Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/diploma-1.2.16/diploma_1/inc/salt.h
Examining data/diploma-1.2.16/diploma_1/src/addx.c
Examining data/diploma-1.2.16/diploma_1/src/parameters.c
Examining data/diploma-1.2.16/diploma_1/src/poisson2gauss.c
Examining data/diploma-1.2.16/diploma_1/src/table1.c
Examining data/diploma-1.2.16/diploma_2/prog.c
Examining data/diploma-1.2.16/diploma_2/prog2.c
Examining data/diploma-1.2.16/diploma_3/galaxy.c

FINAL RESULTS:

data/diploma-1.2.16/diploma_3/galaxy.c:53:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("grep %%BoundingBox logo-50.eps > logo-50.eps.BoundingBox");
data/diploma-1.2.16/diploma_3/galaxy.c:86:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(
data/diploma-1.2.16/diploma_3/galaxy.c:88:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("cat galaxy.eps logo-50.eps.temp > galaxy.eps.temp");
data/diploma-1.2.16/diploma_3/galaxy.c:89:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("mv galaxy.eps.temp galaxy.eps");
data/diploma-1.2.16/diploma_3/galaxy.c:174:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("cat galaxy.eps logo-50.eps.temp > galaxy.eps.temp");
data/diploma-1.2.16/diploma_3/galaxy.c:175:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("mv galaxy.eps.temp galaxy.eps");
data/diploma-1.2.16/diploma_1/src/parameters.c:18:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("min2theta.tex","w");
data/diploma-1.2.16/diploma_1/src/parameters.c:21:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("max2theta.tex","w");
data/diploma-1.2.16/diploma_1/src/parameters.c:24:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("stepnumber.tex","w");
data/diploma-1.2.16/diploma_1/src/parameters.c:27:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("stepsize.tex","w");
data/diploma-1.2.16/diploma_1/src/parameters.c:30:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("lambdaKalpha1.tex","w");
data/diploma-1.2.16/diploma_1/src/parameters.c:33:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("lambdaKalpha2.tex","w");
data/diploma-1.2.16/diploma_1/src/parameters.c:36:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("lambdaKbeta.tex","w");
data/diploma-1.2.16/diploma_1/src/table1.c:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t[17]={'a','b','a','b','a','b','a','a','a','b',
data/diploma-1.2.16/diploma_1/src/table1.c:74:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("res/result.tex","w");
data/diploma-1.2.16/diploma_2/prog2.c:27:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("a.dat","w");
data/diploma-1.2.16/diploma_2/prog2.c:31:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("sigmaa.dat","w");
data/diploma-1.2.16/diploma_2/prog2.c:38:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f=fopen("h.meta","w");
data/diploma-1.2.16/diploma_3/galaxy.c:54:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("logo-50.eps.BoundingBox","r");
data/diploma-1.2.16/diploma_3/galaxy.c:64:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("galaxy.eps","w");
data/diploma-1.2.16/diploma_3/galaxy.c:90:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("galaxy.eps","a");
data/diploma-1.2.16/diploma_3/galaxy.c:176:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("galaxy.eps","a");

ANALYSIS SUMMARY:

Hits = 22
Lines analyzed = 467 in approximately 0.04 seconds (12052 lines/second)
Physical Source Lines of Code (SLOC) = 273
Hits@level = [0]  84 [1]   0 [2]  16 [3]   0 [4]   6 [5]   0
Hits@level+ = [0+] 106 [1+]  22 [2+]  22 [3+]   6 [4+]   6 [5+]   0
Hits/KSLOC@level+ = [0+] 388.278 [1+] 80.5861 [2+] 80.5861 [3+] 21.978 [4+] 21.978 [5+]   0
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.