uint8 *read, int rlen, int rchar)
data/dazzdb-1.0+git20200727.d22ae58/QV.c:477:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while (k < rlen && read[k] == rchar)
data/dazzdb-1.0+git20200727.d22ae58/QV.c:489:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        { x = read[k];
data/dazzdb-1.0+git20200727.d22ae58/QV.c:510:52:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
static int Decode(HScheme *scheme, FILE *in, char *read, int rlen)
data/dazzdb-1.0+git20200727.d22ae58/QV.c:583:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        read[j] = (char) c;
data/dazzdb-1.0+git20200727.d22ae58/QV.c:595:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        read[j] = (char) c;
data/dazzdb-1.0+git20200727.d22ae58/QV.c:604:69:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
static int Decode_Run(HScheme *neme, HScheme *reme, FILE *in, char *read,
data/dazzdb-1.0+git20200727.d22ae58/QV.c:650:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          read[j++] = (char) rchar;
data/dazzdb-1.0+git20200727.d22ae58/QV.c:661:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read[j] = (char) c;
data/dazzdb-1.0+git20200727.d22ae58/QV.c:675:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          read[j++] = (char) rchar;
data/dazzdb-1.0+git20200727.d22ae58/QV.c:686:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read[j] = (char) c;
data/dazzdb-1.0+git20200727.d22ae58/QV.c:770:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rlen = strlen(Read);
data/dazzdb-1.0+git20200727.d22ae58/QV.c:782:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      rlen += strlen(Read+rlen);
data/dazzdb-1.0+git20200727.d22ae58/QV.c:792:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (rlen != (int) strlen(other))
data/dazzdb-1.0+git20200727.d22ae58/QV.c:1195:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(coding->prefix);
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:208:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char          *read;
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:327:26:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                if ((c = fgetc(input)) == EOF)
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:373:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            eof  = (fgets(read,MAX_NAME,input) == NULL);
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:374:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (read[strlen(read)-1] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:374:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (read[strlen(read)-1] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:374:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (read[strlen(read)-1] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:379:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (!eof && read[0] != '>')
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:433:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  x = strlen(read+rlen)-1;
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:434:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  if (read[rlen+x] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:435:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    { if (read[rlen] == '>')
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:444:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  if (eof || read[rlen] == '>')
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:449:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      read = (char *) realloc(read,rmax+1);
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:457:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              read[rlen] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:467:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              Number_Arrow(read);
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:468:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              Compress_Read(rlen,read);
data/dazzdb-1.0+git20200727.d22ae58/arrow2DB.c:470:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              fwrite(read,1,clen,arrow);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:323:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char          *read;
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:380:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(core) >= MAX_NAME)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:408:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        eof   = (fgets(read,MAX_NAME,input) == NULL);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:409:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (eof || strlen(read) < 1)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:409:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (eof || strlen(read) < 1)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:435:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read[strlen(read)-1] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:435:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (read[strlen(read)-1] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:435:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read[strlen(read)-1] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:440:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (!eof && read[0] != '>')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:452:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              read[rlen] = '>';
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:453:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              hlen = strlen(read+rlen);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:460:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  x = strlen(read+rlen)-1;
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:461:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  if (read[rlen+x] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:466:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  if (eof || read[rlen] == '>')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:471:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      read = (char *) realloc(read,rmax+1);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:479:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              read[rlen] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:487:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    if (number[(int) read[++i]] < 4)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:499:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    { x = number[(int) read[i]];
data/dazzdb-1.0+git20200727.d22ae58/fasta2DAM.c:502:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      read[i++] = (char) x;
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:329:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char          *read;
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:392:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        eof = (fgets(read,MAX_NAME,input) == NULL);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:393:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (eof || strlen(read) < 1)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:393:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (eof || strlen(read) < 1)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:406:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(core) >= MAX_NAME)
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:438:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read[strlen(read)-1] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:438:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (read[strlen(read)-1] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:438:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read[strlen(read)-1] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:443:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (!eof && read[0] != '>')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:514:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  x = strlen(read+rlen)-1;
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:515:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  if (read[rlen+x] != '\n')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:516:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    { if (read[rlen] == '>')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:525:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  if (eof || read[rlen] == '>')
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:530:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      read = (char *) realloc(read,rmax+1);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:538:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              read[rlen] = '\0';
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:541:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                { x = number[(int) read[i]];
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:543:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  read[i]   = (char) x;
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:557:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              Compress_Read(rlen,read);
data/dazzdb-1.0+git20200727.d22ae58/fasta2DB.c:559:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              fwrite(read,1,clen,bases);
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:339:26:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                if ((c = fgetc(input)) == EOF)
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:344:21:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              { if (fgetc(input) != EOF)
data/dazzdb-1.0+git20200727.d22ae58/quiva2DB.c:455:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (fgetc(input) != EOF)
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:568:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fprintf(stderr,"       %*s %s\n",(int) strlen(Prog_Name),"",Usage[1]);
data/dazzdb-1.0+git20200727.d22ae58/simulator.c:569:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fprintf(stderr,"       %*s %s\n",(int) strlen(Prog_Name),"",Usage[2]);

ANALYSIS SUMMARY:

Hits = 408
Lines analyzed = 13070 in approximately 0.39 seconds (33227 lines/second)
Physical Source Lines of Code (SLOC) = 9990
Hits@level = [0] 624 [1] 236 [2]  70 [3]  16 [4]  86 [5]   0
Hits@level+ = [0+] 1032 [1+] 408 [2+] 172 [3+] 102 [4+]  86 [5+]   0
Hits/KSLOC@level+ = [0+] 103.303 [1+] 40.8408 [2+] 17.2172 [3+] 10.2102 [4+] 8.60861 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.