Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/dkopp-6.5/zfuncs.h
Examining data/dkopp-6.5/zfuncs.cc
Examining data/dkopp-6.5/dkopp-6.5.cc

FINAL RESULTS:

data/dkopp-6.5/dkopp-6.5.cc:2879:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      err = chown(file2,uid,gid);
data/dkopp-6.5/dkopp-6.5.cc:2881:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      err = chmod(file2,perms);
data/dkopp-6.5/dkopp-6.5.cc:3751:21:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
         if (! err) chmod(dfile,0700);
data/dkopp-6.5/dkopp-6.5.cc:3799:4:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
   chmod(dfile,fstat.st_mode);                                             //  set output file attributes
data/dkopp-6.5/dkopp-6.5.cc:3800:10:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
   err = chown(dfile,fstat.st_uid,fstat.st_gid);                           //  (if supported by file system)
data/dkopp-6.5/zfuncs.cc:491:10:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
   cc2 = readlink("/proc/self/exe",command+cc1,990);
data/dkopp-6.5/dkopp-6.5.cc:357:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(BJfile,argv[++ii]);
data/dkopp-6.5/dkopp-6.5.cc:359:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          { strcpy(BJfile,argv[++ii]); clrun++; }
data/dkopp-6.5/dkopp-6.5.cc:361:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(scrFile,argv[++ii]);
data/dkopp-6.5/dkopp-6.5.cc:362:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      else  strcpy(BJfile,argv[ii]);                                       //  assume a job file and load it
data/dkopp-6.5/dkopp-6.5.cc:478:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(userdir,get_zuserdir());                                         //  get temp file names
data/dkopp-6.5/dkopp-6.5.cc:479:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(TFdiskfiles,"%s/diskfiles",userdir);
data/dkopp-6.5/dkopp-6.5.cc:480:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(TFdvdfiles,"%s/dvdfiles",userdir);
data/dkopp-6.5/dkopp-6.5.cc:481:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(TFfilepoop,"%s/filepoop",userdir);
data/dkopp-6.5/dkopp-6.5.cc:482:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(TFjobfile,"%s/jobfile",userdir);
data/dkopp-6.5/dkopp-6.5.cc:483:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(TFdatetime,"%s/datetime",userdir);
data/dkopp-6.5/dkopp-6.5.cc:484:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(TFrestorefiles,"%s/restorefiles.sh",userdir);
data/dkopp-6.5/dkopp-6.5.cc:485:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(TFrestoredirks,"%s/restoredirks.sh",userdir);
data/dkopp-6.5/dkopp-6.5.cc:515:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(BJinex[1],"include %s/*",home);                                 //  include /home/username/*
data/dkopp-6.5/dkopp-6.5.cc:516:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(BJinex[2],"exclude %s/.Trash/*",home);                          //  exclude /home/username/.Trash/*
data/dkopp-6.5/dkopp-6.5.cc:517:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(BJinex[3],"exclude %s/.thumbnails/*",home);                     //  exclude /home/username/.thumbnails/*
data/dkopp-6.5/dkopp-6.5.cc:543:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n Searching for DVD/BD devices ... \n");
data/dkopp-6.5/dkopp-6.5.cc:577:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (ii < nmenu) { strcpy(menu1,menu); return;  }
data/dkopp-6.5/dkopp-6.5.cc:582:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (ii < nmenu) strcpy(menu2,menu);
data/dkopp-6.5/dkopp-6.5.cc:585:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** bad command: %s \n",menu);
data/dkopp-6.5/dkopp-6.5.cc:629:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** can't open script file: %s \n",scrFile);
data/dkopp-6.5/dkopp-6.5.cc:643:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog,"\n""Script: %s \n",buff);                              //  write to log
data/dkopp-6.5/dkopp-6.5.cc:672:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"script exiting \n");
data/dkopp-6.5/dkopp-6.5.cc:720:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog,"\n""ready \n");                                     //  already dead
data/dkopp-6.5/dkopp-6.5.cc:726:13:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            wprintf(mLog," *** kill again: %s \n",subprocName);
data/dkopp-6.5/dkopp-6.5.cc:729:15:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         else wprintf(mLog," *** waiting for function to quit \n");        //  or wait for function to die
data/dkopp-6.5/dkopp-6.5.cc:733:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** KILL current function \n");                       //  initial kill
data/dkopp-6.5/dkopp-6.5.cc:785:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(BJfile,scriptParam);
data/dkopp-6.5/dkopp-6.5.cc:796:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(BJfile,file);
data/dkopp-6.5/dkopp-6.5.cc:815:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(BJfile,scriptParam);
data/dkopp-6.5/dkopp-6.5.cc:832:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(BJfile,file);
data/dkopp-6.5/dkopp-6.5.cc:862:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** cannot open job file: %s \n",fspec);
data/dkopp-6.5/dkopp-6.5.cc:873:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** input record too big \n");
data/dkopp-6.5/dkopp-6.5.cc:925:13:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            wprintf(mLog," *** exceed %d include/exclude recs \n",maxnx);
data/dkopp-6.5/dkopp-6.5.cc:932:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** unrecognized record: %s \n",buff);
data/dkopp-6.5/dkopp-6.5.cc:956:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** cannot open file: %s \n",fspec); 
data/dkopp-6.5/dkopp-6.5.cc:998:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(vjfile,dvdmp);                                                   //  dvd mount point
data/dkopp-6.5/dkopp-6.5.cc:999:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(vjfile,V_JOBFILE);                                               //  + dvd job file
data/dkopp-6.5/dkopp-6.5.cc:1144:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(editwidget,"%s""\n",BJinex[ii]);
data/dkopp-6.5/dkopp-6.5.cc:1179:12:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      pp = wscanf(editwidget,ftf);                                         //  include/exclude recs.
data/dkopp-6.5/dkopp-6.5.cc:1184:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** exceed %d include/exclude recs \n",maxnx); 
data/dkopp-6.5/dkopp-6.5.cc:1203:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mbmode,menu);
data/dkopp-6.5/dkopp-6.5.cc:1209:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(mbmode,BJbmode);                                           //    use job file backup & verify modes
data/dkopp-6.5/dkopp-6.5.cc:1210:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(mvmode,BJvmode);
data/dkopp-6.5/dkopp-6.5.cc:1215:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** no valid backup job \n");
data/dkopp-6.5/dkopp-6.5.cc:1223:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog,"ready \n");                                     //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:1240:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** nothing to back-up \n");
data/dkopp-6.5/dkopp-6.5.cc:1247:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," files: %d  bytes: %.0f \n",Dnf,Dbytes);                  //  files and bytes to copy
data/dkopp-6.5/dkopp-6.5.cc:1267:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** cannot open /tmp scratch file \n");
data/dkopp-6.5/dkopp-6.5.cc:1290:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," writing DVD/BD medium %d of %d, %s \n", 
data/dkopp-6.5/dkopp-6.5.cc:1295:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(command,                                                     //  build growisofs command line
data/dkopp-6.5/dkopp-6.5.cc:1313:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," backup time: %.0f secs \n",secs);
data/dkopp-6.5/dkopp-6.5.cc:1315:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," backup speed: %.2f MB/sec \n",bspeed);
data/dkopp-6.5/dkopp-6.5.cc:1316:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," backup complete \n");
data/dkopp-6.5/dkopp-6.5.cc:1317:23:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (BJndvd > 1) wprintf(mLog," (DVD/BD medium no. %d) \n",dvdnum);
data/dkopp-6.5/dkopp-6.5.cc:1341:13:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            wprintf(mLog," backup is being repeated \n",dvdnum);
data/dkopp-6.5/dkopp-6.5.cc:1351:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," backup job complete \n");
data/dkopp-6.5/dkopp-6.5.cc:1358:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," backup time: %.0f secs \n",secs);
data/dkopp-6.5/dkopp-6.5.cc:1360:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," backup speed: %.2f MB/sec \n",bspeed);
data/dkopp-6.5/dkopp-6.5.cc:1362:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," media may be OK: check with Verify \n");                 //  v.5.3
data/dkopp-6.5/dkopp-6.5.cc:1386:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** no files for backup \n");
data/dkopp-6.5/dkopp-6.5.cc:1391:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** no DVD/BD files \n");
data/dkopp-6.5/dkopp-6.5.cc:1397:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," files: %d  bytes: %.0f \n",Mfiles,Mbytes);               //  files and bytes to copy
data/dkopp-6.5/dkopp-6.5.cc:1400:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," nothing to back-up \n");
data/dkopp-6.5/dkopp-6.5.cc:1408:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** cannot open /tmp scratch file \n");
data/dkopp-6.5/dkopp-6.5.cc:1446:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(command,"/usr/bin/growisofs -M %s %s -r -graft-points "         //  build growisofs command line
data/dkopp-6.5/dkopp-6.5.cc:1462:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," backup time: %.0f secs \n",secs);
data/dkopp-6.5/dkopp-6.5.cc:1464:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," backup speed: %.2f MB/sec \n",bspeed);
data/dkopp-6.5/dkopp-6.5.cc:1465:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," backup complete \n");
data/dkopp-6.5/dkopp-6.5.cc:1520:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," %d files on DVD/BD \n",Vnf);
data/dkopp-6.5/dkopp-6.5.cc:1531:17:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (Fgui) wprintf(mLog,"\n\n");                                      //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:1562:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog,"  %s \n",kleenex(filespec));                        //  output filespec
data/dkopp-6.5/dkopp-6.5.cc:1564:23:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         if (errmess) wprintf(mLog,"  *** %s \n",errmess);
data/dkopp-6.5/dkopp-6.5.cc:1579:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," Compare to disk files with matching names and mod times.\n");
data/dkopp-6.5/dkopp-6.5.cc:1580:17:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (Fgui) wprintf(mLog,"\n\n");                                      //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:1616:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," DVD/BD files: %d  bytes: %.0f \n",vfiles,vbytes);
data/dkopp-6.5/dkopp-6.5.cc:1617:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," DVD/BD read errors: %d \n",verrs);
data/dkopp-6.5/dkopp-6.5.cc:1620:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," matching disk names: %d  mod times: %d \n",dfiles1,dfiles2);
data/dkopp-6.5/dkopp-6.5.cc:1621:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," compare failures: %d \n",cerrs);
data/dkopp-6.5/dkopp-6.5.cc:1625:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," verify time: %.0f secs \n",secs);
data/dkopp-6.5/dkopp-6.5.cc:1627:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," verify speed: %.2f MB/sec \n",vspeed);
data/dkopp-6.5/dkopp-6.5.cc:1630:9:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   else wprintf(mLog," NO ERRORS \n");
data/dkopp-6.5/dkopp-6.5.cc:1633:15:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (! Vnf) wprintf(mLog," *** no files on DVD/BD \n");
data/dkopp-6.5/dkopp-6.5.cc:1636:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:1668:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** backup job is invalid \n");
data/dkopp-6.5/dkopp-6.5.cc:1677:28:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (BJfiles[ii] > 0) wprintf(mLog," %6d %9s %3d", BJfiles[ii], bytes, BJdvdno[ii]);
data/dkopp-6.5/dkopp-6.5.cc:1678:28:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (BJfiles[ii] < 0) wprintf(mLog," %6d %9s    ", BJfiles[ii], bytes);
data/dkopp-6.5/dkopp-6.5.cc:1679:29:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (BJfiles[ii] == 0) wprintf(mLog,"                     ");
data/dkopp-6.5/dkopp-6.5.cc:1680:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog,"   %s \n",BJinex[ii]);
data/dkopp-6.5/dkopp-6.5.cc:1684:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," %6d %9s       TOTAL   %d disks \n", Dnf, bytes, BJndvd);
data/dkopp-6.5/dkopp-6.5.cc:1687:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:1699:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** backup job is invalid \n");
data/dkopp-6.5/dkopp-6.5.cc:1707:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n disk files: %d  DVD/BD files: %d \n",Dnf,Vnf);
data/dkopp-6.5/dkopp-6.5.cc:1708:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n Differences between DVD/BD and files on disk: \n");
data/dkopp-6.5/dkopp-6.5.cc:1709:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," %7d  disk files not on DVD/BD - new \n",nnew);
data/dkopp-6.5/dkopp-6.5.cc:1710:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," %7d  files on disk and DVD/BD - unchanged \n",nunc);
data/dkopp-6.5/dkopp-6.5.cc:1711:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," %7d  files on disk and DVD/BD - modified \n",nmod);
data/dkopp-6.5/dkopp-6.5.cc:1712:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," %7d  DVD/BD files not on disk - deleted \n",ndel);
data/dkopp-6.5/dkopp-6.5.cc:1715:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," Total differences: %d files  %s \n",nnew+ndel+nmod,bytes);
data/dkopp-6.5/dkopp-6.5.cc:1718:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:1733:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** backup job is invalid \n");
data/dkopp-6.5/dkopp-6.5.cc:1744:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n Disk:DVD/BD differences by directory \n");
data/dkopp-6.5/dkopp-6.5.cc:1746:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"   new   mod   del   bytes   directory \n");
data/dkopp-6.5/dkopp-6.5.cc:1764:26:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         if (kfiles > 0) wprintf(mLog," %5d %5d %5d %8s  %s \n",           //                         v.5.2
data/dkopp-6.5/dkopp-6.5.cc:1767:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(ppdirk,pdirk);                                             //  start new directory
data/dkopp-6.5/dkopp-6.5.cc:1797:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," %5d %5d %5d %8s  %s \n",knew,kmod,kdel,bytes,ppdirk);
data/dkopp-6.5/dkopp-6.5.cc:1804:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:1816:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** backup job is invalid \n");
data/dkopp-6.5/dkopp-6.5.cc:1822:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n Detailed list of disk:DVD/BD differences: \n");
data/dkopp-6.5/dkopp-6.5.cc:1824:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n %d new files (on disk, not on DVD/BD) \n",nnew);
data/dkopp-6.5/dkopp-6.5.cc:1829:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog,"  %s \n",kleenex(Drec[dii].file));
data/dkopp-6.5/dkopp-6.5.cc:1833:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n %d modified files (disk and DVD/BD files are different) \n",nmod);
data/dkopp-6.5/dkopp-6.5.cc:1838:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog,"  %s \n",kleenex(Drec[dii].file));
data/dkopp-6.5/dkopp-6.5.cc:1842:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n %d deleted files (on DVD/BD, not on disk) \n",ndel);
data/dkopp-6.5/dkopp-6.5.cc:1847:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog,"  %s \n",kleenex(Vrec[vii].file));
data/dkopp-6.5/dkopp-6.5.cc:1852:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:1864:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** backup job is invalid \n");
data/dkopp-6.5/dkopp-6.5.cc:1868:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n List all files for backup: \n");
data/dkopp-6.5/dkopp-6.5.cc:1871:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"   %d files found \n",Dnf);
data/dkopp-6.5/dkopp-6.5.cc:1876:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," %s \n",kleenex(Drec[dii].file));
data/dkopp-6.5/dkopp-6.5.cc:1880:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:1892:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n List all files on DVD/BD: \n");
data/dkopp-6.5/dkopp-6.5.cc:1895:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"   %d files found \n",Vnf);
data/dkopp-6.5/dkopp-6.5.cc:1900:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," %s \n",kleenex(Vrec[vii].file));
data/dkopp-6.5/dkopp-6.5.cc:1920:9:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   else wprintf(mLog," DVD/BD not mounted \n");
data/dkopp-6.5/dkopp-6.5.cc:1922:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n find files matching wildcard pattern \n");             //  get search pattern
data/dkopp-6.5/dkopp-6.5.cc:1927:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," search pattern: %s \n",fspec2);
data/dkopp-6.5/dkopp-6.5.cc:1935:13:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            wprintf(mLog,"  %s \n",kleenex(Drec[dii].file));
data/dkopp-6.5/dkopp-6.5.cc:1944:13:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            wprintf(mLog,"  %s \n",kleenex(Vrec[vii].file));
data/dkopp-6.5/dkopp-6.5.cc:1963:17:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (nn == 0) wprintf(mLog," no history files found \n");
data/dkopp-6.5/dkopp-6.5.cc:1964:23:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (nn == maxhist) wprintf(mLog," *** too many history files, please purge");
data/dkopp-6.5/dkopp-6.5.cc:1972:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog,"  %s \n",hfile1);
data/dkopp-6.5/dkopp-6.5.cc:1976:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog,"   *** file open error \n");
data/dkopp-6.5/dkopp-6.5.cc:1986:19:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  wprintf(mLog,"    %s \n",buff);
data/dkopp-6.5/dkopp-6.5.cc:1994:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2012:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," available history files in %s \n",userdir);
data/dkopp-6.5/dkopp-6.5.cc:2029:17:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (nn == 0) wprintf(mLog," no history files found \n");
data/dkopp-6.5/dkopp-6.5.cc:2030:23:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (nn == maxhist) wprintf(mLog," *** too many history files, please purge");
data/dkopp-6.5/dkopp-6.5.cc:2036:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," dkopp-hist-%s \n",pvlist_get(flist,ii));
data/dkopp-6.5/dkopp-6.5.cc:2059:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2071:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n Restore files from DVD/BD \n");   
data/dkopp-6.5/dkopp-6.5.cc:2074:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"   %d files on DVD/BD \n",Vnf);
data/dkopp-6.5/dkopp-6.5.cc:2102:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(editwidget,"%s""\n",RJinex[ii]);                             //   pack into file selection edit box
data/dkopp-6.5/dkopp-6.5.cc:2137:12:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      pp = wscanf(editwidget,ftf);
data/dkopp-6.5/dkopp-6.5.cc:2144:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** exceed %d include/exclude recs \n",maxnx); 
data/dkopp-6.5/dkopp-6.5.cc:2150:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(fcfrom,dvdmp);                                                //  start at /media/xxxx/home/xxxx/
data/dkopp-6.5/dkopp-6.5.cc:2151:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(fcfrom,RJfrom);
data/dkopp-6.5/dkopp-6.5.cc:2159:9:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   else wprintf(mLog," *** correct errors in restore job \n");
data/dkopp-6.5/dkopp-6.5.cc:2176:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** restore job has errors \n");
data/dkopp-6.5/dkopp-6.5.cc:2180:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n copy %d files from DVD/BD: %s \n",Rnf, RJfrom);
data/dkopp-6.5/dkopp-6.5.cc:2181:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"    to directory: %s \n",RJto);
data/dkopp-6.5/dkopp-6.5.cc:2182:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n resulting files will be the following: \n");
data/dkopp-6.5/dkopp-6.5.cc:2195:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** not within copy-from: %s \n",kleenex(file1));
data/dkopp-6.5/dkopp-6.5.cc:2200:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(file2,RJto);
data/dkopp-6.5/dkopp-6.5.cc:2201:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(file2+cc2,file1+cc1);
data/dkopp-6.5/dkopp-6.5.cc:2202:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," %s \n",kleenex(file2));
data/dkopp-6.5/dkopp-6.5.cc:2206:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2221:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** restore job has errors \n");
data/dkopp-6.5/dkopp-6.5.cc:2237:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dfile,RJto);                                                  //  to: /destination/filespec
data/dkopp-6.5/dkopp-6.5.cc:2238:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(dfile,Rrec[ii].file+ccf);
data/dkopp-6.5/dkopp-6.5.cc:2239:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," %s \n",kleenex(dfile));
data/dkopp-6.5/dkopp-6.5.cc:2241:20:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (errmess) wprintf(mLog," *** %s \n",errmess);
data/dkopp-6.5/dkopp-6.5.cc:2249:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2289:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(dvddevs[ndvds],pp);                                        //  save DVD/BD device
data/dkopp-6.5/dkopp-6.5.cc:2297:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dvddevdesc[ii],dvddevs[ii]);
data/dkopp-6.5/dkopp-6.5.cc:2299:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(dvddevdesc[ii],dvddesc[ii]);
data/dkopp-6.5/dkopp-6.5.cc:2302:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," DVD/BD devices found: %d \n",ndvds);                     //  output list of DVDs    v.5.1
data/dkopp-6.5/dkopp-6.5.cc:2304:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," %s %s \n",dvddevs[ii],dvddesc[ii]);
data/dkopp-6.5/dkopp-6.5.cc:2367:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," DVD/BD and mount point: %s %s \n",BJdvd,dvdmp);
data/dkopp-6.5/dkopp-6.5.cc:2368:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2381:19:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (*dvdlabel) wprintf(mLog," old DVD/BD label: %s \n",dvdlabel);
data/dkopp-6.5/dkopp-6.5.cc:2386:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," new DVD/BD label: %s \n",dvdlabel);
data/dkopp-6.5/dkopp-6.5.cc:2428:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," already mounted: %s %s \n",BJdvd,dvdmp);              //  v.6.5
data/dkopp-6.5/dkopp-6.5.cc:2436:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(mbuff,"mount -t iso9660 %s %s 2>&1",BJdvd,dvdmp);               //  mount the DVD/BD
data/dkopp-6.5/dkopp-6.5.cc:2462:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," %d %d mounted \n",BJdvd,dvdmp);
data/dkopp-6.5/dkopp-6.5.cc:2468:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(mbuff,"mount -t iso9660 %s %s 2>&1",BJdvd,dvdmp);            //  mount the DVD/BD
data/dkopp-6.5/dkopp-6.5.cc:2475:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," waiting for mount ... \n");
data/dkopp-6.5/dkopp-6.5.cc:2493:10:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   fid = popen(command,"r");
data/dkopp-6.5/dkopp-6.5.cc:2500:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(mbuff,dvdmp);
data/dkopp-6.5/dkopp-6.5.cc:2501:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(mbuff,V_DATETIME);                                               //  get last usage date/time if poss.
data/dkopp-6.5/dkopp-6.5.cc:2509:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," DVD/BD label: %s  last dkopp: %s \n",dvdlabel,mediumDT);
data/dkopp-6.5/dkopp-6.5.cc:2526:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(command,"umount %s 2>&1",dvdmp);                                //  use mount point     v.4.8
data/dkopp-6.5/dkopp-6.5.cc:2528:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2545:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(command,"eject %s 2>&1",BJdvd);
data/dkopp-6.5/dkopp-6.5.cc:2547:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2567:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2585:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(command,"growisofs -Z %s=/dev/zero %s 2>&1",BJdvd,gforce);
data/dkopp-6.5/dkopp-6.5.cc:2589:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2607:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(command,"dvd+rw-format -force %s 2>&1",BJdvd);
data/dkopp-6.5/dkopp-6.5.cc:2611:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (Fgui) wprintf(mLog," ready \n");                                    //  v.5.0
data/dkopp-6.5/dkopp-6.5.cc:2637:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," %s \n",dkopp_title);
data/dkopp-6.5/dkopp-6.5.cc:2638:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," free software: %s \n",dkopp_license);
data/dkopp-6.5/dkopp-6.5.cc:2709:19:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         if (err) wprintf(mLog," *** error: %s  file: %s \n",strerror(errno),kleenex(file2));
data/dkopp-6.5/dkopp-6.5.cc:2716:26:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         if (arg == 101) wprintf(editwidget,"include %s""\n",ppf);
data/dkopp-6.5/dkopp-6.5.cc:2717:26:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         if (arg == 102) wprintf(editwidget,"exclude %s""\n",ppf);
data/dkopp-6.5/dkopp-6.5.cc:2745:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(mediumDT,backupDT);
data/dkopp-6.5/dkopp-6.5.cc:2749:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** cannot open /tmp scratch file \n");
data/dkopp-6.5/dkopp-6.5.cc:2772:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** cannot open /tmp scratch file \n");
data/dkopp-6.5/dkopp-6.5.cc:2781:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dirk,Drec[ii].file);                                          //  next file on disk
data/dkopp-6.5/dkopp-6.5.cc:2795:13:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            wprintf(mLog," *** error: %s  file: %s \n",strerror(errno),kleenex(dirk));
data/dkopp-6.5/dkopp-6.5.cc:2807:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(pdirk,dirk);                                                  //  prior = this directory
data/dkopp-6.5/dkopp-6.5.cc:2809:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(file,Drec[ii].file);                                          //  disk file, again
data/dkopp-6.5/dkopp-6.5.cc:2813:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** error: %s  file: %s \n",strerror(errno),kleenex(file));
data/dkopp-6.5/dkopp-6.5.cc:2839:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n restore directory owner and permissions \n");
data/dkopp-6.5/dkopp-6.5.cc:2840:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"  for directories anchored at: %s \n",RJto);
data/dkopp-6.5/dkopp-6.5.cc:2845:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(poopfile,dvdmp);                                                 //  DVD/BD file with owner & permissions
data/dkopp-6.5/dkopp-6.5.cc:2846:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(poopfile,V_FILEPOOP);
data/dkopp-6.5/dkopp-6.5.cc:2850:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** cannot open DVD/BD file: %s \n",poopfile);
data/dkopp-6.5/dkopp-6.5.cc:2875:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(file2,RJto);                                                  //  copy-to location
data/dkopp-6.5/dkopp-6.5.cc:2876:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(file2 + cc2, file1 + cc1);                                    //  + org. file, less copy-from part
data/dkopp-6.5/dkopp-6.5.cc:2877:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," owner: %4d:%4d  permissions: %3o  file: %s \n",
data/dkopp-6.5/dkopp-6.5.cc:2880:16:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (err) wprintf(mLog," *** error: %s \n",strerror(errno));
data/dkopp-6.5/dkopp-6.5.cc:2882:16:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (err) wprintf(mLog," *** error: %s \n",strerror(errno));
data/dkopp-6.5/dkopp-6.5.cc:2907:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** cannot open dkopp-hist file \n");
data/dkopp-6.5/dkopp-6.5.cc:2935:13:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (err) wprintf(mLog," *** dkopp-hist file error %s \n",strerror(errno));
data/dkopp-6.5/dkopp-6.5.cc:3003:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** no job data present \n");
data/dkopp-6.5/dkopp-6.5.cc:3008:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," DVD/BD device: %s \n",BJdvd);
data/dkopp-6.5/dkopp-6.5.cc:3009:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," capacity GB: %.1f \n",BJcap);
data/dkopp-6.5/dkopp-6.5.cc:3011:22:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (BJspeed == 0) wprintf(mLog," write speed: default \n",BJspeed);     //  v.4.5
data/dkopp-6.5/dkopp-6.5.cc:3012:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   else  wprintf(mLog," write speed: %d (x 1.38 MB/sec) \n",BJspeed);
data/dkopp-6.5/dkopp-6.5.cc:3016:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** DVD/BD device is apparently invalid \n");
data/dkopp-6.5/dkopp-6.5.cc:3021:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** DVD/BD capacity is apparently invalid \n");
data/dkopp-6.5/dkopp-6.5.cc:3025:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," backup %s \n",BJbmode);
data/dkopp-6.5/dkopp-6.5.cc:3027:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** backup mode not full/incremental/accumulate \n");
data/dkopp-6.5/dkopp-6.5.cc:3031:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," verify %s \n",BJvmode);
data/dkopp-6.5/dkopp-6.5.cc:3033:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** verify mode not full/incremental/thorough \n");
data/dkopp-6.5/dkopp-6.5.cc:3037:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," file date from: %s \n",BJdatefrom);                      //  file age limit      v.4.8
data/dkopp-6.5/dkopp-6.5.cc:3053:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** date must be > 1970.01.01 \n");
data/dkopp-6.5/dkopp-6.5.cc:3060:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," *** %d errors \n",nerr);
data/dkopp-6.5/dkopp-6.5.cc:3077:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n Validate restore job data \n");
data/dkopp-6.5/dkopp-6.5.cc:3080:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** no job data present \n");
data/dkopp-6.5/dkopp-6.5.cc:3084:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," copy-from: %s \n",RJfrom);
data/dkopp-6.5/dkopp-6.5.cc:3085:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(rdirk,dvdmp);                                                    //  validate copy-from location
data/dkopp-6.5/dkopp-6.5.cc:3086:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(rdirk,RJfrom);                                                   //  /media/dvd/home/...
data/dkopp-6.5/dkopp-6.5.cc:3089:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** invalid copy-from location \n");
data/dkopp-6.5/dkopp-6.5.cc:3097:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"   copy-to: %s \n",RJto);
data/dkopp-6.5/dkopp-6.5.cc:3100:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** invalid copy-to location \n");
data/dkopp-6.5/dkopp-6.5.cc:3110:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," %d errors \n",nerr);
data/dkopp-6.5/dkopp-6.5.cc:3126:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(nxrec,inexrecs[ii]);
data/dkopp-6.5/dkopp-6.5.cc:3127:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," %s \n",nxrec);                                        //  output
data/dkopp-6.5/dkopp-6.5.cc:3134:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** cannot parse \n");                             //  cannot parse
data/dkopp-6.5/dkopp-6.5.cc:3140:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** invalid filespec \n");
data/dkopp-6.5/dkopp-6.5.cc:3178:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(bjrec,BJinex[ii]);                                            //  next record
data/dkopp-6.5/dkopp-6.5.cc:3214:16:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               wprintf(mLog," *** exceeded %d files \n",maxfs);
data/dkopp-6.5/dkopp-6.5.cc:3243:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** %s  omit: %s \n",strerror(errno),kleenex(Drec[ii].file));
data/dkopp-6.5/dkopp-6.5.cc:3258:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** omit file too big: %s \n",kleenex(Drec[ii].file));
data/dkopp-6.5/dkopp-6.5.cc:3282:14:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (nexc) wprintf(mLog," %d files excluded by selection date \n",nexc);
data/dkopp-6.5/dkopp-6.5.cc:3314:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," files for backup: %d  %s \n",nfiles,mbytes);
data/dkopp-6.5/dkopp-6.5.cc:3317:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** bug: nfiles: %d  Dnf: %d \n",nfiles,Dnf);
data/dkopp-6.5/dkopp-6.5.cc:3318:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** bug: nbytes: %.0f  Dbytes: %.0f \n",nbytes,Dbytes);
data/dkopp-6.5/dkopp-6.5.cc:3348:16:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (toobig) wprintf(mLog," *** warning: single include set exceeds DVD/BD capacity \n");
data/dkopp-6.5/dkopp-6.5.cc:3354:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** duplicate file: %s \n",kleenex(Drec[ii].file));
data/dkopp-6.5/dkopp-6.5.cc:3387:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(command,"find \"%s\" -type f -or -type l >%s",                  //  get regular files and symlinks
data/dkopp-6.5/dkopp-6.5.cc:3389:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," %s \n",command);
data/dkopp-6.5/dkopp-6.5.cc:3391:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system(command);                                                  //  list all DVD/BD files to temp file
data/dkopp-6.5/dkopp-6.5.cc:3393:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** find command failed: %s \n",wstrerror(err));
data/dkopp-6.5/dkopp-6.5.cc:3400:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," *** cannot open /tmp scratch file \n");
data/dkopp-6.5/dkopp-6.5.cc:3414:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** absurd file skipped: %300s (etc.) \n",kleenex(pp));
data/dkopp-6.5/dkopp-6.5.cc:3436:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," DVD/BD files: %d \n",Vnf);
data/dkopp-6.5/dkopp-6.5.cc:3454:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,"\n""find all DVD/BD files to restore \n");
data/dkopp-6.5/dkopp-6.5.cc:3458:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(rjrec,RJinex[ii]);                                            //  next record
data/dkopp-6.5/dkopp-6.5.cc:3459:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," %s \n",rjrec);                                        //  output
data/dkopp-6.5/dkopp-6.5.cc:3479:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog,"  %d files added \n",ninc);
data/dkopp-6.5/dkopp-6.5.cc:3497:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog,"  %d files removed \n",nexc);
data/dkopp-6.5/dkopp-6.5.cc:3519:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog," total file count: %d \n",Rnf);
data/dkopp-6.5/dkopp-6.5.cc:3526:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," *** not under copy-from; %s \n",Rrec[ii].file);
data/dkopp-6.5/dkopp-6.5.cc:3736:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(vfile1,dvdmp);                                                   //  prepend DVD/BD mount point
data/dkopp-6.5/dkopp-6.5.cc:3737:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(vfile1,vfile);
data/dkopp-6.5/dkopp-6.5.cc:3825:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(vfile,dvdmp);                                                    //  prepend mount point
data/dkopp-6.5/dkopp-6.5.cc:3925:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,-3," %s \n",kleenex(pdirk));                               //  output /directory
data/dkopp-6.5/dkopp-6.5.cc:3926:4:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   wprintf(mLog,-2," %s \n",kleenex(pfile));                               //          filename
data/dkopp-6.5/dkopp-6.5.cc:3937:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog,-3," *** %s  %s \n",errmess,kleenex(filespec));
data/dkopp-6.5/dkopp-6.5.cc:3938:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(mLog," \n");
data/dkopp-6.5/dkopp-6.5.cc:3999:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog," %s: %s \n",pname,kleenex(buff));
data/dkopp-6.5/dkopp-6.5.cc:4003:23:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         if (pscroll) wprintf(mLog,"\n");                                  //  transition from scroll to overlay
data/dkopp-6.5/dkopp-6.5.cc:4004:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog,-2," %s: %s \n",pname,kleenex(buff));                //  output, overlay prior output
data/dkopp-6.5/dkopp-6.5.cc:4008:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(buff,"pkill %s",subprocName);
data/dkopp-6.5/dkopp-6.5.cc:4009:10:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         wprintf(mLog,"*** %s \n",buff);
data/dkopp-6.5/dkopp-6.5.cc:4010:16:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
         err = system(buff);
data/dkopp-6.5/dkopp-6.5.cc:4026:13:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   if (err) wprintf(mLog," %s status: %d %s \n", pname, err, errmess);
data/dkopp-6.5/dkopp-6.5.cc:4027:9:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   else wprintf(mLog," %s status: OK \n",pname);
data/dkopp-6.5/zfuncs.cc:224:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pp,string);
data/dkopp-6.5/zfuncs.cc:236:4:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vprintf(format,arglist);
data/dkopp-6.5/zfuncs.cc:257:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(message,400,format,arglist);
data/dkopp-6.5/zfuncs.cc:275:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(command,tempfile);
data/dkopp-6.5/zfuncs.cc:277:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system(command);
data/dkopp-6.5/zfuncs.cc:311:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(message,300,format,arglist);
data/dkopp-6.5/zfuncs.cc:338:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system("cat zappcrash tracedump > zappcrash2");                   //  combine zappcrash and tracedump
data/dkopp-6.5/zfuncs.cc:339:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system("mv -f zappcrash2 zappcrash");
data/dkopp-6.5/zfuncs.cc:340:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system("xdg-open zappcrash");                                     //  popup zappcrash text file
data/dkopp-6.5/zfuncs.cc:477:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system(command);
data/dkopp-6.5/zfuncs.cc:481:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      err = system(command);
data/dkopp-6.5/zfuncs.cc:504:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system(command);
data/dkopp-6.5/zfuncs.cc:913:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(cbuff,cc,command,arglist);
data/dkopp-6.5/zfuncs.cc:916:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system(cbuff);
data/dkopp-6.5/zfuncs.cc:950:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(cbuff,cc,command,arglist);
data/dkopp-6.5/zfuncs.cc:954:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system(cbuff);
data/dkopp-6.5/zfuncs.cc:1018:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(command[ii],2000,Fcommand,arglist);
data/dkopp-6.5/zfuncs.cc:1034:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   err = system(command[ii]);                                              //  start command, wait until done
data/dkopp-6.5/zfuncs.cc:1092:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      vsnprintf(buff,9999,command,arglist);
data/dkopp-6.5/zfuncs.cc:1095:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      fid = popen(buff,"r");                                               //  execute command, output to FID
data/dkopp-6.5/zfuncs.cc:1144:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buff,"ps -C %s h o pid",pname);
data/dkopp-6.5/zfuncs.cc:1145:10:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   fid = popen(buff,"r");                                                  //  popen() instead of system()
data/dkopp-6.5/zfuncs.cc:1178:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      err = system(xtcommand);
data/dkopp-6.5/zfuncs.cc:1186:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      err = system(xtcommand);
data/dkopp-6.5/zfuncs.cc:1270:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(dirk,ppath);
data/dkopp-6.5/zfuncs.cc:1285:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(file,pp);                                                        //  file part
data/dkopp-6.5/zfuncs.cc:1292:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(ext,pp);                                                         //  .ext part
data/dkopp-6.5/zfuncs.cc:1723:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (dest != source) strcpy(dest,source);
data/dkopp-6.5/zfuncs.cc:1767:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (dest != source) strcpy(dest,source);
data/dkopp-6.5/zfuncs.cc:1870:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(dest,source);
data/dkopp-6.5/zfuncs.cc:1891:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(dest,source);
data/dkopp-6.5/zfuncs.cc:1924:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(strout,strin);
data/dkopp-6.5/zfuncs.cc:1960:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(ftemp,strout);
data/dkopp-6.5/zfuncs.cc:2037:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(work,pNum);
data/dkopp-6.5/zfuncs.cc:2038:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(work+k1,pNum+k2+1);
data/dkopp-6.5/zfuncs.cc:2039:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(pNum,work);
data/dkopp-6.5/zfuncs.cc:2074:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pp,string);
data/dkopp-6.5/zfuncs.cc:2485:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (pstr) strcpy(pstr+1,pstr+2);
data/dkopp-6.5/zfuncs.cc:2488:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (pstr) strcpy(pstr+1,pstr+2);
data/dkopp-6.5/zfuncs.cc:2491:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (pstr) strcpy(pstr+1,pstr+2);
data/dkopp-6.5/zfuncs.cc:2494:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (pstr) strcpy(pstr+2,pstr+3);
data/dkopp-6.5/zfuncs.cc:2497:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (pstr) strcpy(pstr+2,pstr+3);
data/dkopp-6.5/zfuncs.cc:2747:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(command,"find \"%s\" -type f -or -type l",searchpath);       //  find files (ordinary, symlink)
data/dkopp-6.5/zfuncs.cc:2748:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      fid = popen(command,"r");
data/dkopp-6.5/zfuncs.cc:2821:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(command,"find \"%s\" -type f -or -type l",searchpath);       //  find files (ordinary, symlink)
data/dkopp-6.5/zfuncs.cc:2822:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      fid = popen(command,"r");
data/dkopp-6.5/zfuncs.cc:3746:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(message,199,format,arglist);
data/dkopp-6.5/zfuncs.cc:3854:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(zappname,appname);                                               //  save app name                   v.5.6
data/dkopp-6.5/zfuncs.cc:3861:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(zprefix,work);                                                   //  /prefix
data/dkopp-6.5/zfuncs.cc:3930:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(filespec,filetype);                                              //  leave /type as default
data/dkopp-6.5/zfuncs.cc:3932:32:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (strEqu(filetype,"doc")) strcpy(filespec,zdocdir);                   //  /usr/share/doc/appname
data/dkopp-6.5/zfuncs.cc:3933:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (strEqu(filetype,"data")) strcpy(filespec,zdatadir);                 //  /usr/share/appname/data
data/dkopp-6.5/zfuncs.cc:3934:35:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (strEqu(filetype,"locale")) strcpy(filespec,zlocalesdir);            //  /usr/share/appname/locales
data/dkopp-6.5/zfuncs.cc:3935:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (strEqu(filetype,"user")) strcpy(filespec,zuserdir);                 //  /home/<user>/.appname
data/dkopp-6.5/zfuncs.cc:3937:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(filespec,zuserdir);                                           //  /home/<user>/.appname/locales
data/dkopp-6.5/zfuncs.cc:3944:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(fext,pp);                                                     //  file type  .fext
data/dkopp-6.5/zfuncs.cc:3956:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(filespec+cc+1,fname);                                            //  /directories.../fname
data/dkopp-6.5/zfuncs.cc:3960:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pp,lc_RC);                                                       //  /directories.../fname-lc_RC.fext
data/dkopp-6.5/zfuncs.cc:3961:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(pp,fext);
data/dkopp-6.5/zfuncs.cc:3965:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pp+3,fext);                                                      //  /directories.../fname-lc.fext
data/dkopp-6.5/zfuncs.cc:3970:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(pp,fext);
data/dkopp-6.5/zfuncs.cc:3974:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pp,fext);                                                        //  /directories.../fname.fext
data/dkopp-6.5/zfuncs.cc:3979:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(filespec,zdocdir);                                            //    /usr/share/doc/appname/extras
data/dkopp-6.5/zfuncs.cc:4083:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      err = system("which firefox");                                       //  use xdg-open only as last resort
data/dkopp-6.5/zfuncs.cc:4086:16:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
         err = system("which chromium-browser");
data/dkopp-6.5/zfuncs.cc:4089:19:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            err = system("which xdg-open");
data/dkopp-6.5/zfuncs.cc:4127:10:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   fid = popen(xdgcomm,"r");                                               //  get desktop directory for user locale
data/dkopp-6.5/zfuncs.cc:4132:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
   int nn = fscanf(fid,"%s",dtdir);
data/dkopp-6.5/zfuncs.cc:4339:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(poname,pp+1);   
data/dkopp-6.5/zfuncs.cc:4350:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(ponamexx,poname);
data/dkopp-6.5/zfuncs.cc:4351:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(poname+(pp+1-poname),zlang);                               //  translate-en.po >> translate-xx.po
data/dkopp-6.5/zfuncs.cc:4356:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(localpo,"%s/%s",ulocalesdir,poname);                         //  final uncompressed local .po file
data/dkopp-6.5/zfuncs.cc:4671:6:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void wprintf(GtkWidget *mLog, int line, cchar *format, ... )               //  "printf" version
data/dkopp-6.5/zfuncs.cc:4677:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(message,999,format,arglist);
data/dkopp-6.5/zfuncs.cc:4684:6:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void wprintf(GtkWidget *mLog, cchar *format, ... )                         //  "printf", scrolling output
data/dkopp-6.5/zfuncs.cc:4690:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(message,999,format,arglist);                                  //  stop overflow, remove warning
data/dkopp-6.5/zfuncs.cc:4771:8:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
char * wscanf(GtkWidget *mLog, int & ftf)
data/dkopp-6.5/zfuncs.cc:4836:14:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      prec = wscanf(mLog,ftf);                                             //  get text line
data/dkopp-6.5/zfuncs.cc:6120:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mdesc+1,desc);
data/dkopp-6.5/zfuncs.cc:7891:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(zdposn[nn].wintitle,wintitle);
data/dkopp-6.5/zfuncs.cc:8045:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(zdposn[ii].wintitle,wintitle);                                //  add window to table
data/dkopp-6.5/zfuncs.cc:8135:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(wname[ii],pp1);                                         //  save widget name and data
data/dkopp-6.5/zfuncs.cc:8136:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(wdata2,pp2);
data/dkopp-6.5/zfuncs.cc:8376:17:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if (mWin) wprintf(mLog," %s\n",text);
data/dkopp-6.5/zfuncs.cc:8454:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(message,999,format,arglist);
data/dkopp-6.5/zfuncs.cc:8484:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(message,999,format,arglist);
data/dkopp-6.5/zfuncs.cc:8511:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(message,400,format,arglist);
data/dkopp-6.5/zfuncs.cc:8548:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(message,400,format,arglist);
data/dkopp-6.5/zfuncs.cc:8744:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(ptext,text);
data/dkopp-6.5/zfuncs.cc:8797:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(ptext,text);
data/dkopp-6.5/zfuncs.cc:9363:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(imagesize,100,formatsize,pwidth,pheight);                      //  show print size in dialog
data/dkopp-6.5/zfuncs.cc:9398:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(imagesize,100,formatsize,pwidth,pheight);                      //  show print size in dialog
data/dkopp-6.5/zfuncs.cc:9868:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (pp) strcpy(pp+1,pfile);                                          //      in same directory as prior
data/dkopp-6.5/zfuncs.cc:9932:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (pp) strcpy(pp+1,pfile);                                          //      in same directory as prior
data/dkopp-6.5/zfuncs.cc:10017:7:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      wprintf(textWin," %s  %.12g \n",pname,pvalue);
data/dkopp-6.5/zfuncs.cc:10227:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (xcc) strcpy(xpp,string);                                            //  copy string
data/dkopp-6.5/zfuncs.cc:10240:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(xpp,xstr.xpp);                                                   //  copy string
data/dkopp-6.5/zfuncs.cc:10272:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(xpp,xstr.xpp);                                                   //  copy string
data/dkopp-6.5/zfuncs.cc:10292:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (xcc) strcpy(xpp,str);                                               //  copy string
data/dkopp-6.5/zfuncs.cc:10302:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(temp.xpp,x1.xpp);                                                //    with both input strings
data/dkopp-6.5/zfuncs.cc:10303:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(temp.xpp + x1.xcc, x2.xpp);
data/dkopp-6.5/zfuncs.cc:10316:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(temp.xpp,x1.xpp);                                                //    with both input strings
data/dkopp-6.5/zfuncs.cc:10317:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (s2) strcpy(temp.xpp + x1.xcc, s2);
data/dkopp-6.5/zfuncs.cc:10330:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (s1) strcpy(temp.xpp,s1);                                            //    with both input strings
data/dkopp-6.5/zfuncs.cc:10331:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(temp.xpp + cc1, x2.xpp);
data/dkopp-6.5/zfuncs.cc:10354:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(xpp2,xpp);                                                    //  copy to new space
data/dkopp-6.5/zfuncs.cc:10389:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(xpp2,xpp);                                                    //  copy to new space
data/dkopp-6.5/zfuncs.cc:10798:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(string,table+pos);                                            //  return string
data/dkopp-6.5/zfuncs.cc:11052:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(tname,name);
data/dkopp-6.5/zfuncs.h:303:6:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void wprintf(GtkWidget *Win, int line, cchar *format, ...);                //  "printf" version
data/dkopp-6.5/zfuncs.h:304:6:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void wprintf(GtkWidget *Win, cchar *format, ... );                         //  "printf" to next line, scroll up
data/dkopp-6.5/zfuncs.h:308:8:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
char * wscanf(GtkWidget *Win, int &ftf);                                   //  get text lines from edit widget
data/dkopp-6.5/dkopp-6.5.cc:512:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   home = getenv("HOME");                                                  //  get "/home/username"
data/dkopp-6.5/zfuncs.cc:3606:11:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   return nrand48((unsigned int16 *) seed);
data/dkopp-6.5/zfuncs.cc:3619:11:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   return erand48((unsigned int16 *) seed);
data/dkopp-6.5/zfuncs.cc:3871:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   snprintf(zuserdir,199,"%s/.%s",getenv("HOME"),zappname);                //  /home/<username>/.appname/
data/dkopp-6.5/zfuncs.cc:4291:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      pp = getenv("LANG");                                                 //  use $LANG if defined
data/dkopp-6.5/zfuncs.cc:4292:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if (! pp) pp = getenv("LANGUAGE");                                   //  use $LANGUAGE if defined 
data/dkopp-6.5/dkopp-6.5.cc:77:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     subprocName[20];                                                  //  name of created subprocess
data/dkopp-6.5/dkopp-6.5.cc:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     scriptParam[200];                                                 //  parameter from script file
data/dkopp-6.5/dkopp-6.5.cc:79:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     mbmode[20], mvmode[20];                                           //  actual backup, verify modes
data/dkopp-6.5/dkopp-6.5.cc:81:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     scrFile[maxfcc];                                                  //  command line script file
data/dkopp-6.5/dkopp-6.5.cc:82:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     backupDT[16];                                                     //  nominal backup date: yyyymmdd-hhmm
data/dkopp-6.5/dkopp-6.5.cc:84:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     userdir[200];                                                     //  /home/user/.dkopp
data/dkopp-6.5/dkopp-6.5.cc:85:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     TFdiskfiles[200], TFdvdfiles[200];                                //  scratch files in userdir
data/dkopp-6.5/dkopp-6.5.cc:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     TFjobfile[200], TFfilepoop[200], TFdatetime[200];
data/dkopp-6.5/dkopp-6.5.cc:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     TFrestorefiles[200], TFrestoredirks[200];
data/dkopp-6.5/dkopp-6.5.cc:92:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     dvddevs[8][20];                                                   //  DVD/BD devices, /dev/sr0 etc.
data/dkopp-6.5/dkopp-6.5.cc:93:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     dvddesc[8][40];                                                   //  DVD/BD device descriptions
data/dkopp-6.5/dkopp-6.5.cc:94:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     dvddevdesc[8][60];                                                //  combined device and description
data/dkopp-6.5/dkopp-6.5.cc:98:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     BJfile[maxfcc];                                                   //  backup job file
data/dkopp-6.5/dkopp-6.5.cc:99:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     BJdvd[20];                                                        //  DVD/BD device: /dev/hdb
data/dkopp-6.5/dkopp-6.5.cc:102:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     BJbmode[20];                                                      //  backup: full/incremental/accumulate
data/dkopp-6.5/dkopp-6.5.cc:103:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     BJvmode[20];                                                      //  verify: full/incremental/thorough
data/dkopp-6.5/dkopp-6.5.cc:104:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     BJdatefrom[12];                                                   //  mod date selection, yyyy.mm.dd
data/dkopp-6.5/dkopp-6.5.cc:109:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    *BJinex[maxnx];                                                    //  backup include/exclude records
data/dkopp-6.5/dkopp-6.5.cc:117:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     dvdmp[100];                                                       //  mount point, /media/xxxxx
data/dkopp-6.5/dkopp-6.5.cc:120:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     mediumDT[16];                                                     //  DVD/BD medium last use date-time
data/dkopp-6.5/dkopp-6.5.cc:123:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     dvdlabel[32];                                                     //  DVD/BD label
data/dkopp-6.5/dkopp-6.5.cc:165:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    *RJinex[maxnx];                                                    //  file restore include/exclude recs.
data/dkopp-6.5/dkopp-6.5.cc:168:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     RJfrom[maxfcc];                                                   //  restore copy-from: /home/.../
data/dkopp-6.5/dkopp-6.5.cc:169:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     RJto[maxfcc];                                                     //  restore copy-to: /home/.../
data/dkopp-6.5/dkopp-6.5.cc:277:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     menu1[20], menu2[40];                                          //  top-menu, sub-menu
data/dkopp-6.5/dkopp-6.5.cc:495:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(BJdvd,"/dev/sr0");                                               //  default DVD/BD device
data/dkopp-6.5/dkopp-6.5.cc:496:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(dvdmp,"/media/dkopp");                                           //  default mount point    v.5.1
data/dkopp-6.5/dkopp-6.5.cc:500:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(dvdlabel,"dkopp");                                               //  default DVD/BD label      v.5.1
data/dkopp-6.5/dkopp-6.5.cc:501:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(BJbmode,"full");                                                 //  backup mode
data/dkopp-6.5/dkopp-6.5.cc:502:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(BJvmode,"full");                                                 //  verify mode
data/dkopp-6.5/dkopp-6.5.cc:505:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(BJdatefrom,"1970.01.01");                                        //  file age exclusion default   v.4.8
data/dkopp-6.5/dkopp-6.5.cc:514:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(BJinex[0],"# dkopp default backup job");                         //  initz. default backup specs
data/dkopp-6.5/dkopp-6.5.cc:522:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(RJfrom,"/home/");                                                //  file restore copy-from location
data/dkopp-6.5/dkopp-6.5.cc:523:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(RJto,"/home/");                                                  //  file restore copy-to location
data/dkopp-6.5/dkopp-6.5.cc:527:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(mediumDT,"unknown");                                             //  DVD/BD medium last backup date-time
data/dkopp-6.5/dkopp-6.5.cc:554:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     button2[20], *pp;
data/dkopp-6.5/dkopp-6.5.cc:571:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    menu1[20] = "", menu2[40] = "";
data/dkopp-6.5/dkopp-6.5.cc:573:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           command[100];
data/dkopp-6.5/dkopp-6.5.cc:623:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     buff[200], menu1[20], menu2[40];
data/dkopp-6.5/dkopp-6.5.cc:627:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(scrFile,"r");                                               //  open file
data/dkopp-6.5/dkopp-6.5.cc:828:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   if (! *BJfile) strcpy(BJfile,"dkopp.job");                              //  if no job file, use default
data/dkopp-6.5/dkopp-6.5.cc:849:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           buff[1000];
data/dkopp-6.5/dkopp-6.5.cc:851:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           rtype2[20];
data/dkopp-6.5/dkopp-6.5.cc:860:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(fspec,"r");                                                 //  open file
data/dkopp-6.5/dkopp-6.5.cc:954:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(fspec,"w");                                                 //  open file
data/dkopp-6.5/dkopp-6.5.cc:988:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     vjfile[100];
data/dkopp-6.5/dkopp-6.5.cc:1155:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           text[40], *pp;
data/dkopp-6.5/dkopp-6.5.cc:1167:42:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   zdialog_fetch(zd,"bmrb1",ii); if (ii) strcpy(BJbmode,"full");           //  backup mode
data/dkopp-6.5/dkopp-6.5.cc:1168:42:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   zdialog_fetch(zd,"bmrb2",ii); if (ii) strcpy(BJbmode,"incremental");
data/dkopp-6.5/dkopp-6.5.cc:1169:42:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   zdialog_fetch(zd,"bmrb3",ii); if (ii) strcpy(BJbmode,"accumulate");
data/dkopp-6.5/dkopp-6.5.cc:1171:42:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   zdialog_fetch(zd,"vmrb1",ii); if (ii) strcpy(BJvmode,"full");           //  verify mode
data/dkopp-6.5/dkopp-6.5.cc:1172:42:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   zdialog_fetch(zd,"vmrb2",ii); if (ii) strcpy(BJvmode,"incremental");
data/dkopp-6.5/dkopp-6.5.cc:1173:42:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   zdialog_fetch(zd,"vmrb3",ii); if (ii) strcpy(BJvmode,"thorough");
data/dkopp-6.5/dkopp-6.5.cc:1234:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        command[200], Nspeed[20] = "";
data/dkopp-6.5/dkopp-6.5.cc:1235:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        *dfile, vfile[maxfcc], *mbytes;
data/dkopp-6.5/dkopp-6.5.cc:1249:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   if (! *dvdlabel) strcpy(dvdlabel,"dkopp");                              //  if no label, default "dkopp"    v.5.1
data/dkopp-6.5/dkopp-6.5.cc:1265:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fid = fopen(TFdiskfiles,"w");                                        //  temp file for growisofs path-list
data/dkopp-6.5/dkopp-6.5.cc:1287:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if (BJspeed > 0) sprintf(Nspeed,"-speed=%d",BJspeed);                //  v.4.5
data/dkopp-6.5/dkopp-6.5.cc:1373:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           command[200], Nspeed[20] = "";
data/dkopp-6.5/dkopp-6.5.cc:1374:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           *dfile, vfile[maxfcc], disp;
data/dkopp-6.5/dkopp-6.5.cc:1404:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   if (! *dvdlabel) strcpy(dvdlabel,"dkopp");                              //  if no label, default "dkopp"    v.5.1
data/dkopp-6.5/dkopp-6.5.cc:1406:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(TFdiskfiles,"w");                                           //  temp file for growisofs path-list
data/dkopp-6.5/dkopp-6.5.cc:1442:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   if (BJspeed > 0) sprintf(Nspeed,"-speed=%d",BJspeed);                   //  v.4.5
data/dkopp-6.5/dkopp-6.5.cc:1729:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        *pp, *pdirk, *bytes, ppdirk[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:1913:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    fspec2[200] = "/home/*/file*";
data/dkopp-6.5/dkopp-6.5.cc:1914:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           hfile[200], buff[1000], *pp;
data/dkopp-6.5/dkopp-6.5.cc:1974:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fid = fopen(hfile1,"r");                                             //  next history file
data/dkopp-6.5/dkopp-6.5.cc:2005:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           fspec2[200], histfile[200];
data/dkopp-6.5/dkopp-6.5.cc:2114:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           text[40], *pp, fcfrom[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:2173:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     *file1, file2[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:2217:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        dfile[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:2262:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        command[20] = "lshw -class disk";                           //  better than udevadm
data/dkopp-6.5/dkopp-6.5.cc:2298:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(dvddevdesc[ii],"  ");
data/dkopp-6.5/dkopp-6.5.cc:2315:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           *pp2, text[60];
data/dkopp-6.5/dkopp-6.5.cc:2382:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   else  strcpy(dvdlabel,"dkopp");
data/dkopp-6.5/dkopp-6.5.cc:2396:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           command[100], mbuff[100], *pp;
data/dkopp-6.5/dkopp-6.5.cc:2408:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(mediumDT,"unknown");
data/dkopp-6.5/dkopp-6.5.cc:2502:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(mbuff,"r");
data/dkopp-6.5/dkopp-6.5.cc:2520:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     command[60];
data/dkopp-6.5/dkopp-6.5.cc:2539:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     command[60];
data/dkopp-6.5/dkopp-6.5.cc:2577:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        command[200];
data/dkopp-6.5/dkopp-6.5.cc:2599:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        command[60];
data/dkopp-6.5/dkopp-6.5.cc:2711:41:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         if (S_ISDIR(filestat.st_mode)) strcat(file2,"/*");                //  if directory, append wildcard
data/dkopp-6.5/dkopp-6.5.cc:2747:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(TFdatetime,"w");
data/dkopp-6.5/dkopp-6.5.cc:2767:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           file[maxfcc], dirk[maxfcc], pdirk[maxfcc], *pp;
data/dkopp-6.5/dkopp-6.5.cc:2770:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(TFfilepoop,"w");
data/dkopp-6.5/dkopp-6.5.cc:2836:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        file1[maxfcc], file2[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:2837:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        poopfile[100];
data/dkopp-6.5/dkopp-6.5.cc:2848:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(poopfile,"r");
data/dkopp-6.5/dkopp-6.5.cc:2896:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        backupfile[200], buff[230];
data/dkopp-6.5/dkopp-6.5.cc:2905:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(backupfile,"w");
data/dkopp-6.5/dkopp-6.5.cc:3072:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     rdirk[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:3121:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    *rtype, *fspec, nxrec[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:3156:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           *rtype, *fspec, bjrec[maxfcc], *mbytes;
data/dkopp-6.5/dkopp-6.5.cc:3375:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           command[100], *pp;
data/dkopp-6.5/dkopp-6.5.cc:3376:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           fspec1[maxfcc], fspec2[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:3398:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(TFdvdfiles,"r");                                            //  read file list
data/dkopp-6.5/dkopp-6.5.cc:3445:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char       *rtype, *fspec, fspecx[maxfcc], rjrec[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:3729:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char              vfile1[maxfcc], vfilex[maxfcc];
data/dkopp-6.5/dkopp-6.5.cc:3731:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char              *pp, buff[vrcc];
data/dkopp-6.5/dkopp-6.5.cc:3740:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid1 = open(vfilex,O_RDONLY+O_NOATIME+O_LARGEFILE);                     //  open input file
data/dkopp-6.5/dkopp-6.5.cc:3743:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid2 = open(dfile,O_WRONLY+O_CREAT+O_TRUNC+O_LARGEFILE,0700);           //  open output file
data/dkopp-6.5/dkopp-6.5.cc:3760:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fid2 = open(dfile,O_WRONLY+O_CREAT+O_TRUNC+O_LARGEFILE,0700);        //  open output file again
data/dkopp-6.5/dkopp-6.5.cc:3818:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           vfile[maxfcc], *vbuff = 0, *dbuff = 0;
data/dkopp-6.5/dkopp-6.5.cc:3834:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   vfid = open(vfile,open_flags);                                          //  open DVD/BD file
data/dkopp-6.5/dkopp-6.5.cc:3853:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   vfid = open(vfile,open_flags);                                          //  open DVD/BD file
data/dkopp-6.5/dkopp-6.5.cc:3856:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   dfid = open(dfile,open_flags);                                          //  open corresp. disk file
data/dkopp-6.5/dkopp-6.5.cc:3907:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        pdirk[300], pfile[300], *pp;
data/dkopp-6.5/dkopp-6.5.cc:3949:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    name2[1000];
data/dkopp-6.5/dkopp-6.5.cc:3970:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        buff[1000];
data/dkopp-6.5/zfuncs.cc:181:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        zappname[20];                                               //  app name/version
data/dkopp-6.5/zfuncs.cc:182:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        zprefix[200], zdatadir[200], zdocdir[200];                  //  app directories
data/dkopp-6.5/zfuncs.cc:183:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        zicondir[200], zlocalesdir[200], zuserdir[200];
data/dkopp-6.5/zfuncs.cc:184:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        zlang[8] = "en";                                            //  "lc" or "lc_RC"
data/dkopp-6.5/zfuncs.cc:185:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        JPGquality[4] = "90";                                       //  JPG file save quality
data/dkopp-6.5/zfuncs.cc:252:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        message[400], tempfile[30], command[100];
data/dkopp-6.5/zfuncs.cc:264:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(message,"                              ");                    //  lengthen short message
data/dkopp-6.5/zfuncs.cc:268:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(tempfile,"/tmp/zpopup-%06d",getpid());                          //  write message to temp file
data/dkopp-6.5/zfuncs.cc:269:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(tempfile,"w");
data/dkopp-6.5/zfuncs.cc:274:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(command,"xmessage -buttons OK:0 -center -timeout 5 -file ");     //  create popup with message file
data/dkopp-6.5/zfuncs.cc:276:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(command," &");                                                   //  return immediately
data/dkopp-6.5/zfuncs.cc:298:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           message[300];
data/dkopp-6.5/zfuncs.cc:323:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen("zappcrash","w");                                           //  open zappcrash file  (can hang here)
data/dkopp-6.5/zfuncs.cc:394:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  filebuff[50][100];                                                //  last 50 TRACE calls
data/dkopp-6.5/zfuncs.cc:395:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  funcbuff[50][60];
data/dkopp-6.5/zfuncs.cc:441:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen("tracedump","w");
data/dkopp-6.5/zfuncs.cc:472:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     command[1000];
data/dkopp-6.5/zfuncs.cc:476:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(command,"which gksu > /dev/null 2>&1");                          //  Debian
data/dkopp-6.5/zfuncs.cc:478:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(command,"gksu \"");
data/dkopp-6.5/zfuncs.cc:480:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(command,"which beesu > /dev/null 2>&1");                      //  Fedora, just to be different
data/dkopp-6.5/zfuncs.cc:482:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(command,"beesu \"");
data/dkopp-6.5/zfuncs.cc:501:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(command,"\" &");                                                 //  return immediately
data/dkopp-6.5/zfuncs.cc:605:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     buff[200];
data/dkopp-6.5/zfuncs.cc:610:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen("/proc/self/stat","r");
data/dkopp-6.5/zfuncs.cc:669:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        buff[1000];
data/dkopp-6.5/zfuncs.cc:670:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char  *pnames[20];
data/dkopp-6.5/zfuncs.cc:694:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(pfile,"r");                                                 //  open /proc/xxx file
data/dkopp-6.5/zfuncs.cc:790:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(lockfile,O_RDWR|O_CREAT,0666);                                //  open or create the lock file
data/dkopp-6.5/zfuncs.cc:995:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     *command[10];
data/dkopp-6.5/zfuncs.cc:1081:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        buff[10000], *prec;
data/dkopp-6.5/zfuncs.cc:1141:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        buff[100], *pp;
data/dkopp-6.5/zfuncs.cc:1151:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   pid = atoi(buff);
data/dkopp-6.5/zfuncs.cc:1172:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     xtcommand[500];
data/dkopp-6.5/zfuncs.cc:1261:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    dirk[1000], file[200], ext[8];
data/dkopp-6.5/zfuncs.cc:1440:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        *pp, buff[200];
data/dkopp-6.5/zfuncs.cc:1451:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fid = fopen("/proc/self/stat","r");
data/dkopp-6.5/zfuncs.cc:1517:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    *retf[100]; 
data/dkopp-6.5/zfuncs.cc:1518:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           *pf1, pf2[2000];                                         //  2000 limit       v.5.2
data/dkopp-6.5/zfuncs.cc:1521:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    blankstring[2], nullstring[1];
data/dkopp-6.5/zfuncs.cc:1581:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     delims[2] = "x";
data/dkopp-6.5/zfuncs.cc:1941:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        ftemp[maxfcc];
data/dkopp-6.5/zfuncs.cc:2004:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    work[20];
data/dkopp-6.5/zfuncs.cc:2468:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   ccc = sprintf(string,"%d",inum);
data/dkopp-6.5/zfuncs.cc:2482:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(string,"%.*g",digits,dnum);
data/dkopp-6.5/zfuncs.cc:2518:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    *output[100];
data/dkopp-6.5/zfuncs.cc:2717:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    matchfile[maxfcc];
data/dkopp-6.5/zfuncs.cc:2718:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           searchpath[maxfcc];
data/dkopp-6.5/zfuncs.cc:2719:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           command[maxfcc];
data/dkopp-6.5/zfuncs.cc:2791:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    matchfile[maxfcc];
data/dkopp-6.5/zfuncs.cc:2792:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           searchpath[maxfcc];
data/dkopp-6.5/zfuncs.cc:2793:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           command[maxfcc];
data/dkopp-6.5/zfuncs.cc:3743:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     message[200];
data/dkopp-6.5/zfuncs.cc:3841:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           work[200];
data/dkopp-6.5/zfuncs.cc:3842:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           logfile[200], oldlog[200];
data/dkopp-6.5/zfuncs.cc:3924:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        *pp, fname[20], fext[8];
data/dkopp-6.5/zfuncs.cc:3925:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        lc_RC[8];                                                   // -lc or -lc_RC
data/dkopp-6.5/zfuncs.cc:3938:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(filespec,"/locales");
data/dkopp-6.5/zfuncs.cc:3969:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(pp,"-en");                                                       //  /directories.../fname-en.fext
data/dkopp-6.5/zfuncs.cc:3980:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(filespec,"/extras");                                          //       due to Linux chaos
data/dkopp-6.5/zfuncs.cc:3999:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     filespec[200], url[200];
data/dkopp-6.5/zfuncs.cc:4028:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[200];
data/dkopp-6.5/zfuncs.cc:4044:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     filex[40], filespec[200], command[200];
data/dkopp-6.5/zfuncs.cc:4048:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(filex,".gz");
data/dkopp-6.5/zfuncs.cc:4077:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    prog[20];
data/dkopp-6.5/zfuncs.cc:4084:18:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      if (! err) strcpy(prog,"firefox");                                   //  v.5.2
data/dkopp-6.5/zfuncs.cc:4087:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         if (! err) strcpy(prog,"chromium-browser");
data/dkopp-6.5/zfuncs.cc:4090:24:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            if (! err) strcpy(prog,"xdg-open");
data/dkopp-6.5/zfuncs.cc:4118:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     appname[20], dtdir[200], dtfile[200], work[200];
data/dkopp-6.5/zfuncs.cc:4141:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(dtfile,"w");
data/dkopp-6.5/zfuncs.cc:4243:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        buff[ZTXmaxcc], *ppq1, *ppq2;
data/dkopp-6.5/zfuncs.cc:4245:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        Etext[ZTXmaxcc], Ttext[ZTXmaxcc];                           //  .po text: "line 1 %s \n" "line 2"
data/dkopp-6.5/zfuncs.cc:4264:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        localpo[200], installpo[200], ulocalesdir[200];
data/dkopp-6.5/zfuncs.cc:4265:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        *pp, poname[20], ponamexx[20];
data/dkopp-6.5/zfuncs.cc:4295:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      else strcpy(zlang,"en");                                             //  use English
data/dkopp-6.5/zfuncs.cc:4298:22:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   if (*zlang < 'a') strcpy(zlang,"en");                                   //  use English if garbage
data/dkopp-6.5/zfuncs.cc:4352:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(poname,".po");
data/dkopp-6.5/zfuncs.cc:4360:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fidr = fopen(localpo,"r");                                              //  open .po file
data/dkopp-6.5/zfuncs.cc:4495:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char    cleanstring[ZTXmaxcc];
data/dkopp-6.5/zfuncs.cc:4674:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     message[1000];
data/dkopp-6.5/zfuncs.cc:4687:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     message[1000];
data/dkopp-6.5/zfuncs.cc:4825:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(filespec,"w");                                              //  open file
data/dkopp-6.5/zfuncs.cc:4880:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     tempfile[50];
data/dkopp-6.5/zfuncs.cc:5180:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           iconpath[200];
data/dkopp-6.5/zfuncs.cc:5450:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        *pp, buff[maxText];
data/dkopp-6.5/zfuncs.cc:5465:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(menuconfigfile,"r");                                        //  read window geometry
data/dkopp-6.5/zfuncs.cc:5522:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            size = atoi(pp+5);
data/dkopp-6.5/zfuncs.cc:5683:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(menuconfigfile,"w");                                        //  open for write
data/dkopp-6.5/zfuncs.cc:5926:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        text[maxText];
data/dkopp-6.5/zfuncs.cc:6096:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        iconpath[200], *mdesc, *name__;
data/dkopp-6.5/zfuncs.cc:6501:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           vdata[30], iconpath[200];
data/dkopp-6.5/zfuncs.cc:6687:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(vdata,"%g",val);
data/dkopp-6.5/zfuncs.cc:6693:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      pp = strField(data,'|',1); gdkrgba.red = f256 * atoi(pp);            //  RGB values are 0-1                 v.5.8
data/dkopp-6.5/zfuncs.cc:6694:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      pp = strField(data,'|',2); gdkrgba.green = f256 * atoi(pp);
data/dkopp-6.5/zfuncs.cc:6695:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      pp = strField(data,'|',3); gdkrgba.blue = f256 * atoi(pp);
data/dkopp-6.5/zfuncs.cc:6746:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     pname[8];
data/dkopp-6.5/zfuncs.cc:6928:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (pp) gdkrgba.red = f256 * atoi(pp);                               //  RGB range is 0-1                   v.5.8
data/dkopp-6.5/zfuncs.cc:6930:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (pp) gdkrgba.green = f256 * atoi(pp);
data/dkopp-6.5/zfuncs.cc:6932:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (pp) gdkrgba.blue = f256 * atoi(pp);
data/dkopp-6.5/zfuncs.cc:7110:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char              sdata[20];
data/dkopp-6.5/zfuncs.cc:7190:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(sdata,"%g",dval);
data/dkopp-6.5/zfuncs.cc:7197:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(sdata,"%.0f|%.0f|%.0f",gdkrgba.red*255,gdkrgba.green*255,gdkrgba.blue*255);
data/dkopp-6.5/zfuncs.cc:7204:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(sdata,"%g",dval);
data/dkopp-6.5/zfuncs.cc:7337:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           text[1000];
data/dkopp-6.5/zfuncs.cc:7590:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  string[16];
data/dkopp-6.5/zfuncs.cc:7592:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(string,"%d",idata);
data/dkopp-6.5/zfuncs.cc:7599:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  string[32];
data/dkopp-6.5/zfuncs.cc:7632:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   idata = atoi(zdata);
data/dkopp-6.5/zfuncs.cc:7847:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char     wintitle[64];                                               //  window title (ID)
data/dkopp-6.5/zfuncs.cc:7864:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     posfile[200], buff[100], wintitle[64], *pp;
data/dkopp-6.5/zfuncs.cc:7875:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fid = fopen(posfile,"r");
data/dkopp-6.5/zfuncs.cc:7903:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fid = fopen(posfile,"w");
data/dkopp-6.5/zfuncs.cc:7937:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        wintitle[64], *pp;
data/dkopp-6.5/zfuncs.cc:8010:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        wintitle[64], *pp;
data/dkopp-6.5/zfuncs.cc:8087:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     zdinputsfile[200], buff[200];
data/dkopp-6.5/zfuncs.cc:8088:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     zdtitle[100], wname[100][100], wdata[100][200];
data/dkopp-6.5/zfuncs.cc:8089:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     *pp, *pp1, *pp2, wdata2[200];
data/dkopp-6.5/zfuncs.cc:8101:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fid = fopen(zdinputsfile,"r");                                       //  no file
data/dkopp-6.5/zfuncs.cc:8114:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         Nw = atoi(pp);
data/dkopp-6.5/zfuncs.cc:8169:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fid = fopen(zdinputsfile,"w");
data/dkopp-6.5/zfuncs.cc:8206:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     zdtitle[100], wname[100], wdata[200], *type;
data/dkopp-6.5/zfuncs.cc:8382:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      secs = atoi(action+5);
data/dkopp-6.5/zfuncs.cc:8442:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           message[1000];
data/dkopp-6.5/zfuncs.cc:8479:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           message[1000];
data/dkopp-6.5/zfuncs.cc:8501:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           message[400];
data/dkopp-6.5/zfuncs.cc:8540:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char              message[400];
data/dkopp-6.5/zfuncs.cc:9268:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     printsettingsfile[200], pagesetupfile[200];
data/dkopp-6.5/zfuncs.cc:9315:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        imagesize[100];
data/dkopp-6.5/zfuncs.cc:9383:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        imagesize[100];
data/dkopp-6.5/zfuncs.cc:9580:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           iconpath[200];
data/dkopp-6.5/zfuncs.cc:9783:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     zparmfile[200];                                                   //  last used parm file
data/dkopp-6.5/zfuncs.cc:9858:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        buff[100], *fgs, *pp;
data/dkopp-6.5/zfuncs.cc:9872:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(pfile,"r");
data/dkopp-6.5/zfuncs.cc:9936:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fid = fopen(pfile,"w");
data/dkopp-6.5/zfuncs.cc:10033:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           ptemp[20], *pname;
data/dkopp-6.5/zfuncs.cc:10080:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(ptemp,"%.12g",parmlist.value[ii]);
data/dkopp-6.5/zfuncs.cc:10857:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(wmi,"queue");
data/dkopp-6.5/zfuncs.h:617:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        wmi[8];
data/dkopp-6.5/dkopp-6.5.cc:492:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy(subprocName,"");
data/dkopp-6.5/dkopp-6.5.cc:493:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy(scriptParam,"");
data/dkopp-6.5/dkopp-6.5.cc:497:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   dvdmpcc = strlen(dvdmp);                                                //  mount point cc
data/dkopp-6.5/dkopp-6.5.cc:795:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(file) > maxfcc-2) zappcrash("pathname too big");
data/dkopp-6.5/dkopp-6.5.cc:831:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(file) > maxfcc-2) zappcrash("pathname too big");
data/dkopp-6.5/dkopp-6.5.cc:871:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc = strlen(buff);
data/dkopp-6.5/dkopp-6.5.cc:1199:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy(mbmode,"");
data/dkopp-6.5/dkopp-6.5.cc:1200:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy(mvmode,"");
data/dkopp-6.5/dkopp-6.5.cc:2185:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc1 = strlen(RJfrom);                                                   //  from: /home/xxx/.../
data/dkopp-6.5/dkopp-6.5.cc:2186:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc2 = strlen(RJto);                                                     //    to: /home/yyy/.../
data/dkopp-6.5/dkopp-6.5.cc:2232:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ccf = strlen(RJfrom);                                                   //  from: /media/xxx/filespec
data/dkopp-6.5/dkopp-6.5.cc:2326:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         dvdmpcc = strlen(dvdmp);                                          //  bugfix   v.5.5
data/dkopp-6.5/dkopp-6.5.cc:2363:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   dvdmpcc = strlen(dvdmp);
data/dkopp-6.5/dkopp-6.5.cc:2427:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dvdmpcc = strlen(dvdmp);
data/dkopp-6.5/dkopp-6.5.cc:2461:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         dvdmpcc = strlen(dvdmp);
data/dkopp-6.5/dkopp-6.5.cc:2842:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc1 = strlen(RJfrom);                                                   //  from: /home/xxx/.../
data/dkopp-6.5/dkopp-6.5.cc:2843:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc2 = strlen(RJto);                                                     //    to: /home/yyy/.../
data/dkopp-6.5/dkopp-6.5.cc:2862:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ccf = strlen(file1);                                                 //  match directories too
data/dkopp-6.5/dkopp-6.5.cc:2951:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(rec) < 3) return 0;
data/dkopp-6.5/dkopp-6.5.cc:2965:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(rtype) > 7) return 2;
data/dkopp-6.5/dkopp-6.5.cc:2971:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(fspec) < 4) return 3;
data/dkopp-6.5/dkopp-6.5.cc:2972:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(fspec) > maxfcc-100) return 3;
data/dkopp-6.5/dkopp-6.5.cc:3094:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(RJfrom);                                                    //  insure '/' at end
data/dkopp-6.5/dkopp-6.5.cc:3095:29:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   if (RJfrom[cc-1] != '/') strcat(RJfrom,"/");
data/dkopp-6.5/dkopp-6.5.cc:3105:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(RJto);                                                      //  insure '/' at end
data/dkopp-6.5/dkopp-6.5.cc:3106:27:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   if (RJto[cc-1] != '/') strcat(RJto,"/");
data/dkopp-6.5/dkopp-6.5.cc:3191:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cc = strlen(fsp);
data/dkopp-6.5/dkopp-6.5.cc:3405:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   gcc = strlen(V_DKOPPDIRK);
data/dkopp-6.5/dkopp-6.5.cc:3412:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc = strlen(pp);                                                     //  absurdly long file name
data/dkopp-6.5/dkopp-6.5.cc:3521:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(RJfrom);                                                    //  copy from: /home/.../
data/dkopp-6.5/dkopp-6.5.cc:3771:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      rcc = read(fid1,buff,vrcc);                                          //  read huge blocks
data/dkopp-6.5/dkopp-6.5.cc:3842:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      vcc = read(vfid,vbuff,vrcc);
data/dkopp-6.5/dkopp-6.5.cc:3866:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      vcc = read(vfid,vbuff,vrcc);                                         //  read two files
data/dkopp-6.5/dkopp-6.5.cc:3869:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      dcc = read(dfid,dbuff,vrcc);
data/dkopp-6.5/dkopp-6.5.cc:3921:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(pdirk," ");
data/dkopp-6.5/zfuncs.cc:222:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *pp = (char *) malloc(strlen(string) + addcc);
data/dkopp-6.5/zfuncs.cc:262:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(message);
data/dkopp-6.5/zfuncs.cc:424:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(&filebuff[ii][0],file,99);
data/dkopp-6.5/zfuncs.cc:425:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(&funcbuff[ii][0],func,39);
data/dkopp-6.5/zfuncs.cc:489:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc1 = strlen(command);                                                  //  gksu  (or)  beesu
data/dkopp-6.5/zfuncs.cc:701:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         fcc = strlen(pnames[ii]);
data/dkopp-6.5/zfuncs.cc:909:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(command) + 1000;
data/dkopp-6.5/zfuncs.cc:946:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(command) + 1000;
data/dkopp-6.5/zfuncs.cc:1208:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(buff);
data/dkopp-6.5/zfuncs.cc:1267:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc1 = strlen(ppath);
data/dkopp-6.5/zfuncs.cc:1283:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(pp) > 199) return 1;                                         //  filename too long
data/dkopp-6.5/zfuncs.cc:1290:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (! pp || strlen(pp) > 7) return 0;                                   //  file part, no .ext
data/dkopp-6.5/zfuncs.cc:1530:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(blankstring," ");
data/dkopp-6.5/zfuncs.cc:1698:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(dest,source,cc);
data/dkopp-6.5/zfuncs.cc:1700:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(source) >= cc) return 1;                                     //  truncated
data/dkopp-6.5/zfuncs.cc:1711:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(dest,source,cc);
data/dkopp-6.5/zfuncs.cc:1712:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int ii = strlen(source);
data/dkopp-6.5/zfuncs.cc:1729:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int  ii = strlen(dest);
data/dkopp-6.5/zfuncs.cc:1746:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   pp2 = source + strlen(source) - 1;
data/dkopp-6.5/zfuncs.cc:1802:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   maxcc = maxcc - strlen(dest) - 1;
data/dkopp-6.5/zfuncs.cc:1809:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(dest,ps,maxcc);
data/dkopp-6.5/zfuncs.cc:1810:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      maxcc = maxcc - strlen(ps);
data/dkopp-6.5/zfuncs.cc:1908:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc1 = strlen(ssin);
data/dkopp-6.5/zfuncs.cc:1909:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc2 = strlen(ssout);
data/dkopp-6.5/zfuncs.cc:1916:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(strout,strin,ccc);
data/dkopp-6.5/zfuncs.cc:1919:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(strout,ssout,cc2);
data/dkopp-6.5/zfuncs.cc:1980:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (! ccin) ccin = strlen(in);
data/dkopp-6.5/zfuncs.cc:2006:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(pNum);
data/dkopp-6.5/zfuncs.cc:2059:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int cc = strlen(string);
data/dkopp-6.5/zfuncs.cc:2073:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char  *pp = (char *) zmalloc(strlen(string)+1+more);
data/dkopp-6.5/zfuncs.cc:2170:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(utf8out,utf8in+ii,kk);
data/dkopp-6.5/zfuncs.cc:2499:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (cc) *cc = strlen(string);
data/dkopp-6.5/zfuncs.cc:2734:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc = strlen(wpath);
data/dkopp-6.5/zfuncs.cc:2764:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc = strlen(matchfile);                                              //  get rid of trailing \n
data/dkopp-6.5/zfuncs.cc:2808:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc = strlen(wpath);
data/dkopp-6.5/zfuncs.cc:2838:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc = strlen(matchfile);                                              //  get rid of trailing \n
data/dkopp-6.5/zfuncs.cc:2957:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(seekrec);
data/dkopp-6.5/zfuncs.cc:3872:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(zuserdir);                                                  //  stop humongous username         v.5.3
data/dkopp-6.5/zfuncs.cc:3954:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(filespec);
data/dkopp-6.5/zfuncs.cc:3957:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(filespec);                                                  //                       |
data/dkopp-6.5/zfuncs.cc:4410:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (strlen(Ttext) < 3)                                            //  translation is "" (quotes included)
data/dkopp-6.5/zfuncs.cc:4527:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(pp) == 0) pp = english;                                      //  translation is ""      v.5.6
data/dkopp-6.5/zfuncs.cc:4550:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(tstring[ii]) == 0) break;                                 //  translation is ""      v.5.6
data/dkopp-6.5/zfuncs.cc:4839:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc = strlen(prec);
data/dkopp-6.5/zfuncs.cc:4968:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(ztext);
data/dkopp-6.5/zfuncs.cc:5500:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(pp+5) > 0) 
data/dkopp-6.5/zfuncs.cc:5506:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(pp+5)) menus[me].func = zstrdup(pp+5);
data/dkopp-6.5/zfuncs.cc:5511:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(pp+5)) {
data/dkopp-6.5/zfuncs.cc:5606:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         text2 = (char *) zmalloc(strlen(text)+2);                         //  replace "\n" with newline
data/dkopp-6.5/zfuncs.cc:5710:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         pp = pxbfile + strlen(pxbfile);                                   //  create a local PNG file for pixbuf
data/dkopp-6.5/zfuncs.cc:6117:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc1 = strlen(desc);                                                  //  v.5.6
data/dkopp-6.5/zfuncs.cc:6121:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(mdesc+cc1+1," ");
data/dkopp-6.5/zfuncs.cc:6172:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc1 = strlen(name);                                                  //  prepare menu name with trailing blanks
data/dkopp-6.5/zfuncs.cc:7361:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(text);
data/dkopp-6.5/zfuncs.cc:7363:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(text+cc,cliptext,999-cc);                                       //  add clipboard text
data/dkopp-6.5/zfuncs.cc:7885:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (strlen(pp) < 64) continue;
data/dkopp-6.5/zfuncs.cc:7888:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (strlen(wintitle) < 3) continue;
data/dkopp-6.5/zfuncs.cc:7976:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(pp) < 2) return;
data/dkopp-6.5/zfuncs.cc:8038:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(pp) < 2) return;
data/dkopp-6.5/zfuncs.cc:8131:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cc2 = strlen(pp2);
data/dkopp-6.5/zfuncs.cc:8268:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      else strcpy(wdata,"");
data/dkopp-6.5/zfuncs.cc:8742:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(text);                                                      //  construct popup window
data/dkopp-6.5/zfuncs.cc:8795:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cc = strlen(text);                                                      //  construct popup window
data/dkopp-6.5/zfuncs.cc:9083:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (strlen(file1) >= maxfcc)
data/dkopp-6.5/zfuncs.cc:9475:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc = strlen(file);
data/dkopp-6.5/zfuncs.cc:9503:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   out = (char *) zmalloc(strlen(inp)+1);
data/dkopp-6.5/zfuncs.cc:9968:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cc = strlen(parmname);
data/dkopp-6.5/zfuncs.cc:10220:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (string) xcc = strlen(string);                                       //  string length
data/dkopp-6.5/zfuncs.cc:10282:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (str) xcc = strlen(str);
data/dkopp-6.5/zfuncs.cc:10314:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (s2) cc2 = strlen(s2);
data/dkopp-6.5/zfuncs.cc:10328:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (s1) cc1 = strlen(s1);
data/dkopp-6.5/zfuncs.cc:10342:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int scc = strlen(string);
data/dkopp-6.5/zfuncs.cc:10368:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(xpp+pos,string,scc);                                            //  insert string, without null
data/dkopp-6.5/zfuncs.cc:10380:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int scc = strlen(string);
data/dkopp-6.5/zfuncs.cc:10400:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(xpp+pos,string,scc);                                            //  insert string, without null
data/dkopp-6.5/zfuncs.cc:10419:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (xcc != (int) strlen(xpp)) zappcrash("xstring xcc != strlen(xpp)",null);
data/dkopp-6.5/zfuncs.cc:10712:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         strncpy(table+pos,string,cc);                                     //  insert new string
data/dkopp-6.5/zfuncs.cc:10910:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
      usleep(1000);                                                        //  sleep in 1 millisec. steps
data/dkopp-6.5/zfuncs.cc:11049:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int cc = strlen(name);

ANALYSIS SUMMARY:

Hits = 765
Lines analyzed = 16014 in approximately 0.45 seconds (35655 lines/second)
Physical Source Lines of Code (SLOC) = 10640
Hits@level = [0]  96 [1] 114 [2] 247 [3]   6 [4] 392 [5]   6
Hits@level+ = [0+] 861 [1+] 765 [2+] 651 [3+] 404 [4+] 398 [5+]   6
Hits/KSLOC@level+ = [0+] 80.9211 [1+] 71.8985 [2+] 61.1842 [3+] 37.9699 [4+] 37.406 [5+] 0.56391
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.