Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/frama-c-20200625+scandium/src/libraries/utils/c_bindings.c
Examining data/frama-c-20200625+scandium/src/plugins/report/tests/report/csv.c
Examining data/frama-c-20200625+scandium/src/plugins/report/tests/report/classify.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_usage/global.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/unit_local.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/bug_9.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/array_initialized.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/unit_bitwise.h
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/unit_bitwise.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/injector.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/string_c.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/stmt.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/combined.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/bit_test.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/repeat.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/inductive.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/flash.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/nowp.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/subset_fopen.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_acsl/invalid_pointer.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_acsl/unit_bit_test.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_acsl/null.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_acsl/classify_float.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp/wp_call_pre.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp/sharing.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp/wp_strategy.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp/wp_behav.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.old.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo1_solved.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.old.v2.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/binary-multiplication-without-overflow.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/binary-multiplication.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo2_solved.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/loop-statement.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_hashtbl_solved.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.simplified.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_manual/working_dir/swap2.h
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_manual/working_dir/swap.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_manual/working_dir/swap1.h
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/issue_837.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/issue-516.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/bts_1647.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/bts_1601.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/issue-684-exit.c
Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/issue_508.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_gmp_api.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_temporal.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_printf.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_mmodel.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_shadow_layout.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_assert.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_temporal_timestamp.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_leak.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_safe_locations.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_shexec.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_malloc.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_floating_point.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_debug.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_rtl.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree_api.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree_mmodel.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_alias.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_trace.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_bits.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/issue-eacsl-105.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2192.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2191.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1390.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/issue69.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2386.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/issue-eacsl-91.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1478.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2406.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1398.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1399.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1399.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2406.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2192.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2305.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1717.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1386_complex_flowgraph.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2386.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1837.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_issue69.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_issue-eacsl-105.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2191.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1326.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1718.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_issue-eacsl-91.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1700.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2231.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1478.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2252.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1324.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1398.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1740.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1307.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1304.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1395.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1390.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2252.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2305.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1386_complex_flowgraph.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/gmp-only/functions.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/gmp-only/oracle_ci/gen_functions.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/gmp-only/oracle_ci/gen_arith.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_true.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_result.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_ghost.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_lazy.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_invariant.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_labeled_stmt.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_loop.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_nested_code_annot.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_typedef.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_function_contract.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_false.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_stmt_contract.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/full-mmodel/oracle_ci/gen_addrOf2.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/full-mmodel/oracle_ci/gen_addrOf.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/signalled.h
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf2.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_fprintf.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/memsize.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/ctype_macros.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/valid_in_contract.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/base_addr.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/ranges_in_builtins.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/block_valid.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/mainargs.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/constructor.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/local_init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/bypassed_var.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/stdout.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/ptr_init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/vector.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/freeable.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/local_goto.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/valid.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/call.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/valid_alias.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/compound_initializers.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/block_length.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/decl_in_switch.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/initialized.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/local_var.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/vla.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_vector.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_valid_alias.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ghost_parameters.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_init_function.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_freeable.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ptr.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_initialized.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_alias.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_var.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ptr_init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_hidden_malloc.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_block_valid.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ctype_macros.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_other_constants.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_call.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_block_length.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_compound_initializers.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_valid.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_constructor.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_base_addr.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_offset.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_mainargs.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_memalign.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_addrOf.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_stdout.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ranges_in_builtins.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_early_exit.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_literal_string.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_vla.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_goto.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_valid_in_contract.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_null.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_goto.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_memsize.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_errno.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_bypassed_var.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_decl_in_switch.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_sizeof.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/errno.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/goto.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/offset.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/hidden_malloc.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/early_exit.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/init_function.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/memalign.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_addr-by-val.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_dpointer.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_while.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_scope.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_char.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_darray.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fptr.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_memcpy.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fun_lib.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_labels.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_malloc-asan.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_getenv.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_struct.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_array.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_lit_string.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_while.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_addr-by-val.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_char.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fptr.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_global_init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_malloc.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_scope.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_malloc-asan.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_dpointer.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_darray.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_labels.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_array.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_lib.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_struct.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_args.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_ptr.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_getenv.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_memcpy.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fun_ptr.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_args.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_lit_string.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_malloc.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_global_init.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/e-acsl-valid.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/e-acsl-functions.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/e-acsl-instrument.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/oracle_ci/gen_e-acsl-valid.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/oracle_ci/gen_builtin.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/oracle_ci/gen_e-acsl-instrument.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/oracle_ci/gen_e-acsl-functions.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/functions_rec.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/rationals.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/at_on-purely-logic-variables.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/let.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/functions.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_rationals.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_functions_rec.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_integer_constant.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_longlong.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_not.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_at.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_quantif.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_let.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_array.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_comparison.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_functions.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_cast.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_arith.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_at_on-purely-logic-variables.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/examples/oracle_ci/gen_linear_search.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/examples/oracle_ci/gen_functions_contiki.c
Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/examples/functions_contiki.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch2.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_recursion1.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_recursion2.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch3_et_recursion.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_struct.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle2.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/assigns.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch3_if.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/call_tree.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_recursion5.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle3.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_recursion4.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/other.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle_rechercheTableau.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_acces_params.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_factorial.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch3.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle1.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_factorial2.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_acces_params2.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/goto.c
Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch3_return.c
Examining data/frama-c-20200625+scandium/share/machdep.c
Examining data/frama-c-20200625+scandium/share/libc/limits.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_dev_t.h
Examining data/frama-c-20200625+scandium/share/libc/getopt.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_blkcnt_t.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_pid_t.h
Examining data/frama-c-20200625+scandium/share/libc/poll.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_integer.h
Examining data/frama-c-20200625+scandium/share/libc/float.h
Examining data/frama-c-20200625+scandium/share/libc/tgmath.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_seek_macros.h
Examining data/frama-c-20200625+scandium/share/libc/math.h
Examining data/frama-c-20200625+scandium/share/libc/string.c
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_blksize_t.h
Examining data/frama-c-20200625+scandium/share/libc/unistd.h
Examining data/frama-c-20200625+scandium/share/libc/grp.h
Examining data/frama-c-20200625+scandium/share/libc/sys/utsname.h
Examining data/frama-c-20200625+scandium/share/libc/sys/signal.h
Examining data/frama-c-20200625+scandium/share/libc/sys/un.h
Examining data/frama-c-20200625+scandium/share/libc/sys/stat.h
Examining data/frama-c-20200625+scandium/share/libc/sys/mman.h
Examining data/frama-c-20200625+scandium/share/libc/sys/shm.h
Examining data/frama-c-20200625+scandium/share/libc/sys/ioctl.h
Examining data/frama-c-20200625+scandium/share/libc/sys/times.h
Examining data/frama-c-20200625+scandium/share/libc/sys/file.h
Examining data/frama-c-20200625+scandium/share/libc/sys/random.h
Examining data/frama-c-20200625+scandium/share/libc/sys/socket.h
Examining data/frama-c-20200625+scandium/share/libc/sys/wait.h
Examining data/frama-c-20200625+scandium/share/libc/sys/uio.h
Examining data/frama-c-20200625+scandium/share/libc/sys/timex.h
Examining data/frama-c-20200625+scandium/share/libc/sys/types.h
Examining data/frama-c-20200625+scandium/share/libc/sys/time.h
Examining data/frama-c-20200625+scandium/share/libc/sys/ipc.h
Examining data/frama-c-20200625+scandium/share/libc/sys/select.h
Examining data/frama-c-20200625+scandium/share/libc/sys/resource.h
Examining data/frama-c-20200625+scandium/share/libc/inttypes.c
Examining data/frama-c-20200625+scandium/share/libc/getopt.c
Examining data/frama-c-20200625+scandium/share/libc/iso646.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_time_t.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_select.h
Examining data/frama-c-20200625+scandium/share/libc/signal.h
Examining data/frama-c-20200625+scandium/share/libc/termios.h
Examining data/frama-c-20200625+scandium/share/libc/byteswap.h
Examining data/frama-c-20200625+scandium/share/libc/wchar.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_timespec.h
Examining data/frama-c-20200625+scandium/share/libc/ctype.h
Examining data/frama-c-20200625+scandium/share/libc/stdarg.h
Examining data/frama-c-20200625+scandium/share/libc/locale.h
Examining data/frama-c-20200625+scandium/share/libc/stdio.c
Examining data/frama-c-20200625+scandium/share/libc/endian.h
Examining data/frama-c-20200625+scandium/share/libc/assert.c
Examining data/frama-c-20200625+scandium/share/libc/utmpx.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_nlink_t.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_ssize_t.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_off_t.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_wchar_t.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_useconds_t.h
Examining data/frama-c-20200625+scandium/share/libc/sched.h
Examining data/frama-c-20200625+scandium/share/libc/features.h
Examining data/frama-c-20200625+scandium/share/libc/resolv.h
Examining data/frama-c-20200625+scandium/share/libc/stddef.h
Examining data/frama-c-20200625+scandium/share/libc/strings.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_null.h
Examining data/frama-c-20200625+scandium/share/libc/pwd.h
Examining data/frama-c-20200625+scandium/share/libc/wctype.h
Examining data/frama-c-20200625+scandium/share/libc/time.c
Examining data/frama-c-20200625+scandium/share/libc/math.c
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_size_t.h
Examining data/frama-c-20200625+scandium/share/libc/net/if.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_intptr_t.h
Examining data/frama-c-20200625+scandium/share/libc/signal.c
Examining data/frama-c-20200625+scandium/share/libc/locale.c
Examining data/frama-c-20200625+scandium/share/libc/stropts.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_timer_t.h
Examining data/frama-c-20200625+scandium/share/libc/netinet/in.h
Examining data/frama-c-20200625+scandium/share/libc/netinet/tcp.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_alloc_axiomatic.h
Examining data/frama-c-20200625+scandium/share/libc/libgen.h
Examining data/frama-c-20200625+scandium/share/libc/malloc.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_pthread_types.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_builtin.c
Examining data/frama-c-20200625+scandium/share/libc/setjmp.h
Examining data/frama-c-20200625+scandium/share/libc/fnmatch.h
Examining data/frama-c-20200625+scandium/share/libc/utime.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_inet.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_iovec.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_fpos_t.h
Examining data/frama-c-20200625+scandium/share/libc/pthread.h
Examining data/frama-c-20200625+scandium/share/libc/inttypes.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_stat.h
Examining data/frama-c-20200625+scandium/share/libc/fenv.c
Examining data/frama-c-20200625+scandium/share/libc/__fc_runtime.c
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_eof.h
Examining data/frama-c-20200625+scandium/share/libc/errno.h
Examining data/frama-c-20200625+scandium/share/libc/ifaddrs.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_key_t.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_mode_t.h
Examining data/frama-c-20200625+scandium/share/libc/stdio.h
Examining data/frama-c-20200625+scandium/share/libc/fenv.h
Examining data/frama-c-20200625+scandium/share/libc/memory.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_sockaddr.h
Examining data/frama-c-20200625+scandium/share/libc/netdb.c
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_fd_set_t.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_uid_and_gid.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_wint_t.h
Examining data/frama-c-20200625+scandium/share/libc/stdbool.h
Examining data/frama-c-20200625+scandium/share/libc/iconv.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_gcc_builtins.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_file.h
Examining data/frama-c-20200625+scandium/share/libc/time.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_string_axiomatic.h
Examining data/frama-c-20200625+scandium/share/libc/stdlib.h
Examining data/frama-c-20200625+scandium/share/libc/complex.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_sigset_t.h
Examining data/frama-c-20200625+scandium/share/libc/ftw.h
Examining data/frama-c-20200625+scandium/share/libc/alloca.h
Examining data/frama-c-20200625+scandium/share/libc/stdint.h
Examining data/frama-c-20200625+scandium/share/libc/netdb.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_builtin.h
Examining data/frama-c-20200625+scandium/share/libc/errno.c
Examining data/frama-c-20200625+scandium/share/libc/arpa/inet.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_ino_t.h
Examining data/frama-c-20200625+scandium/share/libc/syslog.h
Examining data/frama-c-20200625+scandium/share/libc/dirent.h
Examining data/frama-c-20200625+scandium/share/libc/glob.h
Examining data/frama-c-20200625+scandium/share/libc/nl_types.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_machdep_linux_shared.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_machdep.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_clockid_t.h
Examining data/frama-c-20200625+scandium/share/libc/semaphore.h
Examining data/frama-c-20200625+scandium/share/libc/unistd.c
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_suseconds_t.h
Examining data/frama-c-20200625+scandium/share/libc/regex.h
Examining data/frama-c-20200625+scandium/share/libc/assert.h
Examining data/frama-c-20200625+scandium/share/libc/stdlib.c
Examining data/frama-c-20200625+scandium/share/libc/string.h
Examining data/frama-c-20200625+scandium/share/libc/dlfcn.h
Examining data/frama-c-20200625+scandium/share/libc/wchar.c
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_sa_family_t.h
Examining data/frama-c-20200625+scandium/share/libc/glob.c
Examining data/frama-c-20200625+scandium/share/libc/ctype.c
Examining data/frama-c-20200625+scandium/share/libc/fcntl.h
Examining data/frama-c-20200625+scandium/share/libc/__fc_define_id_t.h
Examining data/frama-c-20200625+scandium/share/analysis-scripts/examples/example.c
Examining data/frama-c-20200625+scandium/share/analysis-scripts/fc_stubs.c
Examining data/frama-c-20200625+scandium/share/libc.c
Examining data/frama-c-20200625+scandium/tests/misc/cpp-extra-args-per-file1.c
Examining data/frama-c-20200625+scandium/tests/misc/pragma_pack_zero.c
Examining data/frama-c-20200625+scandium/tests/misc/custom_machdep/__fc_machdep_custom.h
Examining data/frama-c-20200625+scandium/tests/misc/issue_191.c
Examining data/frama-c-20200625+scandium/tests/misc/wstring_phase6.c
Examining data/frama-c-20200625+scandium/tests/misc/long_ident.c
Examining data/frama-c-20200625+scandium/tests/misc/pragma-pack.c
Examining data/frama-c-20200625+scandium/tests/misc/widen_hints2.c
Examining data/frama-c-20200625+scandium/tests/misc/char_ampamp.c
Examining data/frama-c-20200625+scandium/tests/misc/my_visitor.c
Examining data/frama-c-20200625+scandium/tests/misc/bug_0209.c
Examining data/frama-c-20200625+scandium/tests/misc/bts0541.c
Examining data/frama-c-20200625+scandium/tests/misc/widen_hints.c
Examining data/frama-c-20200625+scandium/tests/misc/custom_machdep.c
Examining data/frama-c-20200625+scandium/tests/misc/pragma-pack-utils.h
Examining data/frama-c-20200625+scandium/tests/misc/find_enclosing_loop.c
Examining data/frama-c-20200625+scandium/tests/misc/obfuscate.c
Examining data/frama-c-20200625+scandium/tests/misc/widen_hints_float.c
Examining data/frama-c-20200625+scandium/tests/misc/cpp-extra-args-per-file2.c
Examining data/frama-c-20200625+scandium/tests/spec/acsl_by_example.c
Examining data/frama-c-20200625+scandium/tests/spec/lib.h
Examining data/frama-c-20200625+scandium/tests/spec/array_typedef.c
Examining data/frama-c-20200625+scandium/tests/spec/transitive_rel.c
Examining data/frama-c-20200625+scandium/tests/spec/printf_assigns.c
Examining data/frama-c-20200625+scandium/tests/spec/for_scope.c
Examining data/frama-c-20200625+scandium/tests/spec/unused.c
Examining data/frama-c-20200625+scandium/tests/spec/merge_bts938.h
Examining data/frama-c-20200625+scandium/tests/spec/acsl_basic_allocator.c
Examining data/frama-c-20200625+scandium/tests/spec/parsing.c
Examining data/frama-c-20200625+scandium/tests/spec/prototype_assigns.c
Examining data/frama-c-20200625+scandium/tests/spec/use2.c
Examining data/frama-c-20200625+scandium/tests/spec/volatile_aux.c
Examining data/frama-c-20200625+scandium/tests/spec/polymorph.c
Examining data/frama-c-20200625+scandium/tests/spec/multiple_spec.c
Examining data/frama-c-20200625+scandium/tests/spec/purse.c
Examining data/frama-c-20200625+scandium/tests/spec/liens.c
Examining data/frama-c-20200625+scandium/tests/spec/sizeof.c
Examining data/frama-c-20200625+scandium/tests/spec/string.c
Examining data/frama-c-20200625+scandium/tests/spec/axiom_included.c
Examining data/frama-c-20200625+scandium/tests/spec/if.c
Examining data/frama-c-20200625+scandium/tests/spec/multiple_decl_def_2.c
Examining data/frama-c-20200625+scandium/tests/spec/behavior_assert.c
Examining data/frama-c-20200625+scandium/tests/spec/conversion.c
Examining data/frama-c-20200625+scandium/tests/spec/model2.c
Examining data/frama-c-20200625+scandium/tests/spec/third.c
Examining data/frama-c-20200625+scandium/tests/spec/array_conversion.c
Examining data/frama-c-20200625+scandium/tests/spec/footprint.c
Examining data/frama-c-20200625+scandium/tests/spec/predicates.c
Examining data/frama-c-20200625+scandium/tests/spec/merge_logic_globals_1.c
Examining data/frama-c-20200625+scandium/tests/spec/pointer_comparable.c
Examining data/frama-c-20200625+scandium/tests/spec/regions2.c
Examining data/frama-c-20200625+scandium/tests/spec/annot_main.c
Examining data/frama-c-20200625+scandium/tests/spec/bool.c
Examining data/frama-c-20200625+scandium/tests/spec/bts0283.c
Examining data/frama-c-20200625+scandium/tests/spec/location_char.c
Examining data/frama-c-20200625+scandium/tests/spec/at_exit.c
Examining data/frama-c-20200625+scandium/tests/spec/volatile.h
Examining data/frama-c-20200625+scandium/tests/spec/multiple_decl_def_1.c
Examining data/frama-c-20200625+scandium/tests/spec/clash_double_file_bts1598.c
Examining data/frama-c-20200625+scandium/tests/spec/complete_behaviors.c
Examining data/frama-c-20200625+scandium/tests/spec/doxygen.c
Examining data/frama-c-20200625+scandium/tests/spec/terminates.c
Examining data/frama-c-20200625+scandium/tests/spec/conf1.h
Examining data/frama-c-20200625+scandium/tests/spec/assigns.c
Examining data/frama-c-20200625+scandium/tests/spec/logic_compare.c
Examining data/frama-c-20200625+scandium/tests/spec/bts1262.c
Examining data/frama-c-20200625+scandium/tests/spec/pointer_cast.c
Examining data/frama-c-20200625+scandium/tests/spec/assigns_void.c
Examining data/frama-c-20200625+scandium/tests/spec/assigns_array.c
Examining data/frama-c-20200625+scandium/tests/spec/merge_logic_globals_2.c
Examining data/frama-c-20200625+scandium/tests/spec/multiple_file_1.c
Examining data/frama-c-20200625+scandium/tests/spec/prec_i.h
Examining data/frama-c-20200625+scandium/tests/spec/const.c
Examining data/frama-c-20200625+scandium/tests/spec/all.c
Examining data/frama-c-20200625+scandium/tests/spec/bts0812.c
Examining data/frama-c-20200625+scandium/tests/spec/at.c
Examining data/frama-c-20200625+scandium/tests/spec/preprocess.h
Examining data/frama-c-20200625+scandium/tests/spec/statement_behavior.c
Examining data/frama-c-20200625+scandium/tests/spec/multiple_include_2.c
Examining data/frama-c-20200625+scandium/tests/spec/merge_bts938.c
Examining data/frama-c-20200625+scandium/tests/spec/model1.c
Examining data/frama-c-20200625+scandium/tests/spec/onelineghost.c
Examining data/frama-c-20200625+scandium/tests/spec/tableau_zones.c
Examining data/frama-c-20200625+scandium/tests/spec/max.c
Examining data/frama-c-20200625+scandium/tests/spec/ghost.c
Examining data/frama-c-20200625+scandium/tests/spec/concrete_type.c
Examining data/frama-c-20200625+scandium/tests/spec/bug96.c
Examining data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c
Examining data/frama-c-20200625+scandium/tests/spec/model1.h
Examining data/frama-c-20200625+scandium/tests/spec/updater.c
Examining data/frama-c-20200625+scandium/tests/spec/first.c
Examining data/frama-c-20200625+scandium/tests/spec/multiple_file_2.c
Examining data/frama-c-20200625+scandium/tests/spec/lib.c
Examining data/frama-c-20200625+scandium/tests/spec/volatile.c
Examining data/frama-c-20200625+scandium/tests/spec/regions.c
Examining data/frama-c-20200625+scandium/tests/spec/use.c
Examining data/frama-c-20200625+scandium/tests/spec/declspec.c
Examining data/frama-c-20200625+scandium/tests/spec/preprocess.c
Examining data/frama-c-20200625+scandium/tests/spec/global_invariant.c
Examining data/frama-c-20200625+scandium/tests/spec/dec.h
Examining data/frama-c-20200625+scandium/tests/spec/source_annot.c
Examining data/frama-c-20200625+scandium/tests/spec/ucn.c
Examining data/frama-c-20200625+scandium/tests/spec/boolean_ops.c
Examining data/frama-c-20200625+scandium/tests/spec/second.c
Examining data/frama-c-20200625+scandium/tests/spec/kw.c
Examining data/frama-c-20200625+scandium/tests/spec/exit_clause.c
Examining data/frama-c-20200625+scandium/tests/spec/multiple_include_1.c
Examining data/frama-c-20200625+scandium/tests/spec/ptr_cast.c
Examining data/frama-c-20200625+scandium/tests/spec/hosum.c
Examining data/frama-c-20200625+scandium/tests/spec/permut.c
Examining data/frama-c-20200625+scandium/tests/spec/homax.c
Examining data/frama-c-20200625+scandium/tests/spec/spec_zero_arg.c
Examining data/frama-c-20200625+scandium/tests/spec/pi.c
Examining data/frama-c-20200625+scandium/tests/spec/assign_in_spec.c
Examining data/frama-c-20200625+scandium/tests/spec/builtins.c
Examining data/frama-c-20200625+scandium/tests/spec/axiom_included.h
Examining data/frama-c-20200625+scandium/tests/spec/bsearch.c
Examining data/frama-c-20200625+scandium/tests/spec/localization.c
Examining data/frama-c-20200625+scandium/tests/spec/multi_behavior.c
Examining data/frama-c-20200625+scandium/tests/spec/enum.c
Examining data/frama-c-20200625+scandium/tests/spec/multidecl.c
Examining data/frama-c-20200625+scandium/tests/spec/tsets.c
Examining data/frama-c-20200625+scandium/tests/spec/logic_def.c
Examining data/frama-c-20200625+scandium/tests/spec/array_prm.c
Examining data/frama-c-20200625+scandium/tests/spec/logic_type.c
Examining data/frama-c-20200625+scandium/tests/spec/behaviors_decl_def.c
Examining data/frama-c-20200625+scandium/tests/spec/acsl_allocator.c
Examining data/frama-c-20200625+scandium/tests/spec/multidim.c
Examining data/frama-c-20200625+scandium/tests/spec/axiom_included_1.c
Examining data/frama-c-20200625+scandium/tests/spec/separated.c
Examining data/frama-c-20200625+scandium/tests/spec/nested.c
Examining data/frama-c-20200625+scandium/tests/spec/shifts.c
Examining data/frama-c-20200625+scandium/tests/spec/behavior_names.c
Examining data/frama-c-20200625+scandium/tests/spec/preprocess_string.c
Examining data/frama-c-20200625+scandium/tests/spec/fct_ptr.c
Examining data/frama-c-20200625+scandium/tests/spec/range.c
Examining data/frama-c-20200625+scandium/tests/spec/logic_label.c
Examining data/frama-c-20200625+scandium/tests/spec/multiple_include.h
Examining data/frama-c-20200625+scandium/tests/spec/typedef.c
Examining data/frama-c-20200625+scandium/tests/spec/unification.c
Examining data/frama-c-20200625+scandium/tests/spec/merge_bts938_1.c
Examining data/frama-c-20200625+scandium/tests/spec/logic_labels_wrong.c
Examining data/frama-c-20200625+scandium/tests/spec/null_ptr.c
Examining data/frama-c-20200625+scandium/tests/spec/char_cst.c
Examining data/frama-c-20200625+scandium/tests/spec/merge_logic_globals.h
Examining data/frama-c-20200625+scandium/tests/spec/local.c
Examining data/frama-c-20200625+scandium/tests/spec/struct_invariant.c
Examining data/frama-c-20200625+scandium/tests/spec/assume.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/glob2_int_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/noAnyMeta_int_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/anyMeta_ptr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/glob2_ptr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/loop_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/glob2_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/noAnyMeta_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/anyMeta_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/anyMeta_int_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/glob2_int_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/loop_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/noAnyMeta_int_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/anyMeta_int_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/noAnyMeta_ptr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/loop_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/loop_int_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/loop_ptr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/loop_int_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob1/bounds_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob1/bounds_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/constants.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/fetchsms2.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/constants.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/constants.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gd.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_no_entities_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_some_entities_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_some_entities_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_simp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_no_entities_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_simp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/constants.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/structs.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/constants.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/apache.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixShort_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixLong_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixShort_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixLong_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_ptr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_ptr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/apache.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/apache.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/constants.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/main/simp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/main/simp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/simp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/simp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/vars_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/vars_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/two_expands_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/expands_vars_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/simp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/expands_vars_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/simp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/two_expands_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/bind.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/bind.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/bind.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/constants.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/giwscan_cb/giwscan_cb_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/giwscan_cb/giwscan_cb_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/wu-ftpd.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/wu-ftpd.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/wu-ftpd.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/wu-ftpd.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_arr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_ptr_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_ptr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_arr_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/complete/util-bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/txt-dns.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_no_cast_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_no_cast_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/tTflag-ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/sendmail.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/tTflag-bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/my-main.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_one_loop_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_one_loop_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_heavy_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_no_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_med_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_no_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_no_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_heavy_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_no_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_med_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_heavy_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_no_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_no_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_heavy_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_med_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_med_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_no_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_med_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_heavy_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_no_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_med_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_heavy_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_no_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_med_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_heavy_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_no_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_med_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_no_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_heavy_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_heavy_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_med_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_no_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_med_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_heavy_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_med_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_heavy_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_heavy_test_ok.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_med_test_bad.c
Examining data/frama-c-20200625+scandium/tests/verisec/suite/lib/base.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h
Examining data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c
Examining data/frama-c-20200625+scandium/tests/saveload/isset.c
Examining data/frama-c-20200625+scandium/tests/saveload/bool.c
Examining data/frama-c-20200625+scandium/tests/cil/change_formals.c
Examining data/frama-c-20200625+scandium/tests/cil/cpu_b.c
Examining data/frama-c-20200625+scandium/tests/cil/empty_cond.c
Examining data/frama-c-20200625+scandium/tests/cil/cpu_a.c
Examining data/frama-c-20200625+scandium/tests/cil/overlap.c
Examining data/frama-c-20200625+scandium/tests/cil/annot.c
Examining data/frama-c-20200625+scandium/tests/cil/comments.c
Examining data/frama-c-20200625+scandium/tests/cil/merge.c
Examining data/frama-c-20200625+scandium/tests/cil/ghost_cfg.c
Examining data/frama-c-20200625+scandium/tests/cil/merge2.c
Examining data/frama-c-20200625+scandium/tests/cil/digraphs_c99.c
Examining data/frama-c-20200625+scandium/tests/cil/branch.c
Examining data/frama-c-20200625+scandium/tests/cil/bts297.c
Examining data/frama-c-20200625+scandium/tests/cil/bts342.c
Examining data/frama-c-20200625+scandium/tests/cil/issues.c
Examining data/frama-c-20200625+scandium/tests/cil/duplicate-labels.c
Examining data/frama-c-20200625+scandium/tests/syntax/cert-dcl-36.c
Examining data/frama-c-20200625+scandium/tests/syntax/typedef_multi.h
Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align4.c
Examining data/frama-c-20200625+scandium/tests/syntax/multiline_macro.c
Examining data/frama-c-20200625+scandium/tests/syntax/ghost_parameters.c
Examining data/frama-c-20200625+scandium/tests/syntax/bts0323-2.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align1.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_inline_2.c
Examining data/frama-c-20200625+scandium/tests/syntax/inconsistent_global_ghost_spec.c
Examining data/frama-c-20200625+scandium/tests/syntax/bts0323.h
Examining data/frama-c-20200625+scandium/tests/syntax/enum1.c
Examining data/frama-c-20200625+scandium/tests/syntax/assert_location.c
Examining data/frama-c-20200625+scandium/tests/syntax/multiple_decls_contracts.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align3.c
Examining data/frama-c-20200625+scandium/tests/syntax/ghost_cv_var_decl.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align2.c
Examining data/frama-c-20200625+scandium/tests/syntax/ghost_cv_parsing_errors.c
Examining data/frama-c-20200625+scandium/tests/syntax/exit.c
Examining data/frama-c-20200625+scandium/tests/syntax/undeclared_local_bts1126.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_inline_1.c
Examining data/frama-c-20200625+scandium/tests/syntax/loop-case-switch-for-unroll.c
Examining data/frama-c-20200625+scandium/tests/syntax/offsetof.c
Examining data/frama-c-20200625+scandium/tests/syntax/line_number.c
Examining data/frama-c-20200625+scandium/tests/syntax/sizeof_incomplete_type.c
Examining data/frama-c-20200625+scandium/tests/syntax/fc_filename.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_union.h
Examining data/frama-c-20200625+scandium/tests/syntax/gcc_builtins.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align.c
Examining data/frama-c-20200625+scandium/tests/syntax/undeclared_local_bts1113.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_unused.h
Examining data/frama-c-20200625+scandium/tests/syntax/merge_unused.c
Examining data/frama-c-20200625+scandium/tests/syntax/inserted_casts.c
Examining data/frama-c-20200625+scandium/tests/syntax/enum2.c
Examining data/frama-c-20200625+scandium/tests/syntax/assembly_gmp.c
Examining data/frama-c-20200625+scandium/tests/syntax/signal.c
Examining data/frama-c-20200625+scandium/tests/syntax/bts0519.c
Examining data/frama-c-20200625+scandium/tests/syntax/vla_strlen.c
Examining data/frama-c-20200625+scandium/tests/syntax/bts0672_link_2.c
Examining data/frama-c-20200625+scandium/tests/syntax/attributes-declarations-definitions.c
Examining data/frama-c-20200625+scandium/tests/syntax/cert_exp10.c
Examining data/frama-c-20200625+scandium/tests/syntax/ghost_else_bad.c
Examining data/frama-c-20200625+scandium/tests/syntax/ghost_multiline_annot.c
Examining data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_union_2.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_union_3.c
Examining data/frama-c-20200625+scandium/tests/syntax/inconsistent_decl.c
Examining data/frama-c-20200625+scandium/tests/syntax/const-assignments.c
Examining data/frama-c-20200625+scandium/tests/syntax/cert_msc_38.c
Examining data/frama-c-20200625+scandium/tests/syntax/bts0672_link.c
Examining data/frama-c-20200625+scandium/tests/syntax/anon_enum_libc.c
Examining data/frama-c-20200625+scandium/tests/syntax/static_formals_2.c
Examining data/frama-c-20200625+scandium/tests/syntax/typedef_multi_1.c
Examining data/frama-c-20200625+scandium/tests/syntax/copy_visitor_bts_1073.c
Examining data/frama-c-20200625+scandium/tests/syntax/incompatible_qualifiers.c
Examining data/frama-c-20200625+scandium/tests/syntax/reject_use_decl_mismatch_bts728.c
Examining data/frama-c-20200625+scandium/tests/syntax/libc_defs.c
Examining data/frama-c-20200625+scandium/tests/syntax/static_formals_1.c
Examining data/frama-c-20200625+scandium/tests/syntax/macro_escape_chars.c
Examining data/frama-c-20200625+scandium/tests/syntax/assert_location.h
Examining data/frama-c-20200625+scandium/tests/syntax/typedef_namespace_bts1500.c
Examining data/frama-c-20200625+scandium/tests/syntax/bts0323.c
Examining data/frama-c-20200625+scandium/tests/syntax/static_formals.h
Examining data/frama-c-20200625+scandium/tests/syntax/anon_enum_libc.h
Examining data/frama-c-20200625+scandium/tests/syntax/compile_constant.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_union.c
Examining data/frama-c-20200625+scandium/tests/syntax/literal-question-no-trigraph.c
Examining data/frama-c-20200625+scandium/tests/syntax/offset.c
Examining data/frama-c-20200625+scandium/tests/syntax/va.c
Examining data/frama-c-20200625+scandium/tests/syntax/foo".c
Examining data/frama-c-20200625+scandium/tests/syntax/no-print-libc-reparse.c
Examining data/frama-c-20200625+scandium/tests/syntax/cpp-command.c
Examining data/frama-c-20200625+scandium/tests/syntax/merge_unused_2.c
Examining data/frama-c-20200625+scandium/tests/syntax/typedef_multi_2.c
Examining data/frama-c-20200625+scandium/tests/syntax/enum.h
Examining data/frama-c-20200625+scandium/tests/syntax/define_string_logic_pp_bts2101.c
Examining data/frama-c-20200625+scandium/tests/syntax/dowhilezero.c
Examining data/frama-c-20200625+scandium/tests/syntax/temporary_location.c
Examining data/frama-c-20200625+scandium/tests/syntax/type_compat_call.c
Examining data/frama-c-20200625+scandium/tests/slicing/bts709.c
Examining data/frama-c-20200625+scandium/tests/slicing/unitialized.c
Examining data/frama-c-20200625+scandium/tests/slicing/adpcm.c
Examining data/frama-c-20200625+scandium/tests/slicing/variadic.c
Examining data/frama-c-20200625+scandium/tests/bugs/check_specs.h
Examining data/frama-c-20200625+scandium/tests/bugs/enum.c
Examining data/frama-c-20200625+scandium/tests/libc/termios.c
Examining data/frama-c-20200625+scandium/tests/libc/netdb_c.c
Examining data/frama-c-20200625+scandium/tests/libc/string_c.c
Examining data/frama-c-20200625+scandium/tests/libc/fpclassify.c
Examining data/frama-c-20200625+scandium/tests/libc/sys_wait_h.c
Examining data/frama-c-20200625+scandium/tests/libc/socket_h.c
Examining data/frama-c-20200625+scandium/tests/libc/glob_c.c
Examining data/frama-c-20200625+scandium/tests/libc/string_c_strchr.c
Examining data/frama-c-20200625+scandium/tests/libc/memchr_off.c
Examining data/frama-c-20200625+scandium/tests/libc/unistd_h.c
Examining data/frama-c-20200625+scandium/tests/libc/socket.c
Examining data/frama-c-20200625+scandium/tests/libc/libgen_h.c
Examining data/frama-c-20200625+scandium/tests/libc/inttypes_h.c
Examining data/frama-c-20200625+scandium/tests/libc/sys_times.c
Examining data/frama-c-20200625+scandium/tests/libc/coverage.c
Examining data/frama-c-20200625+scandium/tests/libc/time_h.c
Examining data/frama-c-20200625+scandium/tests/libc/time_c.c
Examining data/frama-c-20200625+scandium/tests/libc/stdlib_c.c
Examining data/frama-c-20200625+scandium/tests/libc/alloca_h.c
Examining data/frama-c-20200625+scandium/tests/libc/sys_stat_h.c
Examining data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c
Examining data/frama-c-20200625+scandium/tests/libc/string_h.c
Examining data/frama-c-20200625+scandium/tests/libc/netinet_in_h.c
Examining data/frama-c-20200625+scandium/tests/libc/poll.c
Examining data/frama-c-20200625+scandium/tests/libc/strings_h.c
Examining data/frama-c-20200625+scandium/tests/libc/stdlib_h.c
Examining data/frama-c-20200625+scandium/tests/libc/more_gcc_builtins.c
Examining data/frama-c-20200625+scandium/tests/libc/fc_libc.c
Examining data/frama-c-20200625+scandium/tests/libc/inttypes_h2.c
Examining data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c
Examining data/frama-c-20200625+scandium/tests/libc/stdint_h.c
Examining data/frama-c-20200625+scandium/tests/libc/string_c_strstr.c
Examining data/frama-c-20200625+scandium/tests/libc/stdio_c.c
Examining data/frama-c-20200625+scandium/tests/libc/time_misc.c
Examining data/frama-c-20200625+scandium/tests/libc/sys_time_h.c
Examining data/frama-c-20200625+scandium/tests/libc/limits_h.c
Examining data/frama-c-20200625+scandium/tests/libc/sys_file_h.c
Examining data/frama-c-20200625+scandium/tests/libc/assert_h.c
Examining data/frama-c-20200625+scandium/tests/libc/sys_types.c
Examining data/frama-c-20200625+scandium/tests/libc/wchar_h.c
Examining data/frama-c-20200625+scandium/tests/libc/math_h.c
Examining data/frama-c-20200625+scandium/tests/libc/stdio_h.c
Examining data/frama-c-20200625+scandium/tests/libc/runtime.c
Examining data/frama-c-20200625+scandium/tests/libc/pwd_h.c
Examining data/frama-c-20200625+scandium/tests/libc/sys_select.c
Examining data/frama-c-20200625+scandium/tests/libc/ctype.c
Examining data/frama-c-20200625+scandium/tests/libc/signal_h.c
Examining data/frama-c-20200625+scandium/tests/libc/string_c_generic.c
Examining data/frama-c-20200625+scandium/tests/scope/scope.c
Examining data/frama-c-20200625+scandium/tests/scope/zones.c
Examining data/frama-c-20200625+scandium/tests/scope/bts383.c
Examining data/frama-c-20200625+scandium/tests/scope/bts971.c
Examining data/frama-c-20200625+scandium/tests/pdg/top_pdg_input.c
Examining data/frama-c-20200625+scandium/tests/pdg/calls_and_struct.c
Examining data/frama-c-20200625+scandium/tests/pdg/loops.c
Examining data/frama-c-20200625+scandium/tests/pdg/no_body.c
Examining data/frama-c-20200625+scandium/tests/pdg/sets.c
Examining data/frama-c-20200625+scandium/tests/pdg/calls_and_implicits.c
Examining data/frama-c-20200625+scandium/tests/pdg/annot.c
Examining data/frama-c-20200625+scandium/tests/pdg/inter_alias.c
Examining data/frama-c-20200625+scandium/tests/pdg/call.c
Examining data/frama-c-20200625+scandium/tests/pdg/postdom.c
Examining data/frama-c-20200625+scandium/tests/pdg/globals.c
Examining data/frama-c-20200625+scandium/tests/pdg/dpds_intra.c
Examining data/frama-c-20200625+scandium/tests/pdg/dyn_dpds.c
Examining data/frama-c-20200625+scandium/tests/pdg/decl_dpds.c
Examining data/frama-c-20200625+scandium/tests/pdg/bts1194.c
Examining data/frama-c-20200625+scandium/tests/pdg/variadic.c
Examining data/frama-c-20200625+scandium/tests/pdg/multiple_calls.c
Examining data/frama-c-20200625+scandium/tests/pdg/doc_dot.c
Examining data/frama-c-20200625+scandium/tests/pdg/inter_alias2.c
Examining data/frama-c-20200625+scandium/tests/pdg/pb_infinite_loop.c
Examining data/frama-c-20200625+scandium/tests/pdg/simple_intra_slice.c
Examining data/frama-c-20200625+scandium/tests/pdg/simple_call.c
Examining data/frama-c-20200625+scandium/tests/more_wp/quicksort.c
Examining data/frama-c-20200625+scandium/tests/more_wp/bubblesort.c
Examining data/frama-c-20200625+scandium/tests/builtins/malloc_multiple.c
Examining data/frama-c-20200625+scandium/tests/builtins/from_result.c
Examining data/frama-c-20200625+scandium/tests/builtins/strchr.c
Examining data/frama-c-20200625+scandium/tests/builtins/memset.c
Examining data/frama-c-20200625+scandium/tests/builtins/alloc.c
Examining data/frama-c-20200625+scandium/tests/builtins/gcc_zero_length_array.c
Examining data/frama-c-20200625+scandium/tests/builtins/watch.c
Examining data/frama-c-20200625+scandium/tests/builtins/malloc_bug_tr.c
Examining data/frama-c-20200625+scandium/tests/builtins/malloc-size-zero.c
Examining data/frama-c-20200625+scandium/tests/builtins/free.c
Examining data/frama-c-20200625+scandium/tests/builtins/imprecise-malloc-free.c
Examining data/frama-c-20200625+scandium/tests/builtins/malloc_memexec.c
Examining data/frama-c-20200625+scandium/tests/builtins/realloc.c
Examining data/frama-c-20200625+scandium/tests/builtins/strnlen2.c
Examining data/frama-c-20200625+scandium/tests/builtins/realloc_multiple.c
Examining data/frama-c-20200625+scandium/tests/builtins/strlen_align.c
Examining data/frama-c-20200625+scandium/tests/builtins/precise_memset.c
Examining data/frama-c-20200625+scandium/tests/builtins/strlen.c
Examining data/frama-c-20200625+scandium/tests/builtins/alloc-vla.c
Examining data/frama-c-20200625+scandium/tests/builtins/allocated.c
Examining data/frama-c-20200625+scandium/tests/builtins/memcpy_invalid.c
Examining data/frama-c-20200625+scandium/tests/builtins/realloc_imprecise.c
Examining data/frama-c-20200625+scandium/tests/builtins/malloc_individual.c
Examining data/frama-c-20200625+scandium/tests/builtins/long_init.c
Examining data/frama-c-20200625+scandium/tests/builtins/strnlen.c
Examining data/frama-c-20200625+scandium/tests/builtins/long_init2.c
Examining data/frama-c-20200625+scandium/tests/builtins/memcpy.c
Examining data/frama-c-20200625+scandium/tests/builtins/malloc-deps.c
Examining data/frama-c-20200625+scandium/tests/builtins/imprecise.c
Examining data/frama-c-20200625+scandium/tests/builtins/memchr.c
Examining data/frama-c-20200625+scandium/tests/builtins/write-const.c
Examining data/frama-c-20200625+scandium/tests/builtins/memset_malloc_0.c
Examining data/frama-c-20200625+scandium/tests/builtins/calloc.c
Examining data/frama-c-20200625+scandium/tests/builtins/realloc2.c
Examining data/frama-c-20200625+scandium/tests/builtins/alloc_weak.c
Examining data/frama-c-20200625+scandium/tests/builtins/str_allocated.c
Examining data/frama-c-20200625+scandium/tests/builtins/malloc.c
Examining data/frama-c-20200625+scandium/tests/builtins/long_init3.c
Examining data/frama-c-20200625+scandium/tests/builtins/vla.c
Examining data/frama-c-20200625+scandium/tests/builtins/malloc-optimistic.c
Examining data/frama-c-20200625+scandium/tests/builtins/memexec-malloc.c
Examining data/frama-c-20200625+scandium/tests/builtins/linked_list.c
Examining data/frama-c-20200625+scandium/tests/builtins/fam.c
Examining data/frama-c-20200625+scandium/tests/builtins/wcslen.c
Examining data/frama-c-20200625+scandium/tests/builtins/memcpy2.c
Examining data/frama-c-20200625+scandium/tests/impact/topbot.c
Examining data/frama-c-20200625+scandium/tests/impact/depend3.c
Examining data/frama-c-20200625+scandium/tests/rte_manual/sizeof.c
Examining data/frama-c-20200625+scandium/tests/journal/control2.c
Examining data/frama-c-20200625+scandium/tests/jcdb/jcdb2.c
Examining data/frama-c-20200625+scandium/tests/jcdb/file_without_main.c
Examining data/frama-c-20200625+scandium/tests/jcdb/jcdb.c
Examining data/frama-c-20200625+scandium/tests/constant_propagation/declaration.c
Examining data/frama-c-20200625+scandium/tests/constant_propagation/declaration2.c
Examining data/frama-c-20200625+scandium/tests/constant_propagation/const_globals.c
Examining data/frama-c-20200625+scandium/tests/constant_propagation/const_propagate.c
Examining data/frama-c-20200625+scandium/tests/constant_propagation/introduction_of_non_explicit_cast.c
Examining data/frama-c-20200625+scandium/tests/constant_propagation/bts117.c
Examining data/frama-c-20200625+scandium/tests/value/simple_packed.c
Examining data/frama-c-20200625+scandium/tests/value/array_array.c
Examining data/frama-c-20200625+scandium/tests/value/for_loops.c
Examining data/frama-c-20200625+scandium/tests/value/any_int.c
Examining data/frama-c-20200625+scandium/tests/value/unsigned_overflow.c
Examining data/frama-c-20200625+scandium/tests/value/incompatible_states.c
Examining data/frama-c-20200625+scandium/tests/value/precond.c
Examining data/frama-c-20200625+scandium/tests/value/config.h
Examining data/frama-c-20200625+scandium/tests/value/logic.c
Examining data/frama-c-20200625+scandium/tests/value/abstract_struct_1.c
Examining data/frama-c-20200625+scandium/tests/value/eval_separated.c
Examining data/frama-c-20200625+scandium/tests/value/empty_base.c
Examining data/frama-c-20200625+scandium/tests/value/arith_pointer.c
Examining data/frama-c-20200625+scandium/tests/value/octagons.c
Examining data/frama-c-20200625+scandium/tests/value/bigarray.c
Examining data/frama-c-20200625+scandium/tests/value/loop3.c
Examining data/frama-c-20200625+scandium/tests/value/strucval.c
Examining data/frama-c-20200625+scandium/tests/value/auto_loop_unroll.c
Examining data/frama-c-20200625+scandium/tests/value/invalid_pointer.c
Examining data/frama-c-20200625+scandium/tests/value/no_results.c
Examining data/frama-c-20200625+scandium/tests/value/machdep.c
Examining data/frama-c-20200625+scandium/tests/value/pragma.c
Examining data/frama-c-20200625+scandium/tests/value/sign_of_bitfiled_int.c
Examining data/frama-c-20200625+scandium/tests/value/bitwise_float.c
Examining data/frama-c-20200625+scandium/tests/value/inline.c
Examining data/frama-c-20200625+scandium/tests/value/CruiseControl.c
Examining data/frama-c-20200625+scandium/tests/value/attribute-aligned.c
Examining data/frama-c-20200625+scandium/tests/value/CruiseControl_extern.h
Examining data/frama-c-20200625+scandium/tests/value/volatilestruct.c
Examining data/frama-c-20200625+scandium/tests/value/loopinv.c
Examining data/frama-c-20200625+scandium/tests/value/builtins_split.c
Examining data/frama-c-20200625+scandium/tests/value/equality.c
Examining data/frama-c-20200625+scandium/tests/value/tab.c
Examining data/frama-c-20200625+scandium/tests/value/limits.c
Examining data/frama-c-20200625+scandium/tests/value/align_char_array.c
Examining data/frama-c-20200625+scandium/tests/value/abstract_struct_2.c
Examining data/frama-c-20200625+scandium/tests/value/config_types.h
Examining data/frama-c-20200625+scandium/tests/value/nonlin.c
Examining data/frama-c-20200625+scandium/tests/value/cast_axalto.c
Examining data/frama-c-20200625+scandium/tests/value/enum2.c
Examining data/frama-c-20200625+scandium/tests/value/test_arith.c
Examining data/frama-c-20200625+scandium/tests/value/pointer_comparison.c
Examining data/frama-c-20200625+scandium/tests/value/empty_struct.c
Examining data/frama-c-20200625+scandium/tests/value/initialized.c
Examining data/frama-c-20200625+scandium/tests/value/behaviors2.c
Examining data/frama-c-20200625+scandium/tests/value/postcond_leaf.c
Examining data/frama-c-20200625+scandium/tests/value/replace_by_show_each.c
Examining data/frama-c-20200625+scandium/tests/value/va_list.c
Examining data/frama-c-20200625+scandium/tests/value/definitions.h
Examining data/frama-c-20200625+scandium/tests/value/ptr_call_object.c
Examining data/frama-c-20200625+scandium/tests/value/CruiseControl.h
Examining data/frama-c-20200625+scandium/tests/value/unop.c
Examining data/frama-c-20200625+scandium/tests/value/gauges.c
Examining data/frama-c-20200625+scandium/tests/value/inline.h
Examining data/frama-c-20200625+scandium/tests/value/addrofstring.c
Examining data/frama-c-20200625+scandium/tests/value/volatile.c
Examining data/frama-c-20200625+scandium/tests/value/array_access.c
Examining data/frama-c-20200625+scandium/tests/value/subset.c
Examining data/frama-c-20200625+scandium/tests/value/ineq.c
Examining data/frama-c-20200625+scandium/tests/value/redundant_alarms.c
Examining data/frama-c-20200625+scandium/tests/value/empty_union.c
Examining data/frama-c-20200625+scandium/tests/value/cast_return.c
Examining data/frama-c-20200625+scandium/tests/value/numerors/numerors.c
Examining data/frama-c-20200625+scandium/tests/value/CruiseControl_const.c
Examining data/frama-c-20200625+scandium/tests/value/backward_add_ptr.c
Examining data/frama-c-20200625+scandium/tests/value/va_list2.c
Examining data/frama-c-20200625+scandium/tests/value/asm_contracts.c
Examining data/frama-c-20200625+scandium/tests/value/domains_function.c
Examining data/frama-c-20200625+scandium/tests/value/bitfield_longlong.c
Examining data/frama-c-20200625+scandium/tests/value/hierarchical_convergence.c
Examining data/frama-c-20200625+scandium/tests/value/scade_types.h
Examining data/frama-c-20200625+scandium/tests/value/bug0196.c
Examining data/frama-c-20200625+scandium/tests/value/local_cleanup.c
Examining data/frama-c-20200625+scandium/tests/value/garbled_init.c
Examining data/frama-c-20200625+scandium/tests/value/pointer_comp.c
Examining data/frama-c-20200625+scandium/tests/value/max_pointed.c
Examining data/frama-c-20200625+scandium/tests/value/period.c
Examining data/frama-c-20200625+scandium/tests/value/memexec.c
Examining data/frama-c-20200625+scandium/tests/value/precond2.c
Examining data/frama-c-20200625+scandium/tests/value/threat_redundant.c
Examining data/frama-c-20200625+scandium/tests/value/shift_neg.c
Examining data/frama-c-20200625+scandium/tests/value/wide_string.c
Examining data/frama-c-20200625+scandium/tests/value/traces/test1.c
Examining data/frama-c-20200625+scandium/tests/value/packed.c
Examining data/frama-c-20200625+scandium/tests/value/interpol.c
Examining data/frama-c-20200625+scandium/tests/value/partitioning-annots.c
Examining data/frama-c-20200625+scandium/tests/value/empty_struct2.c
Examining data/frama-c-20200625+scandium/tests/value/recol.c
Examining data/frama-c-20200625+scandium/tests/rte/bts621.c
Examining data/frama-c-20200625+scandium/tests/rte/gnu_zero_length.c
Examining data/frama-c-20200625+scandium/tests/rte/array_index.c
Examining data/frama-c-20200625+scandium/tests/rte/noresult.c
Examining data/frama-c-20200625+scandium/tests/rte/reqlabl2.c
Examining data/frama-c-20200625+scandium/tests/rte/precond.c
Examining data/frama-c-20200625+scandium/tests/rte/sizeof.c
Examining data/frama-c-20200625+scandium/tests/rte/threefunc.c
Examining data/frama-c-20200625+scandium/tests/rte/initialized_union.c
Examining data/frama-c-20200625+scandium/tests/rte/addsub_unsigned.c
Examining data/frama-c-20200625+scandium/tests/rte/castoncall.c
Examining data/frama-c-20200625+scandium/tests/rte/minus.c
Examining data/frama-c-20200625+scandium/tests/rte/shift_machdep.c
Examining data/frama-c-20200625+scandium/tests/rte/bts0567.c
Examining data/frama-c-20200625+scandium/tests/rte/assign6.c
Examining data/frama-c-20200625+scandium/tests/rte/twofunc3.c
Examining data/frama-c-20200625+scandium/tests/rte/tab.c
Examining data/frama-c-20200625+scandium/tests/rte/assign4.c
Examining data/frama-c-20200625+scandium/tests/rte/addsub_typedef.c
Examining data/frama-c-20200625+scandium/tests/rte/valid.c
Examining data/frama-c-20200625+scandium/tests/rte/postcond.c
Examining data/frama-c-20200625+scandium/tests/rte/float_to_int.c
Examining data/frama-c-20200625+scandium/tests/rte/assign3.c
Examining data/frama-c-20200625+scandium/tests/rte/divmod_typedef.c
Examining data/frama-c-20200625+scandium/tests/rte/fptr_assert.c
Examining data/frama-c-20200625+scandium/tests/rte/s64.c
Examining data/frama-c-20200625+scandium/tests/rte/assign5.c
Examining data/frama-c-20200625+scandium/tests/rte/bts0580_2.c
Examining data/frama-c-20200625+scandium/tests/rte/downcast.c
Examining data/frama-c-20200625+scandium/tests/rte/initialized.c
Examining data/frama-c-20200625+scandium/tests/rte/assign2.c
Examining data/frama-c-20200625+scandium/tests/rte/twofunc.c
Examining data/frama-c-20200625+scandium/tests/rte/memaccess.c
Examining data/frama-c-20200625+scandium/tests/rte/mul.c
Examining data/frama-c-20200625+scandium/tests/rte/addsub_unsigned_typedef.c
Examining data/frama-c-20200625+scandium/tests/rte/assign.c
Examining data/frama-c-20200625+scandium/tests/rte/assign7.c
Examining data/frama-c-20200625+scandium/tests/rte/bts1052.c
Examining data/frama-c-20200625+scandium/tests/rte/divmod.c
Examining data/frama-c-20200625+scandium/tests/rte/malloc.c
Examining data/frama-c-20200625+scandium/tests/rte/shift.c
Examining data/frama-c-20200625+scandium/tests/rte/shift_unsigned.c
Examining data/frama-c-20200625+scandium/tests/rte/addsub.c
Examining data/frama-c-20200625+scandium/tests/rte/finite_float.c
Examining data/frama-c-20200625+scandium/tests/rte/bts0576.c
Examining data/frama-c-20200625+scandium/tests/rte/precond2.c
Examining data/frama-c-20200625+scandium/tests/rte/postcond2.c
Examining data/frama-c-20200625+scandium/tests/rte/value_rte.c
Examining data/frama-c-20200625+scandium/tests/rte/reqlabl.c
Examining data/frama-c-20200625+scandium/tests/fc_script/for-find-fun2.c
Examining data/frama-c-20200625+scandium/tests/fc_script/main3.c
Examining data/frama-c-20200625+scandium/tests/fc_script/for-find-fun.c
Examining data/frama-c-20200625+scandium/tests/fc_script/main.c
Examining data/frama-c-20200625+scandium/tests/fc_script/main2.c
Examining data/frama-c-20200625+scandium/tests/metrics/cyclo_comp5.c
Examining data/frama-c-20200625+scandium/tests/metrics/variadic-stdlib-generated.c
Examining data/frama-c-20200625+scandium/tests/metrics/reach.c
Examining data/frama-c-20200625+scandium/tests/metrics/used-files1.h
Examining data/frama-c-20200625+scandium/tests/metrics/used-files10.c
Examining data/frama-c-20200625+scandium/tests/metrics/libc.c
Examining data/frama-c-20200625+scandium/tests/metrics/used-files9.c
Examining data/frama-c-20200625+scandium/tests/metrics/unreachable.c
Examining data/frama-c-20200625+scandium/tests/metrics/func_ptr.c
Examining data/frama-c-20200625+scandium/tests/metrics/used-files2.h
Examining data/frama-c-20200625+scandium/tests/idct/ieee_1180_1990.c
Examining data/frama-c-20200625+scandium/tests/idct/idct.c
Examining data/frama-c-20200625+scandium/tests/pretty_printing/ghost_parameters.c
Examining data/frama-c-20200625+scandium/tests/pretty_printing/parenthesis.c
Examining data/frama-c-20200625+scandium/tests/pretty_printing/relations.c
Examining data/frama-c-20200625+scandium/tests/pretty_printing/binary_logic_op.c
Examining data/frama-c-20200625+scandium/tests/float/special_floats.c
Examining data/frama-c-20200625+scandium/tests/float/nonlin.c
Examining data/frama-c-20200625+scandium/tests/float/sqrt.c
Examining data/frama-c-20200625+scandium/tests/float/cond.c
Examining data/frama-c-20200625+scandium/tests/float/cond_cast_int_to_float.c
Examining data/frama-c-20200625+scandium/tests/float/widen.c
Examining data/frama-c-20200625+scandium/tests/float/math_builtins.c
Examining data/frama-c-20200625+scandium/tests/float/builtins.c
Examining data/frama-c-20200625+scandium/tests/float/precise_cos_sin.c
Examining data/frama-c-20200625+scandium/tests/float/some.c
Examining data/frama-c-20200625+scandium/tests/float/absorb.c

FINAL RESULTS:

data/frama-c-20200625+scandium/share/libc/stdio.h:320:14:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
extern char *gets(char *s);
data/frama-c-20200625+scandium/share/libc/sys/stat.h:32:15:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
extern int    chmod(const char *, mode_t);
data/frama-c-20200625+scandium/share/libc/unistd.h:779:21:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
extern int          chown(const char *path, uid_t owner, gid_t group);
data/frama-c-20200625+scandium/share/libc/unistd.h:1014:21:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
extern int          readlink(const char *, char *, size_t);
data/frama-c-20200625+scandium/tests/libc/unistd_h.c:88:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
  r = chown("/tmp/a.txt", 01000, 01000);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:80:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    len = readlink(namebuf, linkpath, MAXPATHLEN);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:80:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    len = readlink(namebuf, linkpath, MAXPATHLEN);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:60:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    len = readlink(namebuf, linkpath, MAXPATHLEN);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:60:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    len = readlink(namebuf, linkpath, MAXPATHLEN);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:17:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    len = readlink(namebuf, linkpath, MAXPATHLEN);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:17:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    len = readlink(namebuf, linkpath, MAXPATHLEN);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/wu-ftpd.c:27:5:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
int readlink(const char *path, char *buf, int bufsiz)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/wu-ftpd.h:15:5:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
int readlink(const char *path, char *buf, int bufsiz);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:56:13:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        n = readlink(tmp, resolved, MAXPATHLEN);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:56:13:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        n = readlink(tmp, resolved, MAXPATHLEN);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/wu-ftpd.c:7:5:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
int readlink(const char *path, char *buf, int bufsiz)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/wu-ftpd.h:10:5:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
int readlink(const char *path, char *buf, int bufsiz);
data/frama-c-20200625+scandium/share/libc/stdio.h:207:12:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int fprintf(FILE * restrict stream,
data/frama-c-20200625+scandium/share/libc/stdio.h:209:12:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int fscanf(FILE * restrict stream,
data/frama-c-20200625+scandium/share/libc/stdio.h:211:12:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int printf(const char * restrict format, ...);
data/frama-c-20200625+scandium/share/libc/stdio.h:212:12:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int scanf(const char * restrict format, ...);
data/frama-c-20200625+scandium/share/libc/stdio.h:213:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
extern int snprintf(char * restrict s, size_t n,
data/frama-c-20200625+scandium/share/libc/stdio.h:215:12:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
extern int sprintf(char * restrict s,
data/frama-c-20200625+scandium/share/libc/stdio.h:217:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int sscanf(const char * restrict s,
data/frama-c-20200625+scandium/share/libc/stdio.h:221:12:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int vfprintf(FILE * restrict stream,
data/frama-c-20200625+scandium/share/libc/stdio.h:227:12:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int vfscanf(FILE * restrict stream,
data/frama-c-20200625+scandium/share/libc/stdio.h:232:12:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int vprintf(const char * restrict format,
data/frama-c-20200625+scandium/share/libc/stdio.h:237:12:  [4] (buffer) vscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int vscanf(const char * restrict format,
data/frama-c-20200625+scandium/share/libc/stdio.h:242:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
extern int vsnprintf(char * restrict s, size_t n,
data/frama-c-20200625+scandium/share/libc/stdio.h:248:12:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
extern int vsprintf(char * restrict s,
data/frama-c-20200625+scandium/share/libc/stdio.h:253:12:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int vsscanf(const char * restrict s,
data/frama-c-20200625+scandium/share/libc/stdio.h:559:14:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern FILE *popen(const char *command, const char *type);
data/frama-c-20200625+scandium/share/libc/stdlib.h:528:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int system(const char *command);
data/frama-c-20200625+scandium/share/libc/string.c:179:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
char* strcat(char *dest, const char *src)
data/frama-c-20200625+scandium/share/libc/string.c:204:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char* strcpy(char *dest, const char *src)
data/frama-c-20200625+scandium/share/libc/string.h:360:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char *strcpy(char *restrict dest, const char *restrict src);
data/frama-c-20200625+scandium/share/libc/string.h:420:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat(char *restrict dest, const char *restrict src);
data/frama-c-20200625+scandium/share/libc/syslog.h:142:14:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
extern void  syslog(int, const char *, ...);
data/frama-c-20200625+scandium/share/libc/unistd.h:744:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern int          access(const char *path, int amode);
data/frama-c-20200625+scandium/share/libc/unistd.h:789:21:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
extern char        *crypt(const char *, const char *);
data/frama-c-20200625+scandium/share/libc/unistd.h:791:21:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
extern char        *cuserid(char *s);
data/frama-c-20200625+scandium/share/libc/unistd.h:817:21:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int          execl(const char *path, const char *arg, ...);
data/frama-c-20200625+scandium/share/libc/unistd.h:822:21:  [4] (shell) execle:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int          execle(const char *path, const char *arg, ...);
data/frama-c-20200625+scandium/share/libc/unistd.h:827:21:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int          execlp(const char *path, const char *arg, ...);
data/frama-c-20200625+scandium/share/libc/unistd.h:832:21:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int          execv(const char *path, char *const argv[]);
data/frama-c-20200625+scandium/share/libc/unistd.h:842:21:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int          execvp(const char *path, char *const argv[]);
data/frama-c-20200625+scandium/share/libc/unistd.h:917:21:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
extern char        *getlogin(void);
data/frama-c-20200625+scandium/share/libc/unistd.h:920:21:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
extern char        *getpass(const char *);
data/frama-c-20200625+scandium/share/libc/wchar.c:43:10:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
wchar_t* wcscpy(wchar_t *dest, const wchar_t *src)
data/frama-c-20200625+scandium/share/libc/wchar.c:71:11:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
wchar_t * wcscat(wchar_t *dest, const wchar_t *src)
data/frama-c-20200625+scandium/share/libc/wchar.h:117:18:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
extern wchar_t * wcscat(wchar_t *restrict dest, const wchar_t *restrict src);
data/frama-c-20200625+scandium/share/libc/wchar.h:142:18:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
extern wchar_t * wcscpy(wchar_t *restrict dest, const wchar_t *restrict src);
data/frama-c-20200625+scandium/share/libc/wchar.h:265:12:  [4] (format) fwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int fwprintf(FILE * stream, const wchar_t * format, ...);
data/frama-c-20200625+scandium/share/libc/wchar.h:267:12:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
extern int swprintf(wchar_t * ws, size_t n, const wchar_t * format, ...);
data/frama-c-20200625+scandium/share/libc/wchar.h:269:12:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int wprintf(const wchar_t * format, ...);
data/frama-c-20200625+scandium/share/libc/wchar.h:272:12:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int wscanf(const wchar_t * format, ...);
data/frama-c-20200625+scandium/share/libc/wchar.h:274:12:  [4] (buffer) fwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int fwscanf(FILE * stream, const wchar_t * format, ...);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:944:10:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return vprintf(fmt, ap);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:967:10:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return vfprintf(stream, fmt, ap);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:990:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int len = vsnprintf(NULL, 0, fmt, ap);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:997:10:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  return vsprintf(buffer, fmt, ap);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:1011:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  return vsnprintf(buffer, size, fmt, ap);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:205:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return strcpy(dest, src);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:249:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  return strcat(dest, src);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_shexec.h:139:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(data->argv[0],data->argv);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:48:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
# define strcat   __builtin_strcat
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:52:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
# define strcpy   __builtin_strcpy
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1398.c:29:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(__gen_e_acsl_literal_string,x,t[0],t[i]);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:36:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  OK(sprintf(buf, "-%s-", "1")); // 4 chars, fits
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:37:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  OK(sprintf(buf, "-%s-", "12")); // 5 chars, still fits
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:38:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ABRT(sprintf(buf, "-%s-", "123")); // 6 chars, no space for NUL
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:39:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ABRT(sprintf(NULL, "-%s-", "123")); // try NULL
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:40:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  ABRT(sprintf(pstr, "-%s-", "123")); // try read-only
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:29:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(format, 1.0);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:31:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(format, 1U);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:33:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(format, 97);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:35:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(format, "foo");
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:37:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(format, &n);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:39:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(format, p);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:52:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(format, fmt);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:194:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  ABRT(printf(fmt, pstr));
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_constructor.c:9:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(__gen_e_acsl_literal_string);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_constructor.c:38:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(__gen_e_acsl_literal_string_2);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_goto.c:43:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(__gen_e_acsl_literal_string_2,t,__gen_e_acsl_literal_string);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_goto.c:61:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(__gen_e_acsl_literal_string_2,t,__gen_e_acsl_literal_string_3);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_goto.c:77:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(__gen_e_acsl_literal_string_2,t,__gen_e_acsl_literal_string_4);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_malloc-asan.c:60:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(__gen_e_acsl_literal_string,p,counter);
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:17:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    scanf("%"SCNd##KIND##size,&x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:18:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf("%"PRId##KIND##size,x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:19:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    scanf("%"SCNi##KIND##size,&x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:20:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf("%"PRIi##KIND##size,x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:25:4:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
   scanf("%"SCNo##KIND##size,&x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:26:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("%"PRIo##KIND##size,x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:27:4:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
   scanf("%"SCNu##KIND##size,&x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:28:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("%"PRIu##KIND##size,x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:29:4:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
   scanf("%"SCNx##KIND##size,&x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:30:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("%"PRIx##KIND##size,x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:31:4:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
   scanf("%"SCNx##KIND##size,&x); \
data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:32:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("%"PRIX##KIND##size,x); \
data/frama-c-20200625+scandium/tests/libc/string_c.c:132:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(s, s+5);
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:56:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  TEST(s, strcpy(b, b+16), b, "wrong return %p != %p");
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:58:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  TEST(s, strcpy(b+1, b+16), b+1, "wrong return %p != %p");
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:60:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  TEST(s, strcpy(b+2, b+16), b+2, "wrong return %p != %p");
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:62:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  TEST(s, strcpy(b+3, b+16), b+3, "wrong return %p != %p");
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:65:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  TEST(s, strcpy(b+1, b+17), b+1, "wrong return %p != %p");
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:67:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  TEST(s, strcpy(b+2, b+18), b+2, "wrong return %p != %p");
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:69:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  TEST(s, strcpy(b+3, b+19), b+3, "wrong return %p != %p");
data/frama-c-20200625+scandium/tests/libc/string_h.c:16:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(string2, string);
data/frama-c-20200625+scandium/tests/libc/string_h.c:53:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dest, src); // must produce at least a warning
data/frama-c-20200625+scandium/tests/libc/unistd_h.c:17:3:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  execl("/bin/sh", "sh", "-c", "ls", (char*)0);
data/frama-c-20200625+scandium/tests/libc/unistd_h.c:19:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  r = access("/tmp", R_OK | W_OK | X_OK);
data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:38:23:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  if (nondet) { res = wcscpy(buf, sc2); goto exit; }
data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:52:23:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
  if (nondet) { res = wcscat(buf, sc2); goto exit; }
data/frama-c-20200625+scandium/tests/metrics/cyclo_comp5.c:5:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void printf(const char *format);
data/frama-c-20200625+scandium/tests/misc/pragma-pack-utils.h:32:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINTF printf
data/frama-c-20200625+scandium/tests/pdg/calls_and_implicits.c:21:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int printf(const char * restrict format, ...);
data/frama-c-20200625+scandium/tests/slicing/unitialized.c:9:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int printf(const char*, int y);
data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:41:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char* strcpy(char* dest, char* src) {
data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:70:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dest,src);
data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:97:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dest,src);
data/frama-c-20200625+scandium/tests/spec/at_exit.c:11:12:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int printf (__const char *__restrict __format, ...);
data/frama-c-20200625+scandium/tests/spec/printf_assigns.c:10:12:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int printf (__const char *__restrict __format, ...);
data/frama-c-20200625+scandium/tests/syntax/multiple_decls_contracts.c:16:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            return strcpy(copy, str);
data/frama-c-20200625+scandium/tests/value/definitions.h:21:12:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int printf(const char *, ...);
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:109:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
char *strcat(char *dest, const char *src)
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:192:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char *strcpy (char *dest, char *src)
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:24:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char *strcpy (char *dest, const char *src);
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:28:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
char *strcat(char *dest, const char *src);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:89:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#pragma ccuredvararg("scanf", printf(1))
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c:32:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      (void) strcpy (buf + j, login);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c:32:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      (void) strcpy (buf + j, login);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/complete/util-bad.c:121:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      (void) strcpy(bp, login);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:23:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:71:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:23:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:71:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:23:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:51:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:23:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:51:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:23:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:71:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:23:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:71:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:23:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:51:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:23:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:51:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:19:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:20:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:19:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(curpath, pathname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:20:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(namebuf, workpath);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:19:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wbuf, resolved + p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:19:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wbuf, resolved + p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:29:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wbuf, resolved + p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:29:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wbuf, resolved + p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:44:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wbuf, resolved + p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:44:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wbuf, resolved + p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:55:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tmp, resolved + p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:74:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wbuf, resolved + p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:55:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tmp, resolved + p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:74:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wbuf, resolved + p);
data/frama-c-20200625+scandium/share/libc/getopt.h:50:12:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt_long (int argc, char *const argv[],
data/frama-c-20200625+scandium/share/libc/stdio.h:116:14:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
extern char *tmpnam(char *s);
data/frama-c-20200625+scandium/share/libc/stdlib.c:100:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv(const char *name)
data/frama-c-20200625+scandium/share/libc/stdlib.h:275:13:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern void srand(unsigned int seed);
data/frama-c-20200625+scandium/share/libc/stdlib.h:281:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long int random(void);
data/frama-c-20200625+scandium/share/libc/stdlib.h:284:13:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern void srandom(unsigned int seed);
data/frama-c-20200625+scandium/share/libc/stdlib.h:307:24:  [3] (random) seed48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern unsigned short *seed48(unsigned short seed16v[3]);
data/frama-c-20200625+scandium/share/libc/stdlib.h:314:13:  [3] (random) lcong48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern void lcong48(unsigned short param[7]);
data/frama-c-20200625+scandium/share/libc/stdlib.h:322:15:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern double drand48(void);
data/frama-c-20200625+scandium/share/libc/stdlib.h:330:15:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern double erand48(unsigned short xsubi[3]);
data/frama-c-20200625+scandium/share/libc/stdlib.h:338:17:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long int lrand48 (void);
data/frama-c-20200625+scandium/share/libc/stdlib.h:346:17:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long int nrand48 (unsigned short xsubi[3]);
data/frama-c-20200625+scandium/share/libc/stdlib.h:354:17:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long int mrand48 (void);
data/frama-c-20200625+scandium/share/libc/stdlib.h:362:17:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long int jrand48 (unsigned short xsubi[3]);
data/frama-c-20200625+scandium/share/libc/stdlib.h:490:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char *getenv(const char *name);
data/frama-c-20200625+scandium/share/libc/unistd.h:767:21:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
extern int          chroot(const char *path);
data/frama-c-20200625+scandium/share/libc/unistd.h:952:21:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
extern char        *getwd(char *);
data/frama-c-20200625+scandium/share/libc/unistd.h:1200:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt(int argc, char * const argv[], const char *optstring);
data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:2047:32:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define ACQUIRE_LOCK(lk)      (EnterCriticalSection(lk), 0)
data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:2066:7:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
      InitializeCriticalSection(&malloc_global_mutex);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/hidden_malloc.c:15:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  char *cwd = realpath(".", NULL);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_hidden_malloc.c:10:34:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
extern int ( /* missing proto */ realpath)(char const *x_0, void *x_1);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_hidden_malloc.c:31:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  tmp = realpath(__gen_e_acsl_literal_string,(void *)0);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_lib.c:10:34:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
extern int ( /* missing proto */ realpath)(char *x_0, char *x_1);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_lib.c:87:11:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  tmp_0 = realpath(c,q);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_lib.c:96:11:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  tmp_1 = realpath(c,q);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fun_lib.c:20:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  char *path = realpath(c, q);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fun_lib.c:21:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        path = realpath(c, q);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_getenv.c:10:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  g1 = getenv("HOME");
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_getenv.c:11:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *g2 = getenv("PATH");
data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:11:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *r1 = getenv("BLA");
data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:16:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *r2 = getenv("BLA");
data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:25:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *r3 = getenv(r2);
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:86:5:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    drand48();
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:90:5:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    lrand48();
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:94:5:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    mrand48();
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:99:5:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    erand48(xsubi);
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:104:7:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  d = erand48(xsubi);
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:106:7:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  l = jrand48(xsubi);
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:108:7:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  l = nrand48(xsubi);
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:113:25:  [3] (random) seed48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  unsigned short *res = seed48(seed48v);
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:115:3:  [3] (random) lcong48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  lcong48(param);
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:117:7:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  d = drand48();
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:119:7:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  l = mrand48();
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:121:7:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  l = lrand48();
data/frama-c-20200625+scandium/tests/libc/unistd_h.c:92:7:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
  r = chroot("/tmp");
data/frama-c-20200625+scandium/tests/metrics/libc.c:26:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt(int argc, char * const argv[],
data/frama-c-20200625+scandium/tests/metrics/libc.c:33:3:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  getopt(0, 0, 0);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/my-main.c:89:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((j = getopt(argc, argv, OPTIONS)) != -1)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:7:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:35:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:7:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:35:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:112:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:118:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:92:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:98:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:49:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:55:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:95:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:95:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:76:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:75:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:39:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:4:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *pathname, char *result, char* chroot_path)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:39:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(pathname, result, chroot_path);
data/frama-c-20200625+scandium/share/analysis-scripts/examples/example.c:3:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char s[10], t[10];
data/frama-c-20200625+scandium/share/analysis-scripts/examples/example.c:8:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t, s, 10);
data/frama-c-20200625+scandium/share/analysis-scripts/fc_stubs.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char argv0[256], argv1[256], argv2[256], argv3[256], argv4[256];
data/frama-c-20200625+scandium/share/analysis-scripts/fc_stubs.c:15:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *argv[6] = {argv0, argv1, argv2, argv3, argv4, 0};
data/frama-c-20200625+scandium/share/libc/__fc_define_sockaddr.h:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			sa_data[14];	/* 14 bytes of protocol address	*/
data/frama-c-20200625+scandium/share/libc/__fc_inet.h:252:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ip_opts[40]; /* Actually variable in size.  */
data/frama-c-20200625+scandium/share/libc/__fc_inet.h:362:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
volatile char __fc_inet_ntoa_array[16];
data/frama-c-20200625+scandium/share/libc/dirent.h:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           d_name[256]; /* filename */
data/frama-c-20200625+scandium/share/libc/fcntl.h:120:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
extern int open(const char *filename, int flags, ...);
data/frama-c-20200625+scandium/share/libc/libgen.h:31:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char __fc_basename[__FC_PATH_MAX];
data/frama-c-20200625+scandium/share/libc/libgen.h:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char __fc_dirname[__FC_PATH_MAX];
data/frama-c-20200625+scandium/share/libc/net/if.h:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ifrn_name[IFNAMSIZ];	/* Interface name, e.g. "en0".  */
data/frama-c-20200625+scandium/share/libc/net/if.h:128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ifru_slave[IFNAMSIZ];	/* Just fits the size */
data/frama-c-20200625+scandium/share/libc/net/if.h:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ifru_newname[IFNAMSIZ];
data/frama-c-20200625+scandium/share/libc/netdb.c:86:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char host_addr[sizeof(struct in_addr)];
data/frama-c-20200625+scandium/share/libc/netdb.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *h_addr_ptrs[__FC_MAX_HOST_ADDRS + 1];
data/frama-c-20200625+scandium/share/libc/netdb.c:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *host_aliases[__FC_MAX_HOST_ALIASES];
data/frama-c-20200625+scandium/share/libc/netdb.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostbuf[__FC_HOSTBUF_SIZE];
data/frama-c-20200625+scandium/share/libc/netdb.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[__FC_QUERYBUF_SIZE];
data/frama-c-20200625+scandium/share/libc/netdb.c:122:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(__fc_ghbn.host_addr, &addr, __fc_ghbn.host.h_length);
data/frama-c-20200625+scandium/share/libc/netdb.c:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(__fc_ghbn.host_addr, &addr, __fc_ghbn.host.h_length);
data/frama-c-20200625+scandium/share/libc/pwd.h:47:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char __fc_getpwuid_pw_name[64];
data/frama-c-20200625+scandium/share/libc/pwd.h:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char __fc_getpwuid_pw_passwd[64];
data/frama-c-20200625+scandium/share/libc/pwd.h:49:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char __fc_getpwuid_pw_dir[64];
data/frama-c-20200625+scandium/share/libc/pwd.h:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char __fc_getpwuid_pw_shell[64];
data/frama-c-20200625+scandium/share/libc/semaphore.h:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __size[16];
data/frama-c-20200625+scandium/share/libc/stdio.h:99:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
extern FILE *tmpfile(void);
data/frama-c-20200625+scandium/share/libc/stdio.h:101:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char __fc_tmpnam[L_tmpnam];
data/frama-c-20200625+scandium/share/libc/stdio.h:157:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
extern FILE *fopen(const char * restrict filename,
data/frama-c-20200625+scandium/share/libc/stdlib.c:39:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
int atoi(const char *p)
data/frama-c-20200625+scandium/share/libc/stdlib.c:77:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *__fc_env[ARG_MAX] __attribute__((FRAMA_C_MODEL));
data/frama-c-20200625+scandium/share/libc/stdlib.c:81:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char __fc_env_strings[__FC_INITENV_LEN];
data/frama-c-20200625+scandium/share/libc/stdlib.h:81:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern int atoi(const char *nptr);
data/frama-c-20200625+scandium/share/libc/stdlib.h:87:17:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern long int atol(const char *nptr);
data/frama-c-20200625+scandium/share/libc/stdlib.h:483:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *__fc_env[ARG_MAX] __attribute__((FRAMA_C_MODEL));
data/frama-c-20200625+scandium/share/libc/stdlib.h:700:12:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
extern int mkstemp(char *templat);
data/frama-c-20200625+scandium/share/libc/string.c:30:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void* memcpy(void* restrict dest, const void* restrict src, size_t n)
data/frama-c-20200625+scandium/share/libc/string.c:133:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  return (((unsigned char *)s1)[i] - ((unsigned char *)s2)[i]);
data/frama-c-20200625+scandium/share/libc/string.c:133:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  return (((unsigned char *)s1)[i] - ((unsigned char *)s2)[i]);
data/frama-c-20200625+scandium/share/libc/string.c:140:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      return ((unsigned char *)s1)[i] - ((unsigned char *)s2)[i];
data/frama-c-20200625+scandium/share/libc/string.c:140:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      return ((unsigned char *)s1)[i] - ((unsigned char *)s2)[i];
data/frama-c-20200625+scandium/share/libc/string.c:274:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char __fc_strerror[64];
data/frama-c-20200625+scandium/share/libc/string.c:298:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, s, l);
data/frama-c-20200625+scandium/share/libc/string.c:315:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, s, l);
data/frama-c-20200625+scandium/share/libc/string.c:320:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char __fc_strsignal[64];
data/frama-c-20200625+scandium/share/libc/string.h:101:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
extern void *memcpy(void *restrict dest,
data/frama-c-20200625+scandium/share/libc/string.h:336:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char __fc_strerror[64];
data/frama-c-20200625+scandium/share/libc/string.h:514:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char __fc_strsignal[64];
data/frama-c-20200625+scandium/share/libc/strings.h:33:15:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
extern void   bcopy(const void *, void *, size_t);
data/frama-c-20200625+scandium/share/libc/stropts.h:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  l_name[FMNAMESZ+1];
data/frama-c-20200625+scandium/share/libc/sys/time.h:54:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern int utimes(const char *path, const struct timeval times[2]);
data/frama-c-20200625+scandium/share/libc/sys/un.h:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sun_path[108];         /* Path name.  */
data/frama-c-20200625+scandium/share/libc/sys/utsname.h:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sysname[_FC_UTSNAME_LENGTH];
data/frama-c-20200625+scandium/share/libc/sys/utsname.h:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nodename[_FC_UTSNAME_LENGTH];
data/frama-c-20200625+scandium/share/libc/sys/utsname.h:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char release[_FC_UTSNAME_LENGTH];
data/frama-c-20200625+scandium/share/libc/sys/utsname.h:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char version[_FC_UTSNAME_LENGTH];
data/frama-c-20200625+scandium/share/libc/sys/utsname.h:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char machine[_FC_UTSNAME_LENGTH];
data/frama-c-20200625+scandium/share/libc/time.c:27:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char __fc_ctime[26];
data/frama-c-20200625+scandium/share/libc/time.h:111:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char __fc_ctime[26];
data/frama-c-20200625+scandium/share/libc/time.h:304:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *tzname[2];
data/frama-c-20200625+scandium/share/libc/unistd.c:27:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
volatile char __fc_ttyname[TTY_NAME_MAX];
data/frama-c-20200625+scandium/share/libc/unistd.h:897:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern volatile char __fc_hostname[HOST_NAME_MAX];
data/frama-c-20200625+scandium/share/libc/unistd.h:1099:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern volatile char __fc_ttyname[TTY_NAME_MAX];
data/frama-c-20200625+scandium/share/libc/unistd.h:1129:21:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
extern pid_t        vfork(void);
data/frama-c-20200625+scandium/share/libc/utmpx.h:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ut_user[32];
data/frama-c-20200625+scandium/share/libc/utmpx.h:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ut_id[4];
data/frama-c-20200625+scandium/share/libc/utmpx.h:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ut_line[32];
data/frama-c-20200625+scandium/share/libc/utmpx.h:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ut_host[256]; // not POSIX, but allowed by it, and present in glibc
data/frama-c-20200625+scandium/share/libc/wchar.h:279:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct __fc_mbstate_t { int __count; char __value[4]; } mbstate_t;
data/frama-c-20200625+scandium/share/machdep.c:278:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ca[2];
data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:1729:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
           (dev_zero_fd = open("/dev/zero", O_RDWR), \
data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:3233:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char buf[sizeof(size_t)];
data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:3235:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open("/dev/urandom", O_RDONLY)) >= 0 &&
data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:5290:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(mem, oldmem, (oc < bytes)? oc : bytes);
data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:5846:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(mem, oldmem, (oc < bytes)? oc : bytes);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_assert.h:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf [strlen(fmt) + strlen(afmt) + PATH_MAX +  11];
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_debug.h:89:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dlog_fd = open(dlog_name, O_WRONLY | O_CREAT | O_TRUNC  |O_NONBLOCK
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:232:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char format_char_map[256];
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:266:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char directive [16]; /* Directive string */
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:653:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lm_kind[3];
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:278:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return memcpy(dest, src, n);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_printf.h:273:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bf[256];
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:45:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define memcpy   __builtin_memcpy
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:64:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest + strlen(dest), src, strlen(src) + 1);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:73:40:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    return (n == NULL) ? NULL : (char*)memcpy(n, s, len);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:119:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char zeroblock [ZERO_BLOCK_SIZE];
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_temporal.h:73:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest_shadow, src_shadow, size);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_trace.h:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char executable [PATH_MAX];
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h:952:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return memcpy(ret, ptr, size);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h:1063:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(new_init_shadow, old_init_shadow, copy_size);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h:1348:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prim_buf[256];
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h:1349:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_buf[256];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1386_complex_flowgraph.c:69:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            source[ARRAYSIZE];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1386_complex_flowgraph.c:70:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            target[ARRAYSIZE];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1399.c:8:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char __attribute__((__aligned__(32))) state[1600 / 8] ;
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1399.c:9:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char __attribute__((__aligned__(32))) dataQueue[1536 / 8] ;
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2192.c:10:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  a = argc = atoi(n);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2406.c:6:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char t[10]; /* monitored */
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1304.c:32:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[sizeof(union msg)];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1386_complex_flowgraph.c:260:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char source[100];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1386_complex_flowgraph.c:261:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char target[100];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1399.c:5:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char __attribute__((__aligned__(32))) state[1600 / 8] ;
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1399.c:6:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char __attribute__((__aligned__(32))) dataQueue[1536 / 8] ;
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2406.c:5:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char t[10];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char template [256];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:19:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  FILE *fh = tmpfile();
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[5];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_fprintf.c:210:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char template[256];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_fprintf.c:211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[5];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf.c:2214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char astr[13] =
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf.c:2365:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[7] =
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf.c:6418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s4[4] = {(char)'c', (char)'a', (char)'t', (char)'\000'};
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char format[len + 1];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:192:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[7] = "fmt:%s";
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s4[4] = "cat";
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:438:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t ls4[4] = L"cat";
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/compound_initializers.c:9:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *_A[2] = { "XX", "YY" };
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/freeable.c:10:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char array[1024];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_compound_initializers.c:15:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *_A[2] = {(char *)"XX", (char *)"YY"};
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_freeable.c:4:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char array[1024];
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_global_init.c:55:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char const *strings[2][2] = {{"the", "tha"}, {"thi", "tho"}};
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c:50:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *Strings[2][2] =
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c:52:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *Str[4] = {(char *)"foo", (char *)"bar", (char *)"baz", (char *)0};
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *strings[2][2] =
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *str[4] =
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_global_init.c:42:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * strings [2][2] = {
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c:26:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * Strings [2][2] = {
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c:31:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * Str [4] = { "foo", "bar", "baz", NULL };
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char * strings [2][2] = {
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char * str [4] = { "foo", "bar", "baz", NULL };
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_memcpy.c:25:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&dest, &src, size);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_memcpy.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(q, p, size);
data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.old.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seen[BOUND];
data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.old.v2.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seen[BOUND];
data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.simplified.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seen[BOUND];
data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/subset_fopen.c:13:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE *fopen(const char * restrict filename,
data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/subset_fopen.c:25:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* p = fopen ("bla", 0);
data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/bug_9.c:8:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char *T2[1];
data/frama-c-20200625+scandium/tests/builtins/alloc_weak.c:14:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst + off, src + off, len);
data/frama-c-20200625+scandium/tests/builtins/fam.c:16:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(option->value, value, 2);
data/frama-c-20200625+scandium/tests/builtins/imprecise.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t_char[100];
data/frama-c-20200625+scandium/tests/builtins/imprecise.c:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c [20480];
data/frama-c-20200625+scandium/tests/builtins/linked_list.c:13:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char MEMORY[MEMORY_SIZE];
data/frama-c-20200625+scandium/tests/builtins/malloc_bug_tr.c:13:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, "foo", 4);
data/frama-c-20200625+scandium/tests/builtins/malloc_bug_tr.c:14:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p + 4, "x", 2); // must produce alarm
data/frama-c-20200625+scandium/tests/builtins/malloc_bug_tr.c:15:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, p + 5, 1); // \valid_read((p + 5) + (0 .. (1 - 1)))
data/frama-c-20200625+scandium/tests/builtins/memchr.c:27:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CHAR_ARRAY(var,n) char var[n]
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:7:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char src[20];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:8:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char dst1[20], dst2[20], dst3[20];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:9:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char dst4[20], dst5[100];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:28:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p,"d",1);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:47:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&tm[p],s,4);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:49:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&um[p],s,2);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:53:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&ttyp[p],&ty,sizeof(typ));
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:56:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
struct t1 { int x; int y; int* p; char padding[24];} v1,v2, v3, v4, v5;
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:68:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst1+1, src+2, b);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:70:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst2+1, src+2, 2*b);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst3+5, src+2, b);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst4+5, src+2, 2*b);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:83:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&v2, &v1, sizeof(v1));
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t+2, t, (1+!a)*sizeof(v1));
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:87:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&v3, t+(int)t, sizeof(v1));
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:89:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&v4 + (int)&v4, &v1, sizeof(v1)-20);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:91:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&v5 + (int)&v5, &v4, sizeof(v4)-20);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:96:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void *)&x, (void const*)&x, i);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &src[0], b);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:105:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &src[0], b);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ptop1[800];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:114:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pptop, src, 4);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ptop2[800];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pptop, src+1, 4);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ptop3[800];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:131:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pptop, src+2, 4);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ptop4[800];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:140:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pptop, src+2, 5);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:143:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char garbledsize[100];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:145:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pgarbledsize, src, (unsigned int)garbledsize);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dstmaybesize1[15], dstmaybesize2[150];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:151:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dstmaybesize1, src, maybesize);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:153:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dstmaybesize2, src, maybesize);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:168:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char a[50];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:169:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char b[50];
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:172:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(b, a, 10);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:174:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(b, a, itv(0,25));
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:179:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(b, a, 10);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:181:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(b, a, itv(0,25));
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:187:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(b, a, 10); // de-initialize b
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:190:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(b, a, itv(0,25)); // copy completely uninitialized in an unsure way
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:198:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(b, a, 10);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:200:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(b, a, itv(0,25));
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:209:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p, &q, sizeof(int *));
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:220:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (i) memcpy(0, &l, 0);
data/frama-c-20200625+scandium/tests/builtins/memcpy.c:221:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (i) memcpy(&l, 0, 0);
data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t[512];
data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[512] = { 0 };
data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:10:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t, s, l);
data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:15:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t, s, l);
data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:18:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t, s, l);
data/frama-c-20200625+scandium/tests/builtins/memcpy_invalid.c:17:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&dst, (char *)&src + i, sizeof(src) - i);
data/frama-c-20200625+scandium/tests/builtins/precise_memset.c:68:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char t_b[SIZE];
data/frama-c-20200625+scandium/tests/builtins/strchr.c:27:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CHAR_ARRAY(var,n) char var[n]
data/frama-c-20200625+scandium/tests/builtins/strlen.c:27:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CHAR_ARRAY(var,n) char var[n]
data/frama-c-20200625+scandium/tests/builtins/strlen.c:51:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char unterminated_string[12] = "unterminated";
data/frama-c-20200625+scandium/tests/builtins/strlen.c:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t[4];
data/frama-c-20200625+scandium/tests/builtins/strlen.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char empty_or_non_terminated[1];
data/frama-c-20200625+scandium/tests/builtins/strlen.c:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char non_terminated[1] = {'X'};
data/frama-c-20200625+scandium/tests/builtins/strlen.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char non_terminated2[4] = { 76, 0, 28, 14 };
data/frama-c-20200625+scandium/tests/builtins/strlen.c:219:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[4];
data/frama-c-20200625+scandium/tests/builtins/strlen.c:234:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char loc_char_array[5];
data/frama-c-20200625+scandium/tests/builtins/strlen.c:274:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char maybe_init[2];
data/frama-c-20200625+scandium/tests/builtins/strlen.c:309:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/frama-c-20200625+scandium/tests/builtins/strlen.c:330:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dest[100 * 2];
data/frama-c-20200625+scandium/tests/builtins/strlen_align.c:15:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stval[2];
data/frama-c-20200625+scandium/tests/builtins/strnlen.c:4:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char t1[5] = "abcde";
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:19:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CHAR_ARRAY(var,n) char var[n]
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:39:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char unterminated_string[12] = "unterminated";
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char empty_or_uninitialized[1];
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uninitialized[1];
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:143:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char a[100];
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char a[100];
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char loc_char_array[5];
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char maybe_init[2];
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:488:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:509:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dest[100 * 2];
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:27:27:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CHAR_ARRAY(var,n) wchar_t var[n]
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:51:1:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
wchar_t unterminated_string[12] = L"unterminated";
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:78:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t t[4];
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:87:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t empty_or_non_terminated[1];
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:92:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t non_terminated[1] = {'X'};
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:95:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t non_terminated2[4] = { 76, 0, 28, 14 };
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:219:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t s[4];
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:234:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t loc_char_array[5];
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:274:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t maybe_init[2];
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:313:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf[100];
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:335:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t dest[100 * 2];
data/frama-c-20200625+scandium/tests/builtins/write-const.c:18:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &x, sizeof(x));
data/frama-c-20200625+scandium/tests/cil/issues.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1];
data/frama-c-20200625+scandium/tests/cil/issues.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char a[(((time_t) 1.5 == 1)) ? 1 : -1];
data/frama-c-20200625+scandium/tests/cil/issues.c:85:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char a[mySize() * 2];
data/frama-c-20200625+scandium/tests/libc/libgen_h.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[128] = "/tmp/bla/ble.c";
data/frama-c-20200625+scandium/tests/libc/netdb_c.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUF_SIZE];
data/frama-c-20200625+scandium/tests/libc/socket.c:21:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char rcv_buffer[SIZEOF_RCV_BUFFER];
data/frama-c-20200625+scandium/tests/libc/socket.c:25:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char rcv_buffer_scattered1[2];					\
data/frama-c-20200625+scandium/tests/libc/socket.c:26:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char rcv_buffer_scattered2[5];					\
data/frama-c-20200625+scandium/tests/libc/socket.c:27:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char rcv_buffer_scattered3[3];					\
data/frama-c-20200625+scandium/tests/libc/socket.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/frama-c-20200625+scandium/tests/libc/stdio_c.c:11:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  stream = fopen("/etc/motd", "r");
data/frama-c-20200625+scandium/tests/libc/stdio_h.c:6:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen("/dev/urandom", "r");
data/frama-c-20200625+scandium/tests/libc/stdio_h.c:23:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  FILE *tmp = tmpfile();
data/frama-c-20200625+scandium/tests/libc/stdio_h.c:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fgets_buf0[1];
data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[10] = "NAME=val";
data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:15:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(s, "BLE=val");
data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:82:11:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  int r = mkstemp(tempFilename);
data/frama-c-20200625+scandium/tests/libc/string_c.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dest[6], src[6] = "hello";
data/frama-c-20200625+scandium/tests/libc/string_c.c:10:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  char *p = memcpy(dest, src, 6);
data/frama-c-20200625+scandium/tests/libc/string_c.c:15:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char src2[5] = "a\0b\0";
data/frama-c-20200625+scandium/tests/libc/string_c.c:16:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, src2, 5);
data/frama-c-20200625+scandium/tests/libc/string_c.c:19:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (v) memcpy(dest, NULL, 0);
data/frama-c-20200625+scandium/tests/libc/string_c.c:20:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (v) p = memcpy(NULL, NULL, 0);
data/frama-c-20200625+scandium/tests/libc/string_c.c:23:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, &x, 4);
data/frama-c-20200625+scandium/tests/libc/string_c.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[6] = {1, 2, 3, 4, 5, 6};
data/frama-c-20200625+scandium/tests/libc/string_c.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dest[4] = {0, 0, 0, 0};
data/frama-c-20200625+scandium/tests/libc/string_c.c:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hello[6] = "hello";
data/frama-c-20200625+scandium/tests/libc/string_c.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[10];
data/frama-c-20200625+scandium/tests/libc/string_c.c:124:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  char *p = strcat(s, "hello");
data/frama-c-20200625+scandium/tests/libc/string_c.c:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[7];
data/frama-c-20200625+scandium/tests/libc/string_c.c:142:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  char *p = strcpy(s, "hello");
data/frama-c-20200625+scandium/tests/libc/string_c.c:145:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(s, "654321");
data/frama-c-20200625+scandium/tests/libc/string_c.c:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[7];
data/frama-c-20200625+scandium/tests/libc/string_c.c:166:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hello[6] = "hello";
data/frama-c-20200625+scandium/tests/libc/string_c.c:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hello[6] = "hello";
data/frama-c-20200625+scandium/tests/libc/string_c.c:226:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[6] = {1, 2, 3, 1, 2, 4};
data/frama-c-20200625+scandium/tests/libc/string_c.c:243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[6] = {1, 2, 3, 1, 2, 4};
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char b[32];
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:85:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(b, "abc");
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:90:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(b, "aaababccdd0001122223");
data/frama-c-20200625+scandium/tests/libc/string_c_strchr.c:34:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buf[512];
data/frama-c-20200625+scandium/tests/libc/string_c_strchr.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char a[128];
data/frama-c-20200625+scandium/tests/libc/string_c_strchr.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[256];
data/frama-c-20200625+scandium/tests/libc/string_h.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char string[10];
data/frama-c-20200625+scandium/tests/libc/string_h.c:13:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(string, "hello");
data/frama-c-20200625+scandium/tests/libc/string_h.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char string2[10];
data/frama-c-20200625+scandium/tests/libc/string_h.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[100];
data/frama-c-20200625+scandium/tests/libc/string_h.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char source[100];
data/frama-c-20200625+scandium/tests/libc/string_h.c:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s1[30];
data/frama-c-20200625+scandium/tests/libc/string_h.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s2[30];
data/frama-c-20200625+scandium/tests/libc/string_h.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2] = {0};
data/frama-c-20200625+scandium/tests/libc/string_h.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[4] = "abc";
data/frama-c-20200625+scandium/tests/libc/string_h.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2] = {0};
data/frama-c-20200625+scandium/tests/libc/string_h.c:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[4] = "abc";
data/frama-c-20200625+scandium/tests/libc/string_h.c:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dst[3];
data/frama-c-20200625+scandium/tests/libc/string_h.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char src2[3];
data/frama-c-20200625+scandium/tests/libc/string_h.c:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/frama-c-20200625+scandium/tests/libc/string_h.c:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[32];
data/frama-c-20200625+scandium/tests/libc/string_h.c:130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dst[3];
data/frama-c-20200625+scandium/tests/libc/strings_h.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[3] = "ABc";
data/frama-c-20200625+scandium/tests/libc/strings_h.c:17:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s4[10];
data/frama-c-20200625+scandium/tests/libc/sys_file_h.c:5:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open("/tmp/bla", O_APPEND);
data/frama-c-20200625+scandium/tests/libc/sys_select.c:30:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&fds2, &fds1, sizeof(fds1));
data/frama-c-20200625+scandium/tests/libc/sys_stat_h.c:10:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open("/tmp/bla", O_RDWR, S_IRWXU | S_IRWXG);
data/frama-c-20200625+scandium/tests/libc/sys_stat_h.c:19:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char non_terminated[7] = "invalid";
data/frama-c-20200625+scandium/tests/libc/termios.c:10:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open("/dev/ttyS1", O_RDWR);
data/frama-c-20200625+scandium/tests/libc/time_misc.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outstr[200];
data/frama-c-20200625+scandium/tests/libc/unistd_h.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname[256];
data/frama-c-20200625+scandium/tests/libc/unistd_h.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[64];
data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:25:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf[20];
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:5:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fd = fopen("bla", "r");
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:7:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf[30];
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:11:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf2[2];
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:32:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t wdst[10];
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:58:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t wdst2[20] = {0};
data/frama-c-20200625+scandium/tests/pdg/decl_dpds.c:15:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int main (int argc, char *argv[4]) {
data/frama-c-20200625+scandium/tests/rte_manual/sizeof.c:4:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char b[n + 3]; // variable length array
data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:20:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char heap[N];
data/frama-c-20200625+scandium/tests/spec/footprint.c:21:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t[10];
data/frama-c-20200625+scandium/tests/spec/range.c:1:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
struct foo { char bar[4]; };
data/frama-c-20200625+scandium/tests/spec/range.c:6:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char baz[4];
data/frama-c-20200625+scandium/tests/spec/tsets.c:1:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
struct foo { char bar[4]; };
data/frama-c-20200625+scandium/tests/spec/tsets.c:6:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char baz[4];
data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[1];
data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:145:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char b[64];
data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:146:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char a_init[64] = {0x85,0x50,0x43,0xda, 0x06,0x99,0xd8,0x3b,
data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:154:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char a[64];
data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:158:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(a, a_init, 64 * sizeof(unsigned char));
data/frama-c-20200625+scandium/tests/syntax/macro_escape_chars.c:5:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
extern FILE* fopen(const char*,const char*);
data/frama-c-20200625+scandium/tests/syntax/macro_escape_chars.c:24:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *f = fopen("/tmp/testfile.out","w");
data/frama-c-20200625+scandium/tests/syntax/vla_strlen.c:4:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t[strlen(s) + 1];
data/frama-c-20200625+scandium/tests/value/addrofstring.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char (*p)[4] = &("bar");
data/frama-c-20200625+scandium/tests/value/align_char_array.c:11:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
struct s { char c; char a[2]; };
data/frama-c-20200625+scandium/tests/value/align_char_array.c:15:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char t[10][10]={0,0,1,1,1,1,1};
data/frama-c-20200625+scandium/tests/value/array_array.c:9:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char StaticAllocHEAP[10000]={2,2,2,2};
data/frama-c-20200625+scandium/tests/value/attribute-aligned.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tb[0] __attribute__((__aligned__(SIZE)));
data/frama-c-20200625+scandium/tests/value/behaviors2.c:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[MAX_ERRMSG_LEN];
data/frama-c-20200625+scandium/tests/value/behaviors2.c:325:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[MAX_ERRMSG_LEN];
data/frama-c-20200625+scandium/tests/value/empty_base.c:92:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&e2, &e1, sizeof(e1));
data/frama-c-20200625+scandium/tests/value/empty_base.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&c2, &c1, sizeof(c1));
data/frama-c-20200625+scandium/tests/value/empty_struct2.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&e2, &e1, sizeof(e1)); // imprecise, no builtin
data/frama-c-20200625+scandium/tests/value/empty_struct2.c:53:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&c2, &c1, sizeof(c1)); // imprecise, no builtin
data/frama-c-20200625+scandium/tests/value/empty_union.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&e2, &e1, sizeof(e1)); // imprecise, no builtin
data/frama-c-20200625+scandium/tests/value/empty_union.c:77:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&c2, &c1, sizeof(c1));  // imprecise, no builtin
data/frama-c-20200625+scandium/tests/value/initialized.c:152:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[128];
data/frama-c-20200625+scandium/tests/value/initialized.c:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t[10];
data/frama-c-20200625+scandium/tests/value/logic.c:165:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char T[1] = {2};
data/frama-c-20200625+scandium/tests/value/packed.c:3:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  volatile char         Reserved[4];
data/frama-c-20200625+scandium/tests/value/packed.c:9:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  volatile char         Reserved[4];
data/frama-c-20200625+scandium/tests/value/recol.c:12:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char s[S];
data/frama-c-20200625+scandium/tests/value/subset.c:12:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE *fopen(const char * restrict filename,
data/frama-c-20200625+scandium/tests/value/subset.c:32:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* p = fopen ("bla", 0);
data/frama-c-20200625+scandium/tests/value/threat_redundant.c:14:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char s1[10]={'a','b','a','b','a','b','a','b','a','b'};
data/frama-c-20200625+scandium/tests/value/volatile.c:31:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         volatile char t[12];
data/frama-c-20200625+scandium/tests/value/wide_string.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char (*p)[4] = &("bar");
data/frama-c-20200625+scandium/tests/value/wide_string.c:7:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t (*q)[4] = &(L"foO");
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:68:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ((char *) dest)[i] = ((char *) src)[i];
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:68:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ((char *) dest)[i] = ((char *) src)[i];
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:130:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void *memcpy(void *dest, const void *src, size_t n)
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:135:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ((char *)dest)[i] = ((char *)src)[i];
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:135:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ((char *)dest)[i] = ((char *)src)[i];
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:392:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(answer,"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ\
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:30:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void *memcpy(void *dest, const void *src, size_t n);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_bad.c:16:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, leader, leader_len);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_bad.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rsn_leader [LEADERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_ok.c:16:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, leader, leader_len);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_ok.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rsn_leader [LEADERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_bad.c:16:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, leader, leader_len);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_bad.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char leader [LEADERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_ok.c:16:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, leader, leader_len);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_ok.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char leader [LEADERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/giwscan_cb/giwscan_cb_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IESZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/giwscan_cb/giwscan_cb_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IESZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_bad.c:4:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    d_name[MAXNAMLEN + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_bad.c:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_ok.c:4:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    d_name[MAXNAMLEN + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_ok.c:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_bad.c:4:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    d_name[MAXNAMLEN + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_bad.c:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_ok.c:4:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    d_name[MAXNAMLEN + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_ok.c:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2 [LINE_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2 [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_bad.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2 [LINE_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_bad.c:23:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_ok.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2 [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_ok.c:23:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_bad.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2 [LINE_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_bad.c:22:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_ok.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2 [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_ok.c:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_bad.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2 [LINE_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_bad.c:22:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_ok.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2 [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_ok.c:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_bad.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_bad.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_ok.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_ok.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_bad.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_bad.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_ok.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_ok.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_bad.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_bad.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_ok.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_ok.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_bad.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_bad.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_ok.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_ok.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_bad.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_bad.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_ok.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_ok.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_bad.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_bad.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_ok.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_ok.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_bad.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_bad.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_ok.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_ok.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_bad.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_bad.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_ok.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_ok.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_bad.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_bad.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_ok.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_ok.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_bad.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_bad.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_ok.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_ok.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_bad.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_bad.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_ok.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_ok.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_bad.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_bad.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_ok.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_ok.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_bad.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_bad.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_ok.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_ok.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_bad.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_bad.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_ok.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_ok.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_bad.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_bad.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_ok.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_ok.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_bad.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_bad.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_ok.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_ok.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_bad.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_bad.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_ok.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_ok.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_bad.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_bad.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_ok.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_ok.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_bad.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_bad.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_ok.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_ok.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_bad.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_bad.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_ok.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_ok.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_bad.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_bad.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_ok.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str2[EXPRESSION_LENGTH];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_ok.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char A [LINE_LENGTH+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/fetchsms2.c:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char command[16];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/fetchsms2.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char answer[ANSWERSIZE]= "F+CMGR:";
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/fetchsms2.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [PDUSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_bad.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE] = "ABCDE+C";
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_bad.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [PDUSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_ok.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_ok.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_bad.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_bad.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [PDUSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_ok.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_ok.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_bad.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_bad.c:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [PDUSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_bad.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_bad.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [PDUSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_ok.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_ok.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_ok.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_ok.c:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_bad.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_bad.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [PDUSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_ok.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char answer[ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_ok.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdu [ANSWERSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_bad.c:7:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_bad.c:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg [INSZ] = "message";
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_ok.c:7:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_ok.c:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg [INSZ] = "message";
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_arr_bad.c:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_arr_ok.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_ptr_bad.c:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_ptr_ok.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_arr_bad.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_arr_ok.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_ptr_bad.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_ptr_ok.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixLong_arr_bad.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixLong_ptr_bad.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixShort_arr_bad.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixShort_ptr_bad.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[MAX_STRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_bad.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ok.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_bad.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_ok.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_bad.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_ok.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_bad.c:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_ok.c:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_bad.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_ok.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_bad.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *token[TOKEN_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_ok.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri [URI_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_bad.c:38:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cp1, cp, SPACE_FOR_VARS);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_ok.c:38:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cp1, cp, SPACE_FOR_VARS);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_bad.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cp1, cp, SPACE_FOR_VARS);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_ok.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cp1, cp, SPACE_FOR_VARS);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/simp_bad.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cp1, cp, SPACE_FOR_VARS);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/simp_ok.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cp1, cp, SPACE_FOR_VARS);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/vars_bad.c:38:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cp1, cp, SPACE_FOR_VARS);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/vars_ok.c:38:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cp1, cp, SPACE_FOR_VARS);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/bind.h:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		        _n_name[sizeof(void*)];	/* Counted str, malloc'ed. */
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char queryname[INSZ+1], dname[INSZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sysloginfo [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char syslogdname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char queryname[INSZ+1], dname[INSZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sysloginfo [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char syslogdname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char queryname[INSZ+1], dname[INSZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sysloginfo [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char net_queryname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char net_dname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char queryname[INSZ+1], dname[INSZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sysloginfo [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char net_queryname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char net_dname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char queryname[INSZ+1], dname[INSZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:38:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[BUFSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sysloginfo [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char net_queryname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char net_dname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char queryname[INSZ+1], dname[INSZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:38:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[BUFSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sysloginfo [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char net_queryname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char net_dname [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_bad.c:19:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char user[USERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_bad.c:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_ok.c:18:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char user[USERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_ok.c:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_bad.c:22:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char user[USERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_bad.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_ok.c:21:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char user[USERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_ok.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_bad.c:19:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char user[USERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_bad.c:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_ok.c:18:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char user[USERSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_ok.c:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/constants.h:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sun_path[SUN_PATH_SZ];         /* Path name.  */
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/main/simp_bad.c:6:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               filename [FILENAME_SZ] = "test";
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/main/simp_ok.c:6:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               filename [FILENAME_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_bad.c:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char entity_name_buf[ENTITY_NAME_LENGTH_MAX+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_bad.c:211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_ok.c:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char entity_name_buf[ENTITY_NAME_LENGTH_MAX+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_ok.c:208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_no_entities_bad.c:111:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_no_entities_ok.c:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_simp_bad.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_simp_ok.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_some_entities_bad.c:159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_some_entities_ok.c:156:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_bad.c:3:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_ok.c:3:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char winsreq [FSTRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_bad.c:16:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char winsreq [FSTRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_ok.c:16:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in [INSZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/constants.h:7:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char fstring[FSTRING_LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:88:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  temp = fopen(argv[1],"r");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:101:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char index_64[128] =
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char canary[10];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:150:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(canary, "GOOD"); /* use canary to see if fbuf gets overflowed */ 
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2.h:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*e_macro[256];	/* macro definitions */
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_heavy_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_heavy_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_med_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_med_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_no_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_no_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_heavy_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_heavy_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_med_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_med_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_no_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_no_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_heavy_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_heavy_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_med_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_med_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_no_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_no_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_heavy_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_heavy_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_med_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_med_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_no_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_no_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_heavy_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_heavy_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_med_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_med_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_no_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_no_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_heavy_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_heavy_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_med_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_med_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_no_test_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_no_test_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fbuf[MAXLINE+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_arr_bad.c:7:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outfile[BASE_SZ]; // originally MAXLINE
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_arr_ok.c:7:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outfile[BASE_SZ]; // originally MAXLINE
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_ptr_bad.c:7:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outfile[BASE_SZ]; // originally MAXLINE
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_ptr_ok.c:7:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outfile[BASE_SZ]; // originally MAXLINE
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/my-main.c:76:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char tTdvect[LEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_one_loop_bad.c:3:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in[11]; // = "3277192070";
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_one_loop_ok.c:3:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char in[11]; // = "3277192070";
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_bad.c:7:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char in[INSIZE+1]; // = "3277192070-100"; 
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_bad.c:8:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[BASE_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_ok.c:7:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char in[INSIZE+1]; // = "3277192070-100"; 
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_ok.c:8:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[BASE_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_bad.c:8:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char data[sizeof (u_int16_t) + sizeof (u_char) + DATA];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_ok.c:6:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char data[sizeof (u_int16_t) + sizeof (u_char) + BASE_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/txt-dns.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		mx_r_domain[1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/txt-dns.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		srv_r_target[1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_bad.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BASE_SZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_bad.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[BASE_SZ+70];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_ok.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BASE_SZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_ok.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[BASE_SZ+70];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_bad.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BASE_SZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_bad.c:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[BASE_SZ+70];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_ok.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BASE_SZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_ok.c:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[BASE_SZ+70];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_bad.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BASE_SZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_bad.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[BASE_SZ+70]; // = "<";
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_ok.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BASE_SZ+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_ok.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[BASE_SZ+70]; // = "<";
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:154:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char canary[MAXCANARY+1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:155:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[MAXNAME + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:156:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char test_buf[10]; /* will use as a canary to detect overflow */
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:160:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(test_buf, "GOOD");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:520:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char address[100];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_bad.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addr[ADDRSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_bad.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pvpbuf[PSBUFSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_ok.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addr[ADDRSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_ok.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pvpbuf[PSBUFSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_bad.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addr[ADDRSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_bad.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pvpbuf[PSBUFSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_ok.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addr[ADDRSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_ok.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pvpbuf[PSBUFSIZE];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char login[LOGIN + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char gecos[GECOS + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUF + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char login[LOGIN + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char gecos[GECOS + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c:16:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUF + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char login[LOGIN + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char gecos[GECOS + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUF + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char login[LOGIN + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char gecos[GECOS + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUF + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [PATHNAME_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [PATHNAME_SZ];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:111:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curpath[MAXPATHLEN],
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chroot_path [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *p, *q, wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *p, *q, wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:7:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:7:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wbuf[MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname [MAXPATHLEN];
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resolved [MAXPATHLEN];
data/frama-c-20200625+scandium/share/libc/netdb.c:123:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(__fc_ghbn.hostbuf, name, __FC_HOSTBUF_SIZE - 1);
data/frama-c-20200625+scandium/share/libc/netdb.c:147:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(__fc_ghbn.hostbuf, name, __FC_HOSTBUF_SIZE - 1);
data/frama-c-20200625+scandium/share/libc/stdio.c:62:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      char c = fgetc(stream);
data/frama-c-20200625+scandium/share/libc/stdio.h:263:12:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
extern int fgetc(FILE *stream);
data/frama-c-20200625+scandium/share/libc/stdio.h:299:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
extern int getc(FILE *stream);
data/frama-c-20200625+scandium/share/libc/stdio.h:304:12:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
extern int getchar(void);
data/frama-c-20200625+scandium/share/libc/stdlib.c:141:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t namelen = strlen(name);
data/frama-c-20200625+scandium/share/libc/stdlib.c:171:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t namelen = strlen(name);
data/frama-c-20200625+scandium/share/libc/string.c:104:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t strlen(const char *s)
data/frama-c-20200625+scandium/share/libc/string.c:182:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = strlen(dest);
data/frama-c-20200625+scandium/share/libc/string.c:191:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
char* strncat(char *dest, const char *src, size_t n)
data/frama-c-20200625+scandium/share/libc/string.c:193:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t dest_len = strlen(dest);
data/frama-c-20200625+scandium/share/libc/string.c:213:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char *strncpy(char *dest, const char *src, size_t n)
data/frama-c-20200625+scandium/share/libc/string.c:237:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (size_t i = strlen(s)+1; i > 0; i--)
data/frama-c-20200625+scandium/share/libc/string.c:292:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(s) + 1;
data/frama-c-20200625+scandium/share/libc/string.h:129:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
extern size_t strlen (const char *s);
data/frama-c-20200625+scandium/share/libc/string.h:378:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern char *strncpy(char *restrict dest,
data/frama-c-20200625+scandium/share/libc/string.h:444:14:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
extern char *strncat(char *restrict dest, const char *restrict src, size_t n);
data/frama-c-20200625+scandium/share/libc/sys/stat.h:97:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
extern mode_t umask(mode_t cmask);
data/frama-c-20200625+scandium/share/libc/unistd.h:1012:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
extern ssize_t      read(int fd, void *buf, size_t count);
data/frama-c-20200625+scandium/share/libc/unistd.h:1127:21:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
extern int          usleep(useconds_t usec);
data/frama-c-20200625+scandium/share/libc/wchar.c:52:8:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t wcslen(const wchar_t * str)
data/frama-c-20200625+scandium/share/libc/wchar.c:59:11:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
wchar_t * wcsncpy(wchar_t *dest, const wchar_t *src, size_t n)
data/frama-c-20200625+scandium/share/libc/wchar.c:74:14:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = wcslen(dest);
data/frama-c-20200625+scandium/share/libc/wchar.c:82:10:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
wchar_t* wcsncat(wchar_t *dest, const wchar_t *src, size_t n)
data/frama-c-20200625+scandium/share/libc/wchar.c:84:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t dest_len = wcslen(dest);
data/frama-c-20200625+scandium/share/libc/wchar.h:178:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
extern size_t wcslen(const wchar_t *s);
data/frama-c-20200625+scandium/share/libc/wchar.h:189:18:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
extern wchar_t * wcsncat(wchar_t *restrict dest, const wchar_t *restrict src, size_t n);
data/frama-c-20200625+scandium/share/libc/wchar.h:207:18:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern wchar_t * wcsncpy(wchar_t *restrict dest, const wchar_t *restrict src, size_t n);
data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:868:32:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
#define dlmemalign             memalign
data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:3236:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          read(fd, buf, sizeof(buf)) == sizeof(buf)) {
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree_mmodel.c:585:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t arglen = strlen(*argv) + 1;
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree_mmodel.c:600:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t envlen = strlen(*environ) + 1;
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_assert.h:82:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char buf [strlen(fmt) + strlen(afmt) + PATH_MAX +  11];
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_assert.h:82:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char buf [strlen(fmt) + strlen(afmt) + PATH_MAX +  11];
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_debug.h:97:5:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int getchar(void);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_debug.h:102:3:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  getchar(); \
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:250:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i = 0; i < strlen(specifier_chars); i++)
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:252:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i = 0; i < strlen(length_chars); i++)
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:254:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i = 0; i < strlen(flag_chars); i++)
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:256:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i = 0; i < strlen(period_chars); i++)
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:570:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(dir->directive, fmt_start, len);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:827:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int arglen = strlen(fmtdesc); /* number of variadic arguments */
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:216:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  return strncpy(dest, src, n);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:265:10:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  return strncat(dest, src, n);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_shexec.h:89:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((fetched = read(fd, buffer + size - buffer_size, buffer_size))) {
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_shexec.h:160:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (write(infd[1], data->stdins, strlen(data->stdins)) == -1)
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:47:10:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
# define strncat  __builtin_strncat
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:49:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define strlen   __builtin_strlen
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:53:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
# define strncpy  __builtin_strncpy
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:64:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(dest + strlen(dest), src, strlen(src) + 1);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:64:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(dest + strlen(dest), src, strlen(src) + 1);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:71:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(s) + 1;
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:90:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t ldelim = delim ? strlen(delim) : 0;
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:91:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(src) + strlen(dest) + 1;
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:91:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(src) + strlen(dest) + 1;
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:108:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t slen = strlen(str);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:109:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t plen = strlen(pat);
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_trace.h:93:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        outs[strlen(outs)-1] = '\0';
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_trace.h:94:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(outs) && endswith(outs, "??:0") && endswith(outs, "??:?")) {
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_mmodel.c:152:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t arglen = strlen(*argv) + 1;
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_mmodel.c:181:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t envlen = strlen(*environ) + 1;
data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_shadow_layout.h:176:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  uintptr_t addr = (uintptr_t)*env + strlen(*env);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2252.c:22:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (&destbuf[loc], &srcbuf[loc], 1);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2252.c:5:34:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern int ( /* missing proto */ strncpy)(char *x_0, char *x_1, int x_2);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2252.c:50:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(destbuf + loc,srcbuf + loc,1);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:50:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen(fmt);
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:54:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (int i = 0; i < strlen(valid_specifiers); i++) {
data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/mainargs.c:18:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(argv[i]);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:53:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define STRLEN(s, offs) strlen(s+offs)
data/frama-c-20200625+scandium/tests/builtins/strlen.c:60:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z1 = strlen(p);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:65:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z2 = strlen(p);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:70:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z3 = strlen(p);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:75:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z4 = strlen(p);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:81:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z5 = strlen(t); // warning
data/frama-c-20200625+scandium/tests/builtins/strlen.c:89:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z1 = strlen(empty_or_non_terminated);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:93:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(strlen(non_terminated), non_terminated);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:97:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(strlen(p), p);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:140:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(strlen(p), p);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:155:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z1 = strlen(p);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:225:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z1 = strlen(s); // alarm
data/frama-c-20200625+scandium/tests/builtins/strlen.c:228:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z2 = strlen(s); // no alarm
data/frama-c-20200625+scandium/tests/builtins/strlen.c:241:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(strlen(unterminated_string), unterminated_string);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:244:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz1 = strlen(str);  
data/frama-c-20200625+scandium/tests/builtins/strlen.c:248:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz2 = strlen(str);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:252:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz3 = strlen(str);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:255:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(strlen(loc_char_array), loc_char_array);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:256:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz4 = strlen(zero_str);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:260:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz5 = strlen(s2);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:265:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz6 = strlen(s2);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:270:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sz7 = strlen(s1 + j);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:277:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz8 = strlen(maybe_init);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:297:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_u = strlen((char const *)u); // below plevel; precise
data/frama-c-20200625+scandium/tests/builtins/strlen.c:298:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_r = strlen((char const *)r); // above plevel; imprecise
data/frama-c-20200625+scandium/tests/builtins/strlen.c:299:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_t = strlen((char const *)t); // *far* above plevel
data/frama-c-20200625+scandium/tests/builtins/strlen.c:302:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_u = strlen((char const *)(u+nondet)); // should be precise
data/frama-c-20200625+scandium/tests/builtins/strlen.c:303:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_r = strlen((char const *)(r+nondet));
data/frama-c-20200625+scandium/tests/builtins/strlen.c:304:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_t = strlen((char const *)(t+nondet));
data/frama-c-20200625+scandium/tests/builtins/strlen.c:315:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len1 = strlen(buf + offset1);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:319:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len2 = strlen(buf + offset2);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:322:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len3 = strlen(buf + offset3);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:324:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len4 = strlen(buf + offset4);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:326:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len5 = strlen(buf + offset5);
data/frama-c-20200625+scandium/tests/builtins/strlen.c:329:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len6 = strlen(p);
data/frama-c-20200625+scandium/tests/builtins/strlen_align.c:24:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t z = strlen(p);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:53:25:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define WCSLEN(s, offs) wcslen(s+offs)
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:60:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z1 = wcslen(p);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:65:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z2 = wcslen(p);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:70:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z3 = wcslen(p);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:75:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z4 = wcslen(p);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:81:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z5 = wcslen(t); // warning
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:89:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z1 = wcslen(empty_or_non_terminated);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:93:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(wcslen(non_terminated), non_terminated);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:97:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(wcslen(p), p);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:140:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(wcslen(p), p);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:155:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z1 = wcslen(p);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:225:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z1 = wcslen(s); // alarm
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:228:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int z2 = wcslen(s); // no alarm
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:241:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(wcslen(unterminated_string), unterminated_string);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:244:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz1 = wcslen(str);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:248:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz2 = wcslen(str);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:252:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz3 = wcslen(str);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:255:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert_bottom(wcslen(loc_char_array), loc_char_array);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:256:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz4 = wcslen(zero_str);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:260:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz5 = wcslen(s2);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:265:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz6 = wcslen(s2);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:270:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sz7 = wcslen(s1 + j);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:277:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz8 = wcslen(maybe_init);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:301:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_u = wcslen((wchar_t const *)u); // below plevel; precise
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:302:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_r = wcslen((wchar_t const *)r); // above plevel; imprecise
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:303:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_t = wcslen((wchar_t const *)t); // *far* above plevel
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:306:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_u = wcslen((wchar_t const *)(u+nondet)); // should be precise
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:307:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_r = wcslen((wchar_t const *)(r+nondet));
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:308:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_t = wcslen((wchar_t const *)(t+nondet));
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:319:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len1 = wcslen(buf + offset1);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:323:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len2 = wcslen(buf + offset2);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:326:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len3 = wcslen(buf + offset3);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:328:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len4 = wcslen(buf + offset4);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:330:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len5 = wcslen(buf + offset5);
data/frama-c-20200625+scandium/tests/builtins/wcslen.c:333:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len6 = wcslen(p);
data/frama-c-20200625+scandium/tests/libc/coverage.c:9:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int l = strlen(s);
data/frama-c-20200625+scandium/tests/libc/socket.c:61:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  read( rcv_socket, rcv_buffer, SIZEOF_RCV_BUFFER);
data/frama-c-20200625+scandium/tests/libc/socket.c:115:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int r = read(client_fd, buf, 64);
data/frama-c-20200625+scandium/tests/libc/stdio_c.c:10:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t read;
data/frama-c-20200625+scandium/tests/libc/stdio_c.c:15:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    total_len += strlen(line);
data/frama-c-20200625+scandium/tests/libc/string_c.c:64:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = strlen(s);
data/frama-c-20200625+scandium/tests/libc/string_c.c:66:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen("ab\0c");
data/frama-c-20200625+scandium/tests/libc/string_c.c:68:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen("");
data/frama-c-20200625+scandium/tests/libc/string_c.c:134:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(s, "");
data/frama-c-20200625+scandium/tests/libc/string_c.c:135:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(s, "x");
data/frama-c-20200625+scandium/tests/libc/string_c.c:147:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(s, "");
data/frama-c-20200625+scandium/tests/libc/string_c.c:154:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  char *p = strncpy(s, "hello", 7);
data/frama-c-20200625+scandium/tests/libc/string_c.c:157:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(s, "bye", 3);
data/frama-c-20200625+scandium/tests/libc/string_c.c:159:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(s, "die", 0);
data/frama-c-20200625+scandium/tests/libc/string_c.c:161:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(s, "ab\0c", 5);
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:73:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  TEST(s, strncpy(b, "abc", sizeof b - 1), b, "wrong return %p != %p");
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:78:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(b, "abc", 3);
data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:86:11:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
  TEST(s, strncat(b, "123456", 3), b, "%p != %p");
data/frama-c-20200625+scandium/tests/libc/string_h.c:36:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(data, source, 100);
data/frama-c-20200625+scandium/tests/libc/string_h.c:113:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(dst,src,3);
data/frama-c-20200625+scandium/tests/libc/string_h.c:118:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(dst,src2,3);
data/frama-c-20200625+scandium/tests/libc/sys_stat_h.c:22:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  mode_t old_mask = umask(0644);
data/frama-c-20200625+scandium/tests/libc/unistd_h.c:12:11:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  int r = usleep(123);
data/frama-c-20200625+scandium/tests/libc/unistd_h.c:13:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  r = usleep(456);
data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:42:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (nondet) { r = wcslen(sc1); goto exit; }
data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:44:23:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  if (nondet) { res = wcsncpy(buf, sc2, n); goto exit; }
data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:54:23:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
  if (nondet) { res = wcsncat(buf, sc2, n); goto exit; }
data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:57:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (nondet) { r = wcslen((wchar_t*)""); goto exit; }
data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:58:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (nondet) { r = wcslen((wchar_t*)"A"); goto exit; }
data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:59:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (nondet) { r = wcslen((wchar_t*)"ABCD"); goto exit; }
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:33:7:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  r = wcsncpy(wdst, wsrc, 10); // no warning
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:37:9:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    r = wcsncpy(wdst, wsrc, wcslen(wsrc)+1); // error: not enough room
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:37:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    r = wcsncpy(wdst, wsrc, wcslen(wsrc)+1); // error: not enough room
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:41:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(wdst, wdst, 10); // error: no separation
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:45:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(0, wsrc, 10); // error: invalid dest
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:49:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(wdst, 0, 10); // error: invalid src
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:53:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(wsrc, wdst, 10); // error: non-writable dest
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:59:3:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
  wcsncat(wdst2, wsrc, 11); // no warning
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:60:3:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
  wcsncat(wdst2, wsrc, 10); // no warning (if wdst2 is precise)
data/frama-c-20200625+scandium/tests/libc/wchar_h.c:66:5:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
    wcsncat(wdst2+10, wdst2, 10); // error: no separation
data/frama-c-20200625+scandium/tests/metrics/libc.c:17:10:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return getchar();
data/frama-c-20200625+scandium/tests/misc/pragma-pack.c:348:3:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  getchar();
data/frama-c-20200625+scandium/tests/pdg/top_pdg_input.c:27:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
int strlen(char* p ) {
data/frama-c-20200625+scandium/tests/pdg/top_pdg_input.c:40:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen (nondet ? p_str[i] : p_str[0]);
data/frama-c-20200625+scandium/tests/rte/value_rte.c:12:11:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    tmp = getchar() ;
data/frama-c-20200625+scandium/tests/spec/acsl_by_example.c:28:5:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
int equal(const int* a, int n, const int* b)
data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:35:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
unsigned int strlen(char *s) {
data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:93:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size = strlen(src);
data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:110:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *msg = alloc(2 + sizeof(int) + strlen(s->text) + 1);
data/frama-c-20200625+scandium/tests/syntax/multiple_decls_contracts.c:14:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        register char *copy = malloc(strlen(str) + 1);
data/frama-c-20200625+scandium/tests/syntax/vla_strlen.c:4:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char t[strlen(s) + 1];
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:166:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char *strncpy (char *dest, const char *src, size_t n)
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:232:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
unsigned strlen(char *s)
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:268:5:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int getc ()
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:22:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char *strncpy (char *dest, const char *src, size_t n);
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:25:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
unsigned strlen(const char *s);
data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:35:5:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int getc (/* ignore FILE* arg */);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c:62:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(str2, str, except-str);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c:65:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(str2, str, except-str);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_bad.c:12:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (str2, str, ind);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_ok.c:12:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (str2, str, ind);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_bad.c:10:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (str2, str, (unsigned int)(except-str));
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_ok.c:9:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (str2, str, (unsigned int)(except-str));
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_bad.c:10:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (str2, str, (unsigned int)(except-str));
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_ok.c:9:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (str2, str, (unsigned int)(except-str));
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_bad.c:35:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_ok.c:38:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_bad.c:29:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_ok.c:32:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_bad.c:31:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_ok.c:34:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_bad.c:25:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_ok.c:28:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_bad.c:31:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_ok.c:34:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_bad.c:28:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_ok.c:31:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_bad.c:28:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_ok.c:31:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_bad.c:38:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_ok.c:41:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_bad.c:32:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_ok.c:35:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_bad.c:34:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_ok.c:37:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_bad.c:28:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_ok.c:31:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_bad.c:34:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_ok.c:37:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_bad.c:31:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_ok.c:34:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_bad.c:31:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_ok.c:34:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_bad.c:41:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_ok.c:44:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_bad.c:35:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_ok.c:38:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_bad.c:37:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_ok.c:40:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_bad.c:31:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_ok.c:34:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_bad.c:37:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_ok.c:40:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_bad.c:34:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_ok.c:37:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_bad.c:34:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_ok.c:37:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str2, str+start, j-start+1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_bad.c:10:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || strlen(uri) < scheme) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ok.c:10:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || strlen(uri) < scheme) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_bad.c:10:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || strlen(uri) < scheme) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_ok.c:10:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || strlen(uri) < scheme) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_bad.c:10:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || strlen(uri) < scheme) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_ok.c:10:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || strlen(uri) < scheme) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_bad.c:10:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || strlen(uri) < scheme) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_ok.c:10:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || strlen(uri) < scheme) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/bind.c:11:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(comp_dn);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/expands_vars_bad.c:57:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cp1 = data + strlen((char *)data) + 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/expands_vars_ok.c:59:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n1 = strlen((char *)data) + 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/simp_bad.c:30:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cp1 = data + strlen((char *)data) + 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/simp_ok.c:34:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n1 = strlen((char *)data) + 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/two_expands_bad.c:38:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cp1 = data + strlen((char *)data) + 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/two_expands_ok.c:40:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n1 = strlen((char *)data) + 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_bad.c:50:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cp1 += strlen((char*)cp1)+1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_ok.c:50:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cp1 += strlen((char*)cp1)+1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_bad.c:47:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cp1 += strlen((char*)cp1)+1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_ok.c:47:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cp1 += strlen((char*)cp1)+1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:77:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(queryname, net_queryname, sizeof queryname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:79:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(dname, net_dname, sizeof dname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:77:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(queryname, net_queryname, sizeof queryname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:79:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(dname, net_dname, sizeof dname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:69:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(queryname, net_queryname, sizeof queryname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:71:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(dname, net_dname, sizeof dname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:69:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(queryname, net_queryname, sizeof queryname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:71:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(dname, net_dname, sizeof dname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:31:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(queryname, net_queryname, sizeof queryname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:33:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(dname, net_dname, sizeof dname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:31:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(queryname, net_queryname, sizeof queryname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:33:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(dname, net_dname, sizeof dname);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_bad.c:12:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  r_strncpy(request.data.winsreq, argp->key.name, strlen(argp->key.name)) ;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_bad.c:9:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  r_strncpy(winsreq, name, strlen(name)) ;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:170:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ((c1 = fgetc(e->e_dfp)) != EOF)
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:177:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				c2 = fgetc(e->e_dfp);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:184:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				c3 = fgetc(e->e_dfp);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:191:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				c4 = fgetc(e->e_dfp);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_bad.c:21:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (rr_txt, (char *) p + 1, *p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_ok.c:21:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (rr_txt, (char *) p + 1, *p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_no_cast_bad.c:20:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (rr_txt, (char *) p + 1, *p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_no_cast_ok.c:20:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (rr_txt, (char *) p + 1, *p);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:526:3:  [1] (buffer) scanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
  scanf("%99s", address);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c:34:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      (void) strncpy (buf + j, login, sizeof (buf) - j);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c:32:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      (void) strncpy (buf + j, login, sizeof (buf) - j);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/complete/util-bad.c:105:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      l += strlen(login);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:33:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(result, ".");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:67:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ptr = where + strlen(curpath + where) - 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:33:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(result, ".");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:67:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ptr = where + strlen(curpath + where) - 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:90:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      r_strncat(linkpath, "/", MAXPATHLEN-strlen(linkpath)-1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:91:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:91:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:95:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      r_strncat(linkpath, where, MAXPATHLEN-strlen(linkpath)- 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:97:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(linkpath) >= MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:33:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(result, ".");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:33:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(result, ".");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:70:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      r_strncat(linkpath, "/", MAXPATHLEN-strlen(linkpath)-1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:71:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:71:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:75:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      r_strncat(linkpath, where, MAXPATHLEN-strlen(linkpath)- 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:77:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(linkpath) >= MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:27:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      r_strncat(linkpath, "/", MAXPATHLEN-strlen(linkpath)-1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:28:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:28:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:32:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      r_strncat(linkpath, where, MAXPATHLEN-strlen(linkpath)- 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:34:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(linkpath) >= MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:33:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(result, ".");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:67:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ptr = where + strlen(curpath + where) - 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:33:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(result, ".");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:67:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ptr = where + strlen(curpath + where) - 1;
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:76:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      r_strncat(namebuf, "/", MAXPATHLEN-strlen(namebuf)-1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:79:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    r_strncat(namebuf, curpath + where, MAXPATHLEN-strlen(namebuf)-1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:33:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(result, ".");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:33:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(result, ".");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:56:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      r_strncat(namebuf, "/", MAXPATHLEN-strlen(namebuf)-1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:59:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    r_strncat(namebuf, curpath + where, MAXPATHLEN-strlen(namebuf)-1); }
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:23:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  r_strncat(namebuf, curpath, MAXPATHLEN-strlen(namebuf)-1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:13:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy(resolved, path, MAXPATHLEN - 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:30:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:30:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:34:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:13:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy(resolved, path, MAXPATHLEN - 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:30:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:30:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:34:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:13:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy(resolved, path, MAXPATHLEN - 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:40:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:40:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:44:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:13:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy(resolved, path, MAXPATHLEN - 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:40:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:40:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:44:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:13:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy(resolved, path, MAXPATHLEN - 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:55:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:55:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:59:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:13:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy(resolved, path, MAXPATHLEN - 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:55:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:55:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:59:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:23:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:23:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:27:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:23:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:23:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:27:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:12:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy(resolved, path, MAXPATHLEN - 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:85:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:85:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:89:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:12:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy(resolved, path, MAXPATHLEN - 1);
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:85:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:85:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) {
data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:89:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat(resolved, "/");

ANALYSIS SUMMARY:

Hits = 1485
Lines analyzed = 114743 in approximately 4.14 seconds (27746 lines/second)
Physical Source Lines of Code (SLOC) = 74384
Hits@level = [0] 444 [1] 362 [2] 884 [3]  77 [4] 145 [5]  17
Hits@level+ = [0+] 1929 [1+] 1485 [2+] 1123 [3+] 239 [4+] 162 [5+]  17
Hits/KSLOC@level+ = [0+] 25.933 [1+] 19.964 [2+] 15.0973 [3+] 3.21306 [4+] 2.17789 [5+] 0.228544
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.