Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/gbdfed-1.6/bdfgrab.c
Examining data/gbdfed-1.6/guipref.c
Examining data/gbdfed-1.6/guigedit.c
Examining data/gbdfed-1.6/gbdfed.h
Examining data/gbdfed-1.6/guifile.c
Examining data/gbdfed-1.6/bdfgrid.c
Examining data/gbdfed-1.6/bdffnt.c
Examining data/gbdfed-1.6/fontgrid.c
Examining data/gbdfed-1.6/hbf.c
Examining data/gbdfed-1.6/gectrlbmaps.h
Examining data/gbdfed-1.6/glyphtest.h
Examining data/gbdfed-1.6/gectrl.c
Examining data/gbdfed-1.6/glyphedit.h
Examining data/gbdfed-1.6/bdfgname.c
Examining data/gbdfed-1.6/guiedit.c
Examining data/gbdfed-1.6/guiops.c
Examining data/gbdfed-1.6/fontgrid.h
Examining data/gbdfed-1.6/hbf.h
Examining data/gbdfed-1.6/bdfpkgf.c
Examining data/gbdfed-1.6/bdf.h
Examining data/gbdfed-1.6/bdfotf.c
Examining data/gbdfed-1.6/gbdfed.c
Examining data/gbdfed-1.6/bdfpsf.c
Examining data/gbdfed-1.6/grayswatch.c
Examining data/gbdfed-1.6/htext.h
Examining data/gbdfed-1.6/gectrl.h
Examining data/gbdfed-1.6/guihelp.c
Examining data/gbdfed-1.6/labcon.h
Examining data/gbdfed-1.6/grayswatch.h
Examining data/gbdfed-1.6/guiutil.c
Examining data/gbdfed-1.6/glyphtest.c
Examining data/gbdfed-1.6/bdfcons.c
Examining data/gbdfed-1.6/labcon.c
Examining data/gbdfed-1.6/bdfP.h
Examining data/gbdfed-1.6/glyphedit.c
Examining data/gbdfed-1.6/gtkcompat.h
Examining data/gbdfed-1.6/bdf.c

FINAL RESULTS:

data/gbdfed-1.6/bdf.c:1263:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ERRMSG1, lineno, "CHARS");
data/gbdfed-1.6/bdf.c:1365:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ERRMSG1, lineno, "STARTCHAR");
data/gbdfed-1.6/bdf.c:1382:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(nbuf, ACMSG12, p->glyph_enc, p->glyph_name);
data/gbdfed-1.6/bdf.c:1473:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(nbuf, ACMSG13, glyph->encoding);
data/gbdfed-1.6/bdf.c:1499:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ACMSG14, glyph->encoding);
data/gbdfed-1.6/bdf.c:1517:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ERRMSG1, lineno, "ENCODING");
data/gbdfed-1.6/bdf.c:1539:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ACMSG9, lineno);
data/gbdfed-1.6/bdf.c:1583:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ACMSG10, lineno);
data/gbdfed-1.6/bdf.c:1624:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ERRMSG1, lineno, "BBX");
data/gbdfed-1.6/bdf.c:1673:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ACMSG1, p->font->bbx.ascent);
data/gbdfed-1.6/bdf.c:1681:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ACMSG2, p->font->bbx.descent);
data/gbdfed-1.6/bdf.c:1789:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ERRMSG1, lineno, "SIZE");
data/gbdfed-1.6/bdf.c:1830:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(nbuf, ERRMSG1, lineno, "FONT");
data/gbdfed-1.6/bdf.c:1851:21:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    sprintf(nbuf, ACMSG11, p->font->bpp);
data/gbdfed-1.6/bdf.c:1856:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(nbuf, ACMSG11, p->font->bpp);
data/gbdfed-1.6/bdf.c:1938:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(msgbuf, ACMSG15, p.cnt,
data/gbdfed-1.6/bdf.c:1951:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(msgbuf, ACMSG3, p.font->bbx.width, p.maxrb - p.minlb);
data/gbdfed-1.6/bdf.c:1957:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(msgbuf, ACMSG4, p.font->bbx.x_offset, p.minlb);
data/gbdfed-1.6/bdf.c:1963:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(msgbuf, ACMSG5, p.font->bbx.ascent, p.maxas);
data/gbdfed-1.6/bdf.c:1969:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(msgbuf, ACMSG6, p.font->bbx.descent, p.maxds);
data/gbdfed-1.6/bdf.c:1976:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(msgbuf, ACMSG7, p.font->bbx.height, p.maxas + p.maxds);
data/gbdfed-1.6/bdf.c:2005:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
              sprintf(msgbuf, ERRMSG2, lineno);
data/gbdfed-1.6/bdf.c:2010:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
              sprintf(msgbuf, ERRMSG3, lineno);
data/gbdfed-1.6/bdf.c:2228:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(nbuf, ACMSG1, p->font->bbx.ascent);
data/gbdfed-1.6/bdf.c:2236:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(nbuf, ACMSG2, p->font->bbx.descent);
data/gbdfed-1.6/bdf.c:4033:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        (void) strcpy(font->name, name);
data/gbdfed-1.6/bdf.c:4267:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                (void) strcpy(dp->name, cp->name);
data/gbdfed-1.6/bdf.c:5753:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(np, "-%s", foundry);
data/gbdfed-1.6/bdf.c:5761:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(np, "-%s", family);
data/gbdfed-1.6/bdf.c:5771:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(np, "-%s", val);
data/gbdfed-1.6/bdf.c:5781:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(np, "-%s", val);
data/gbdfed-1.6/bdf.c:5791:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(np, "-%s", val);
data/gbdfed-1.6/bdf.c:5801:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(np, "-%s", val);
data/gbdfed-1.6/bdf.c:5893:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(np, "-%s", val);
data/gbdfed-1.6/bdf.c:5901:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(np, "-%s", val);
data/gbdfed-1.6/bdf.c:5947:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                  sprintf(np, "%s", p->value.atom);
data/gbdfed-1.6/bdf.c:5961:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(np, "%s", list.field[i]);
data/gbdfed-1.6/bdf.c:6094:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(np, num);
data/gbdfed-1.6/bdf.c:6096:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(np, list.field[i]);
data/gbdfed-1.6/bdffnt.c:680:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        (void) strcpy((char *) sp, (char *) wname);
data/gbdfed-1.6/bdfgname.c:262:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            (void) strcpy(gp->name, name);
data/gbdfed-1.6/bdfgname.c:331:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            (void) strcpy(gp->name, name);
data/gbdfed-1.6/bdfgrab.c:157:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                (void) strcpy(gp->name, name);
data/gbdfed-1.6/bdfpkgf.c:237:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy((char *) glyphname, (char *) comment + 6);
data/gbdfed-1.6/bdfpkgf.c:468:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy((char *) g.name, (char *) glyphname);
data/gbdfed-1.6/bdfpkgf.c:966:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy((char *) glyphname, (char *) comment + 6);
data/gbdfed-1.6/bdfpkgf.c:1105:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(g.name, (char *) glyphname);
data/gbdfed-1.6/gbdfed.c:233:23:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                      sprintf(buffer1, "Save Font: Save %s?", editors[i].file);
data/gbdfed-1.6/gbdfed.c:503:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              (void) strcpy(buffer1, si->glyphs->name);
data/gbdfed-1.6/gbdfed.c:520:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer2, "\"%s\" %o (%o, %o)", buffer1,
data/gbdfed-1.6/gbdfed.c:524:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer2, "\"%s\" %d (%d, %d)", buffer1,
data/gbdfed-1.6/gbdfed.c:528:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer2, "\"%s\" %04X (%02X, %02X)", buffer1,
data/gbdfed-1.6/gbdfed.c:628:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - (unnamed%d) [modified]", prgname, ed->id);
data/gbdfed-1.6/gbdfed.c:630:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - %s [modified]", prgname, ed->file);
data/gbdfed-1.6/gbdfed.c:698:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s: Messages", ed->file);
data/gbdfed-1.6/gbdfed.c:828:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(buffer1, editors[i].file);
data/gbdfed-1.6/gbdfed.c:841:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(buffer1, editors[i].file);
data/gbdfed-1.6/gbdfed.c:1467:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(buffer1, editors[i].file);
data/gbdfed-1.6/gbdfed.c:1588:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer1, "_About %s", g_get_prgname());
data/gbdfed-1.6/gbdfed.c:1712:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer1, "%s%c%s", path, G_DIR_SEPARATOR, filename);
data/gbdfed-1.6/gbdfed.c:1715:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(buffer1, filename);
data/gbdfed-1.6/gbdfed.c:1750:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - (unnamed%d)", g_get_prgname(), ed->id);
data/gbdfed-1.6/gbdfed.c:1753:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "%s - %s [modified]", g_get_prgname(), ed->file);
data/gbdfed-1.6/gbdfed.c:1755:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "%s - %s", g_get_prgname(), ed->file);
data/gbdfed-1.6/gbdfed.c:2309:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "%s/.gbdfedrc", ap);
data/gbdfed-1.6/gbdfed.c:2318:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer1, "%s/.xmbdfedrc", ap);
data/gbdfed-1.6/guiedit.c:155:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Unicode Glyph Names: Unable to open %s.",
data/gbdfed-1.6/guiedit.c:178:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Adobe Glyph Names: Unable to open %s.",
data/gbdfed-1.6/guiedit.c:329:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s Info Edit", ed->file);
data/gbdfed-1.6/guifile.c:253:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer2, "%s.bak", filename);
data/gbdfed-1.6/guifile.c:275:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer2, "Save Font: Unable to write to %s.", filename);
data/gbdfed-1.6/guifile.c:277:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer2, "Export Font: Unable to write to %s.", filename);
data/gbdfed-1.6/guifile.c:302:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer2, "Edited with gbdfed %s.", GBDFED_VERSION);
data/gbdfed-1.6/guifile.c:374:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "%s - %s", g_get_prgname(), ed->file);
data/gbdfed-1.6/guifile.c:376:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "%s - (unnamed%d)", g_get_prgname(), ed->id);
data/gbdfed-1.6/guifile.c:409:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer2, "Save Font: %s exists.\nDo you wish to overwrite?",
data/gbdfed-1.6/guifile.c:425:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "file://%s", fname);
data/gbdfed-1.6/guifile.c:466:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: Unable to open %s.", file);
data/gbdfed-1.6/guifile.c:484:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: Unable to load %s.", file);
data/gbdfed-1.6/guifile.c:510:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - %s [modified]", g_get_prgname(), ed->file);
data/gbdfed-1.6/guifile.c:512:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - %s", g_get_prgname(), ed->file);
data/gbdfed-1.6/guifile.c:558:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: Unable to open %s.", fullpath);
data/gbdfed-1.6/guifile.c:580:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: %s not a console font.", fullpath);
data/gbdfed-1.6/guifile.c:658:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "%s - %s [modified]", g_get_prgname(), ep->file);
data/gbdfed-1.6/guifile.c:698:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: Unable to open %s.", file);
data/gbdfed-1.6/guifile.c:714:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: %s not a PK or GF font.", fullpath);
data/gbdfed-1.6/guifile.c:752:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer1, "%s - %s [modified]", g_get_prgname(), ed->file);
data/gbdfed-1.6/guifile.c:894:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer2, "Import Font: Unable to load %s from %s.",
data/gbdfed-1.6/guifile.c:962:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "%s - %s [modified]", g_get_prgname(), ep->file);
data/gbdfed-1.6/guifile.c:1038:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: Unable to open %s.", file);
data/gbdfed-1.6/guifile.c:1051:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer1, "Import Font: Unable to load %s.", file);
data/gbdfed-1.6/guifile.c:1085:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "%s - %s [modified]", g_get_prgname(), ed->file);
data/gbdfed-1.6/guifile.c:1398:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer1,
data/gbdfed-1.6/guifile.c:1750:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Import Font: Unable to open OpenType font '%s'.",
data/gbdfed-1.6/guifile.c:1753:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1,
data/gbdfed-1.6/guifile.c:1864:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: Unable to load OpenType font %s.",
data/gbdfed-1.6/guifile.c:1902:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer1, "%s - %s [modified]", g_get_prgname(), ed->file);
data/gbdfed-1.6/guifile.c:1956:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: Unable to import %s.", file);
data/gbdfed-1.6/guifile.c:1982:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer1, "%s - %s [modified]", g_get_prgname(), ed->file);
data/gbdfed-1.6/guifile.c:2052:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer1, "file://%s", filename);
data/gbdfed-1.6/guifile.c:2124:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Save %s Font", title);
data/gbdfed-1.6/guifile.c:2126:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Export %s Font", title);
data/gbdfed-1.6/guifile.c:2128:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "Open %s Font", title);
data/gbdfed-1.6/guifile.c:2250:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            (void) strcpy(dot, suff);
data/gbdfed-1.6/guifile.c:2357:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s", ed->file);
data/gbdfed-1.6/guifile.c:2398:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Save Font: %s modified.  Save?", ed->file);
data/gbdfed-1.6/guifile.c:2428:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Save Font: %s modified.  Save?", ed->file);
data/gbdfed-1.6/guifile.c:2458:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Save Font: %s modified.  Save?", ed->file);
data/gbdfed-1.6/guifile.c:2488:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Save Font: %s modified.  Save?", ed->file);
data/gbdfed-1.6/guifile.c:2520:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Save Font: %s modified.  Save?", ed->file);
data/gbdfed-1.6/guifile.c:2554:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Save Font: %s modified.  Save?", ed->file);
data/gbdfed-1.6/guifile.c:2667:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: Unable to load server font %s.",
data/gbdfed-1.6/guifile.c:2680:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "Import Font: Unable to import server font %s.",
data/gbdfed-1.6/guifile.c:2697:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer1, "%s - unnamed%d [modified]", g_get_prgname(),
data/gbdfed-1.6/guifile.c:2747:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "Save Font: %s modified.  Save?", ed->file);
data/gbdfed-1.6/guifile.c:2914:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer2,
data/gbdfed-1.6/guifile.c:2977:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer1, "%s/%s", ed->path, ed->file);
data/gbdfed-1.6/guigedit.c:402:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - Glyph Edit: (unnamed%d)",
data/gbdfed-1.6/guigedit.c:405:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - Glyph Edit: %s", prgname, ed->file);
data/gbdfed-1.6/guigedit.c:1736:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - Glyph Edit: (unnamed%d) [modified]",
data/gbdfed-1.6/guigedit.c:1739:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - Glyph Edit: %s [modified]", prgname, ed->file);
data/gbdfed-1.6/guigedit.c:1846:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - Glyph Edit: (unnamed%d) [modified]",
data/gbdfed-1.6/guigedit.c:1849:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - Glyph Edit: %s [modified]",
data/gbdfed-1.6/guigedit.c:1867:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - Glyph Edit: (unnamed%d)", g_get_prgname(),
data/gbdfed-1.6/guigedit.c:1870:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s - Glyph Edit: %s", g_get_prgname(), ed->file);
data/gbdfed-1.6/guigedit.c:2057:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "%s - Glyph Edit: (unnamed%d)", g_get_prgname(),
data/gbdfed-1.6/guigedit.c:2060:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buffer1, "%s - Glyph Edit: %s", g_get_prgname(), ed->file);
data/gbdfed-1.6/guihelp.c:229:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer1, "Help: %s", topics[row].help_topic);
data/gbdfed-1.6/guiops.c:305:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer1, "%s: Glyph Operations", ed->file);
data/gbdfed-1.6/guipref.c:939:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer1, "%s/.gbdfedrc", home);
data/gbdfed-1.6/guipref.c:941:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer2, "Save Preferences: Unable to write to %s.", buffer1);
data/gbdfed-1.6/guipref.c:1085:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer1, "%s Preferences", g_get_prgname());
data/gbdfed-1.6/hbf.c:265:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		(void)vfprintf(stderr, fmt, args);
data/gbdfed-1.6/hbf.c:279:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		(void)fprintf(stderr, fmt, x1, x2, x3, x4, x5, x6, x7, x8, x9);
data/gbdfed-1.6/hbf.c:404:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(new_s, s);
data/gbdfed-1.6/hbf.c:536:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf(fullname, "%.*s/%s", dirlen, dir, stem);
data/gbdfed-1.6/hbf.c:540:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf(fullname, "%.*s\\%s", dirlen, dir, stem);
data/gbdfed-1.6/hbf.c:547:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		(void)sprintf(fullname, "%.*s.%s", dirlen, dir, stem);
data/gbdfed-1.6/hbf.c:555:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		(void)sprintf(fullname, "%.*s%s", dirlen, dir, stem);
data/gbdfed-1.6/hbf.c:584:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf(s, "%.*s%s", size, hbf_name, name);
data/gbdfed-1.6/hbf.c:614:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf(s, "%.*s%s", size, hbf_name, name);
data/gbdfed-1.6/hbf.c:632:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf(s, "%.*s%s", size, hbf_name, name);
data/gbdfed-1.6/hbf.c:680:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmp, "%s.gz", file->bmf_name);
data/gbdfed-1.6/hbf.c:683:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "gzcat %s.gz", file->bmf_name);
data/gbdfed-1.6/hbf.c:684:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			if ((f = popen(tmp, "r")) != NULL)
data/gbdfed-1.6/hbf.c:844:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(line, "HBF_CODE_RANGE %li-%li %s %li",
data/gbdfed-1.6/gbdfed.c:2308:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((ap = getenv("HOME")) != 0) {
data/gbdfed-1.6/guipref.c:933:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((home = getenv("HOME")) == 0) {
data/gbdfed-1.6/hbf.c:1137:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	f = path_open(getenv("HBFPATH"), filename, &(hbf->filename));
data/gbdfed-1.6/bdf.c:375:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char empty[1] = { 0 };
data/gbdfed-1.6/bdf.c:387:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seps[32];
data/gbdfed-1.6/bdf.c:413:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy(list->bfield, line, linelen);
data/gbdfed-1.6/bdf.c:563:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[65536];
data/gbdfed-1.6/bdf.c:598:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buf, pp, n);
data/gbdfed-1.6/bdf.c:649:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) ns, (char *) s, len);
data/gbdfed-1.6/bdf.c:697:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char a2i[128] = {
data/gbdfed-1.6/bdf.c:711:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char odigits[32] = {
data/gbdfed-1.6/bdf.c:718:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char ddigits[32] = {
data/gbdfed-1.6/bdf.c:725:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char hdigits[32] = {
data/gbdfed-1.6/bdf.c:956:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(cp, msg, len);
data/gbdfed-1.6/bdf.c:975:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(cp, comment, len);
data/gbdfed-1.6/bdf.c:990:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[128];
data/gbdfed-1.6/bdf.c:999:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(name, font->name, len);
data/gbdfed-1.6/bdf.c:1116:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                (void) memcpy(fp->value.atom, value, len);
data/gbdfed-1.6/bdf.c:1174:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy(fp->value.atom, value, len);
data/gbdfed-1.6/bdf.c:1237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nbuf[128];
data/gbdfed-1.6/bdf.c:1352:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy(p->glyph_name, s, slen + 1);
data/gbdfed-1.6/bdf.c:1652:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *name, *value, nbuf[128];
data/gbdfed-1.6/bdf.c:1671:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nbuf, "%hd", p->font->bbx.ascent);
data/gbdfed-1.6/bdf.c:1679:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nbuf, "%hd", p->font->bbx.descent);
data/gbdfed-1.6/bdf.c:1731:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *s, nbuf[128];
data/gbdfed-1.6/bdf.c:1812:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy(p->font->name, s, slen + 1);
data/gbdfed-1.6/bdf.c:1915:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msgbuf[128];
data/gbdfed-1.6/bdf.c:2068:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nbuf[24];
data/gbdfed-1.6/bdf.c:2187:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy(p->font->name, value, vlen + 1);
data/gbdfed-1.6/bdf.c:2226:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(nbuf, "%hd", p->font->bbx.ascent);
data/gbdfed-1.6/bdf.c:2234:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(nbuf, "%hd", p->font->bbx.descent);
data/gbdfed-1.6/bdf.c:2277:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nbuf[24];
data/gbdfed-1.6/bdf.c:2315:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(nbuf, "char%d", code);
data/gbdfed-1.6/bdf.c:2318:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(gp->name, nbuf, n + 1);
data/gbdfed-1.6/bdf.c:2354:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) gp->bitmap, (char *) bmap, gp->bytes);
data/gbdfed-1.6/bdf.c:2382:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((in = fopen(hbfFileName(hbf), "r")) == 0) {
data/gbdfed-1.6/bdf.c:2512:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) &nbbx, (char *) &glyph->bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdf.c:2611:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) &glyph->bbx, (char *) &nbbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdf.c:2641:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) cell->bitmap, (char *) glyph->bitmap,
data/gbdfed-1.6/bdf.c:2713:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &cell.bbx, (char *) &font->bbx,
data/gbdfed-1.6/bdf.c:3225:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(p->name, name, n);
data/gbdfed-1.6/bdf.c:3276:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) p, (char *) _bdf_properties,
data/gbdfed-1.6/bdf.c:3278:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) (p + _num_bdf_properties), (char *) user_props,
data/gbdfed-1.6/bdf.c:3297:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(font->comments, comments, comments_len);
data/gbdfed-1.6/bdf.c:3315:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) p, (char *) font->props,
data/gbdfed-1.6/bdf.c:3398:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                (void) memcpy(p->value.atom, property->value.atom, len);
data/gbdfed-1.6/bdf.c:3461:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                (void) memcpy(p->value.atom, property->value.atom, len);
data/gbdfed-1.6/bdf.c:4017:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) opts, (char *) &_bdf_opts, sizeof(bdf_options_t));
data/gbdfed-1.6/bdf.c:4025:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sp[2];
data/gbdfed-1.6/bdf.c:4264:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) dp, (char *) cp, sizeof(bdf_glyph_t));
data/gbdfed-1.6/bdf.c:4272:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                (void) memcpy((char *) dp->bitmap, (char *) cp->bitmap,
data/gbdfed-1.6/bdf.c:4280:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                (void) memcpy((char *) dp->unicode.map,
data/gbdfed-1.6/bdf.c:4876:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) gp->unicode.map, (char *) map->map,
data/gbdfed-1.6/bdf.c:5116:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) dgp, (char *) glyphs->glyphs,
data/gbdfed-1.6/bdf.c:5167:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      (void) memcpy((char *) &font->bbx, (char *) &nbbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdf.c:5357:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &tmp.bbx, (char *) &g->bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdf.c:5363:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &g->bbx, (char *) &f->bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdf.c:5369:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &f->bbx, (char *) &tmp.bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdf.c:5425:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &f->bbx, (char *) &nbbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdf.c:5631:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) gp, (char *) sgp, sizeof(bdf_glyph_t));
data/gbdfed-1.6/bdf.c:5654:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      (void) memcpy((char *) &font->bbx, (char *) &nbbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdf.c:5716:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[256];
data/gbdfed-1.6/bdf.c:5723:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(name, font->name, len);
data/gbdfed-1.6/bdf.c:5741:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char spacing, *name, *val, *np, nbuf[256];
data/gbdfed-1.6/bdf.c:5808:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(np, "-%d", pp->value.int32);
data/gbdfed-1.6/bdf.c:5816:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(np, "-%hd", pxsize);
data/gbdfed-1.6/bdf.c:5824:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(np, "-%d", pp->value.int32);
data/gbdfed-1.6/bdf.c:5826:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(np, "-%d", font->point_size * 10);
data/gbdfed-1.6/bdf.c:5833:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(np, "-%d", pp->value.card32);
data/gbdfed-1.6/bdf.c:5835:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(np, "-%d", font->resolution_x);
data/gbdfed-1.6/bdf.c:5842:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(np, "-%d", pp->value.card32);
data/gbdfed-1.6/bdf.c:5844:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(np, "-%d", font->resolution_y);
data/gbdfed-1.6/bdf.c:5860:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(np, "-%c", spacing);
data/gbdfed-1.6/bdf.c:5867:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(np, "-%d", pp->value.int32);
data/gbdfed-1.6/bdf.c:5884:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(np, "-%hd", awidth);
data/gbdfed-1.6/bdf.c:5906:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(name, nbuf, len);
data/gbdfed-1.6/bdf.c:5916:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *np, name[128], nname[128];
data/gbdfed-1.6/bdf.c:5928:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(name, font->name, i + 1);
data/gbdfed-1.6/bdf.c:5950:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(np, "%d", p->value.card32);
data/gbdfed-1.6/bdf.c:5953:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(np, "%d", p->value.int32);
data/gbdfed-1.6/bdf.c:5975:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(font->name, nname, i);
data/gbdfed-1.6/bdf.c:5992:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[128];
data/gbdfed-1.6/bdf.c:6003:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(name, font->name, i + 1);
data/gbdfed-1.6/bdf.c:6045:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *np, num[16], nbuf[128];
data/gbdfed-1.6/bdf.c:6068:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy(nbuf, font->name, i + 1);
data/gbdfed-1.6/bdf.c:6076:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(num, "%d", awidth);
data/gbdfed-1.6/bdfcons.c:336:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &gp->bbx, (char *) &fp->bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdfcons.c:484:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hdr[4];
data/gbdfed-1.6/bdffnt.c:106:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  dfCopyright[60];
data/gbdfed-1.6/bdffnt.c:139:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  dfReserved1[4];
data/gbdfed-1.6/bdffnt.c:142:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  dfReserved1[16];
data/gbdfed-1.6/bdffnt.c:151:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfVersion[2];
data/gbdfed-1.6/bdffnt.c:152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfSize[4];
data/gbdfed-1.6/bdffnt.c:153:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfCopyright[60];
data/gbdfed-1.6/bdffnt.c:154:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfType[2];
data/gbdfed-1.6/bdffnt.c:155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfPoints[2];
data/gbdfed-1.6/bdffnt.c:156:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfVertRes[2];
data/gbdfed-1.6/bdffnt.c:157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfHorizRes[2];
data/gbdfed-1.6/bdffnt.c:158:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfAscent[2];
data/gbdfed-1.6/bdffnt.c:159:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfInternalLeading[2];
data/gbdfed-1.6/bdffnt.c:160:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfExternalLeading[2];
data/gbdfed-1.6/bdffnt.c:161:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfItalic[1];
data/gbdfed-1.6/bdffnt.c:162:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfUnderline[1];
data/gbdfed-1.6/bdffnt.c:163:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfStrikeOut[1];
data/gbdfed-1.6/bdffnt.c:164:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfWeight[2];
data/gbdfed-1.6/bdffnt.c:165:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfCharSet[1];
data/gbdfed-1.6/bdffnt.c:166:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfPixWidth[2];
data/gbdfed-1.6/bdffnt.c:167:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfPixHeight[2];
data/gbdfed-1.6/bdffnt.c:168:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfPitchAndFamily[1];
data/gbdfed-1.6/bdffnt.c:169:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfAvgWidth[2];
data/gbdfed-1.6/bdffnt.c:170:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfMaxWidth[2];
data/gbdfed-1.6/bdffnt.c:171:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfFirstChar[1];
data/gbdfed-1.6/bdffnt.c:172:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfLastChar[1];
data/gbdfed-1.6/bdffnt.c:173:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfDefaultChar[1];
data/gbdfed-1.6/bdffnt.c:174:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfBreakChar[1];
data/gbdfed-1.6/bdffnt.c:175:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfWidthBytes[2];
data/gbdfed-1.6/bdffnt.c:176:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfDevice[4];
data/gbdfed-1.6/bdffnt.c:177:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfFace[4];
data/gbdfed-1.6/bdffnt.c:178:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfBitsPointer[4];
data/gbdfed-1.6/bdffnt.c:179:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfBitsOffset[4];
data/gbdfed-1.6/bdffnt.c:180:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfReserved[1];
data/gbdfed-1.6/bdffnt.c:181:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfFlags[4];
data/gbdfed-1.6/bdffnt.c:182:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfAspace[2];
data/gbdfed-1.6/bdffnt.c:183:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfBspace[2];
data/gbdfed-1.6/bdffnt.c:184:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfCspace[2];
data/gbdfed-1.6/bdffnt.c:186:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfColorPointer[4];
data/gbdfed-1.6/bdffnt.c:187:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfReserved1[16];
data/gbdfed-1.6/bdffnt.c:189:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfColorPointer[2];
data/gbdfed-1.6/bdffnt.c:190:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dfReserved1[4];
data/gbdfed-1.6/bdffnt.c:302:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(fi->dfCopyright, fis->dfCopyright, 60);
data/gbdfed-1.6/bdffnt.c:337:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(fi->dfReserved1, fis->dfReserved1, 16);
data/gbdfed-1.6/bdffnt.c:340:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(fi->dfReserved1, fis->dfReserved1, 4);
data/gbdfed-1.6/bdffnt.c:423:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((in = fopen(path, "r")) == 0)
data/gbdfed-1.6/bdffnt.c:675:20:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            (void) strcpy((char *) sp, "Italic ");
data/gbdfed-1.6/bdffnt.c:683:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf((char *) sp, "%hdpt", font->info.dfPoints);
data/gbdfed-1.6/bdffnt.c:743:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[256];
data/gbdfed-1.6/bdffnt.c:1017:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name, "%d", i);
data/gbdfed-1.6/bdfgname.c:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *sp, buf[256];
data/gbdfed-1.6/bdfgname.c:132:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *sp, buf[256];
data/gbdfed-1.6/bdfgname.c:192:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "char%u", code);
data/gbdfed-1.6/bdfgname.c:197:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "uni%04X", code & 0xffff);
data/gbdfed-1.6/bdfgname.c:223:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name, "uni%04X", code & 0xffff);
data/gbdfed-1.6/bdfgname.c:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_GLYPH_NAME_LEN + 1];
data/gbdfed-1.6/bdfgname.c:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[128];
data/gbdfed-1.6/bdfgname.c:313:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 'u': sprintf(name, "uni%04X", gp->encoding & 0xffff); break;
data/gbdfed-1.6/bdfgname.c:314:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 'x': sprintf(name, "0x%04X", gp->encoding & 0xffff); break;
data/gbdfed-1.6/bdfgname.c:315:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case '+': sprintf(name, "U+%04X", gp->encoding & 0xffff); break;
data/gbdfed-1.6/bdfgname.c:316:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case '\\': sprintf(name, "\\u%04X", gp->encoding & 0xffff); break;
data/gbdfed-1.6/bdfgrab.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[16];
data/gbdfed-1.6/bdfgrab.c:155:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(name, "char%d", gp->encoding);
data/gbdfed-1.6/bdfgrab.c:337:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy(font->name, name, len + 1);
data/gbdfed-1.6/bdfgrid.c:263:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[24];
data/gbdfed-1.6/bdfgrid.c:322:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      (void) memcpy((char *) &gr->font_bbx, (char *) &font->bbx,
data/gbdfed-1.6/bdfgrid.c:385:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy(gr->name, glp->name, strlen(glp->name) + 1);
data/gbdfed-1.6/bdfgrid.c:387:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(name, "char%d", code);
data/gbdfed-1.6/bdfgrid.c:389:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy(gr->name, name, strlen(name) + 1);
data/gbdfed-1.6/bdfgrid.c:396:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &gr->glyph_bbx, (char *) &glp->bbx,
data/gbdfed-1.6/bdfgrid.c:420:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(name, "unencoded%d", code);
data/gbdfed-1.6/bdfgrid.c:422:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(name, "char%d", code);
data/gbdfed-1.6/bdfgrid.c:424:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy(gr->name, name, strlen(name) + 1);
data/gbdfed-1.6/bdfgrid.c:525:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) gr->unicode.map, (char *) glp->unicode.map,
data/gbdfed-1.6/bdfgrid.c:832:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) grid->bitmap, (char *) bitmap, bytes);
data/gbdfed-1.6/bdfgrid.c:1373:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          (void) memcpy((char *) grid->sel.bitmap, (char *) scratch, bytes);
data/gbdfed-1.6/bdfgrid.c:1427:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) grid->sel.bitmap, (char *) scratch, bytes);
data/gbdfed-1.6/bdfgrid.c:1822:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          (void) memcpy((char *) grid->bitmap, (char *) scratch, bytes);
data/gbdfed-1.6/bdfgrid.c:2008:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          (void) memcpy((char *) grid->bitmap, (char *) scratch, bytes);
data/gbdfed-1.6/bdfgrid.c:2569:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) grid->bitmap, (char *) scratch, bytes);
data/gbdfed-1.6/bdfgrid.c:2719:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          (void) memcpy((char *) grid->sel.bitmap, (char *) scratch, bytes);
data/gbdfed-1.6/bdfgrid.c:2721:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          (void) memcpy((char *) grid->bitmap, (char *) scratch, bytes);
data/gbdfed-1.6/bdfgrid.c:2809:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) &glyph->bbx, (char *) &grid->glyph_bbx,
data/gbdfed-1.6/bdfgrid.c:2840:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy(glyph->name, grid->name, len);
data/gbdfed-1.6/bdfgrid.c:2909:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) image->bitmap, (char *) grid->bitmap, image->bytes);
data/gbdfed-1.6/bdfgrid.c:3368:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) grid->sel.bitmap, (char *) sel->bitmap,
data/gbdfed-1.6/bdfotf.c:523:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *np, str[256];
data/gbdfed-1.6/bdfpkgf.c:156:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf((char *) buf, "%d", s >> 16);
data/gbdfed-1.6/bdfpkgf.c:170:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf((char *) buf, " scaled)");
data/gbdfed-1.6/bdfpkgf.c:183:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *comment, bytes[4];
data/gbdfed-1.6/bdfpkgf.c:265:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf((char *) comment, "%d", num);
data/gbdfed-1.6/bdfpkgf.c:360:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *row, bytes[256], glyphname[256];
data/gbdfed-1.6/bdfpkgf.c:713:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                          (void) memcpy((char *) (g.bitmap + (y * bpr)),
data/gbdfed-1.6/bdfpkgf.c:758:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) (f->unencoded + f->unencoded_used),
data/gbdfed-1.6/bdfpkgf.c:781:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) gp, (char *) &g, sizeof(bdf_glyph_t));;
data/gbdfed-1.6/bdfpkgf.c:919:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *comment, bytes[4];
data/gbdfed-1.6/bdfpkgf.c:995:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf((char *) comment, "%d", num);
data/gbdfed-1.6/bdfpkgf.c:1031:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char bytes[256], glyphname[256];
data/gbdfed-1.6/bdfpkgf.c:1234:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) (f->unencoded + f->unencoded_used),
data/gbdfed-1.6/bdfpkgf.c:1257:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) gp, (char *) &g, sizeof(bdf_glyph_t));;
data/gbdfed-1.6/bdfpkgf.c:1484:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mfmag[2];
data/gbdfed-1.6/bdfpsf.c:101:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];
data/gbdfed-1.6/bdfpsf.c:195:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) (gp->unicode.map + gp->unicode.map_used),
data/gbdfed-1.6/bdfpsf.c:503:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(lp, "U+%04X", code);
data/gbdfed-1.6/bdfpsf.c:505:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(lp, "U+%06X", code);
data/gbdfed-1.6/bdfpsf.c:658:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msgbuf[1024];
data/gbdfed-1.6/bdfpsf.c:768:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &gp->bbx, (char *) &fp->bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/bdfpsf.c:793:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msgbuf, "PSF Unicode table too short at 0x%04X (%d).",
data/gbdfed-1.6/bdfpsf.c:797:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(msgbuf, "PSF Unicode table too int.");
data/gbdfed-1.6/bdfpsf.c:800:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msgbuf, "PSF UTF-8 sequence corrupt at 0x%04X (%d).",
data/gbdfed-1.6/bdfpsf.c:804:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msgbuf, "PSF mapping buffer overflow at 0x%04X (%d).",
data/gbdfed-1.6/bdfpsf.c:812:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(msgbuf, "Font converted from PSF%c to BDF.",
data/gbdfed-1.6/bdfpsf.c:867:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) &tmpfont.bbx, (char *) &glyphs.bbx,
data/gbdfed-1.6/bdfpsf.c:906:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) &cell.bbx, (char *) &glyphs.bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/fontgrid.c:838:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(pix, bg, 3);
data/gbdfed-1.6/fontgrid.c:840:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&fw->rgb[(y * rgb_bpr) + (x * 3)], pix, 3);
data/gbdfed-1.6/fontgrid.c:867:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) dp, (char *) digits[d].points,
data/gbdfed-1.6/fontgrid.c:867:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        (void) memcpy((char *) dp, (char *) digits[d].points,
data/gbdfed-1.6/fontgrid.c:867:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        (void) memcpy((char *) dp, (char *) digits[d].points,
data/gbdfed-1.6/fontgrid.c:923:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(nbuf, "-1");
data/gbdfed-1.6/fontgrid.c:968:27:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  case 8: sprintf(nbuf, "%o", i); break;
data/gbdfed-1.6/fontgrid.c:969:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  case 10: sprintf(nbuf, "%d", i); break;
data/gbdfed-1.6/fontgrid.c:970:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  case 16: sprintf(nbuf, "%X", i); break;
data/gbdfed-1.6/fontgrid.c:3625:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) &info->bbx, (char *) &fw->font->bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/fontgrid.c:4038:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) sp, gp->name, nlen);
data/gbdfed-1.6/fontgrid.c:4046:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) sp, (char *) gp->bitmap, gp->bytes);
data/gbdfed-1.6/fontgrid.c:4057:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) sp, (char *) gp->unicode.map,
data/gbdfed-1.6/fontgrid.c:4191:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy(gp->name, (char *) sel, nlen);
data/gbdfed-1.6/fontgrid.c:4216:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) gp->bitmap, (char *) sel, gp->bytes);
data/gbdfed-1.6/fontgrid.c:4229:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy((char *) gp->unicode.map, (char *) sel,
data/gbdfed-1.6/fontgrid.c:4431:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                (void) memcpy((char *) &overflow.bbx, (char *) &gl->bbx,
data/gbdfed-1.6/fontgrid.c:4606:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) &gl.bbx, (char *) &glyph->bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/gbdfed.c:217:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "Save Font: One font was modified.  Save?");
data/gbdfed-1.6/gbdfed.c:219:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "Save Font: %d fonts were modified.  Save?",
data/gbdfed-1.6/gbdfed.c:235:23:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                      sprintf(buffer1, "Save Font: Save unnamed%d.bdf?", i);
data/gbdfed-1.6/gbdfed.c:392:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "%d", pi->current_page);
data/gbdfed-1.6/gbdfed.c:505:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
              sprintf(buffer1, "char%d", si->glyphs->encoding);
data/gbdfed-1.6/gbdfed.c:516:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "char%d", si->start);
data/gbdfed-1.6/gbdfed.c:551:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buffer2, "Selection %o (%o, %o) - %o (%o, %o)",
data/gbdfed-1.6/gbdfed.c:555:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buffer2, "Selection %d (%d, %d) - %d (%d, %d)",
data/gbdfed-1.6/gbdfed.c:559:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buffer2, "Selection %04X (%02X, %02X) - %04X (%02X, %02X)",
data/gbdfed-1.6/gbdfed.c:573:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "ascent %hd descent %hd right %hd left %hd",
data/gbdfed-1.6/gbdfed.c:700:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "unnamed%d.bdf: Messages", ed->id);
data/gbdfed-1.6/gbdfed.c:826:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(buffer1, "(unnamed%d)", i);
data/gbdfed-1.6/gbdfed.c:839:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(buffer1, "(unnamed%d)", editors[i].id);
data/gbdfed-1.6/gbdfed.c:1465:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "(unnamed%d)", editors[i].id);
data/gbdfed-1.6/gbdfed.c:1658:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((in = fopen(filename, "r")) == 0) {
data/gbdfed-1.6/gbdfed.c:2310:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((in = fopen(buffer1, "r")) != 0) {
data/gbdfed-1.6/gbdfed.c:2319:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if ((in = fopen(buffer1, "r")) != 0) {
data/gbdfed-1.6/gectrl.c:902:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(pix, bg, 3);
data/gbdfed-1.6/gectrl.c:904:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&ge->rgb[(y * rgb_bpr) + (x * 3)], pix, 3);
data/gbdfed-1.6/gectrl.c:974:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ge->rgb+((i+1)*128), ge->rgb+(i*128), 128);
data/gbdfed-1.6/gectrl.c:975:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ge->rgb+((i+2)*128), ge->rgb+(i*128), 256);
data/gbdfed-1.6/gectrl.c:976:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ge->rgb+((i+4)*128), ge->rgb+(i*128), 512);
data/gbdfed-1.6/gectrl.c:1116:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(buf, "Color: %03d Gray: %03d", (y>>3)+1,
data/gbdfed-1.6/gectrl.c:1119:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(buf, "Color: %03d Gray: %03d", (y>>3)+1,
data/gbdfed-1.6/gectrl.c:1128:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(buf, "Color: %03d Gray: %03d",
data/gbdfed-1.6/gectrl.c:1536:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ge->gimage, image, sizeof(bdf_bitmap_t));
data/gbdfed-1.6/gectrl.c:1539:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ge->gimage->bitmap, image->bitmap, image->bytes);
data/gbdfed-1.6/gectrl.c:1562:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ge->gimage, image, sizeof(bdf_bitmap_t));
data/gbdfed-1.6/gectrl.c:1565:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ge->gimage->bitmap, image->bitmap, image->bytes);
data/gbdfed-1.6/glyphedit.c:1613:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) bp, (char *) gw->grid->sel.bitmap, bcount);
data/gbdfed-1.6/glyphtest.c:109:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &lp->bbx, (char *) &bbx, sizeof(bdf_bbx_t));
data/gbdfed-1.6/guiedit.c:154:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((in = fopen(options.unicode_name_file, "r")) == 0) {
data/gbdfed-1.6/guiedit.c:177:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((in = fopen(options.adobe_name_file, "r")) == 0) {
data/gbdfed-1.6/guiedit.c:270:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buffer1, "%d", prop->value.int32);
data/gbdfed-1.6/guiedit.c:274:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buffer1, "%d", prop->value.card32);
data/gbdfed-1.6/guiedit.c:327:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "(unnamed%d) Info Edit", ed->id);
data/gbdfed-1.6/guiedit.c:396:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "%hd", font->monowidth);
data/gbdfed-1.6/guiedit.c:402:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "%d", font->font_ascent);
data/gbdfed-1.6/guiedit.c:408:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "%d", font->font_descent);
data/gbdfed-1.6/guiedit.c:421:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "%d", font->glyphs_used);
data/gbdfed-1.6/guiedit.c:427:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "%d", font->unencoded_used);
data/gbdfed-1.6/guiedit.c:441:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 8: sprintf(buffer1, "%o", font->default_glyph); break;
data/gbdfed-1.6/guiedit.c:442:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 10: sprintf(buffer1, "%d", font->default_glyph); break;
data/gbdfed-1.6/guiedit.c:443:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 16: sprintf(buffer1, "%04x", font->default_glyph); break;
data/gbdfed-1.6/guiedit.c:449:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "%hd", font->bpp);
data/gbdfed-1.6/guiedit.c:451:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "%d", options.font_opts.bits_per_pixel);
data/gbdfed-1.6/guiedit.c:468:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      case 8: sprintf(buffer1, "%o", font->default_glyph); break;
data/gbdfed-1.6/guiedit.c:469:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      case 10: sprintf(buffer1, "%d", font->default_glyph); break;
data/gbdfed-1.6/guiedit.c:470:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      case 16: sprintf(buffer1, "%04x", font->default_glyph); break;
data/gbdfed-1.6/guiedit.c:485:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "%d", font->glyphs_used);
data/gbdfed-1.6/guiedit.c:487:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "%d", font->unencoded_used);
data/gbdfed-1.6/guifile.c:246:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        out = fopen(filename, "rb");
data/gbdfed-1.6/guifile.c:271:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fopen(filename, "w") : fopen(filename, "wb");
data/gbdfed-1.6/guifile.c:271:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fopen(filename, "w") : fopen(filename, "wb");
data/gbdfed-1.6/guifile.c:328:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buffer1, "Export PSF: Invalid range %d-%d.\n",
data/gbdfed-1.6/guifile.c:332:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(buffer1,
data/gbdfed-1.6/guifile.c:402:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    have = fopen(fname, "rb");
data/gbdfed-1.6/guifile.c:443:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer1, "Import Font:%d: error: See the font messages.",
data/gbdfed-1.6/guifile.c:465:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((in = fopen(fullpath, "rb")) == 0) {
data/gbdfed-1.6/guifile.c:557:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((in = fopen(fullpath, "rb")) == 0) {
data/gbdfed-1.6/guifile.c:637:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buffer1, "%.*s-16.bdf", len, file);
data/gbdfed-1.6/guifile.c:640:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buffer1, "%.*s-14.bdf", len, file);
data/gbdfed-1.6/guifile.c:643:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buffer1, "%.*s-08.bdf", len, file);
data/gbdfed-1.6/guifile.c:647:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "%.*s.bdf", len, file);
data/gbdfed-1.6/guifile.c:697:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((in = fopen(fullpath, "rb")) == 0) {
data/gbdfed-1.6/guifile.c:736:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "%.*s.bdf", (int) (dot - file), file);
data/gbdfed-1.6/guifile.c:953:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer1, "%.*s%d.bdf", (int) (cdata->dot - cdata->file),
data/gbdfed-1.6/guifile.c:1069:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer1, "%.*s.bdf", (int) (dot - file), file);
data/gbdfed-1.6/guifile.c:1238:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "Fonts: %d", nfonts);
data/gbdfed-1.6/guifile.c:1737:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(buffer1,
data/gbdfed-1.6/guifile.c:1780:18:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          (void) strcpy(buffer1, "Unknown");
data/gbdfed-1.6/guifile.c:1790:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(buffer1, "Unknown%d", i);
data/gbdfed-1.6/guifile.c:1886:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "%.*s.bdf", dot - file, file);
data/gbdfed-1.6/guifile.c:1966:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "%.*s.bdf", (int) (dot - file), file);
data/gbdfed-1.6/guifile.c:2359:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "unnamed%d.bdf", ed->id);
data/gbdfed-1.6/guifile.c:2371:18:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          (void) strcpy(dot, ".psfu");
data/gbdfed-1.6/guifile.c:2373:18:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          (void) strcpy(dot, ".hex");
data/gbdfed-1.6/guifile.c:2396:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "Save Font: (unnamed%d) modified.  Save?", ed->id);
data/gbdfed-1.6/guifile.c:2426:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "Save Font: (unnamed%d) modified.  Save?", ed->id);
data/gbdfed-1.6/guifile.c:2456:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "Save Font: (unnamed%d) modified.  Save?", ed->id);
data/gbdfed-1.6/guifile.c:2486:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "Save Font: (unnamed%d) modified.  Save?", ed->id);
data/gbdfed-1.6/guifile.c:2518:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "Save Font: (unnamed%d) modified.  Save?", ed->id);
data/gbdfed-1.6/guifile.c:2552:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "Save Font: (unnamed%d) modified.  Save?", ed->id);
data/gbdfed-1.6/guifile.c:2608:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "Font List: %d", nfonts);
data/gbdfed-1.6/guifile.c:2745:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer1, "Save Font: (unnamed%d) modified.  Save?", ed->id);
data/gbdfed-1.6/guifile.c:2882:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "Fonts Found: %d", nfonts);
data/gbdfed-1.6/guigedit.c:433:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "-1");
data/gbdfed-1.6/guigedit.c:436:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 8: sprintf(buffer1, "%o", grid->encoding); break;
data/gbdfed-1.6/guigedit.c:437:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 10: sprintf(buffer1, "%d", grid->encoding); break;
data/gbdfed-1.6/guigedit.c:438:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 16: sprintf(buffer1, "%04X", grid->encoding); break;
data/gbdfed-1.6/guigedit.c:443:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "%hd", grid->dwidth);
data/gbdfed-1.6/guigedit.c:456:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "width %hd height %hd\r\nascent %hd descent %hd",
data/gbdfed-1.6/guigedit.c:1119:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "U+%04lX", n);
data/gbdfed-1.6/guigedit.c:1121:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "U+%06lX", n);
data/gbdfed-1.6/guigedit.c:1675:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "(%d,%d)", si->x, si->y);
data/gbdfed-1.6/guigedit.c:1679:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buffer1, "(%d,%d,%d)", si->x, si->y,
data/gbdfed-1.6/guigedit.c:1683:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buffer1, "(%d,%d,%d)", si->x, si->y,
data/gbdfed-1.6/guigedit.c:1687:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buffer1, "(%d,%d,%d)", si->x, si->y, si->color);
data/gbdfed-1.6/guigedit.c:1743:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "width %hd height %hd\nascent %hd descent %hd",
data/gbdfed-1.6/guigedit.c:1749:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer1, "%hd", si->metrics->dwidth);
data/gbdfed-1.6/guigedit.c:2087:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "-1");
data/gbdfed-1.6/guigedit.c:2090:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 8: sprintf(buffer1, "%o", grid->encoding); break;
data/gbdfed-1.6/guigedit.c:2091:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 10: sprintf(buffer1, "%d", grid->encoding); break;
data/gbdfed-1.6/guigedit.c:2092:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          case 16: sprintf(buffer1, "%04X", grid->encoding); break;
data/gbdfed-1.6/guigedit.c:2098:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "%hd", grid->dwidth);
data/gbdfed-1.6/guigedit.c:2107:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer1, "width %hd height %hd\r\nascent %hd descent %hd",
data/gbdfed-1.6/guigedit.c:2217:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buffer1, "%o", enc);
data/gbdfed-1.6/guigedit.c:2220:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buffer1, "%d", enc);
data/gbdfed-1.6/guigedit.c:2223:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buffer1, "%04X", enc);
data/gbdfed-1.6/guiops.c:303:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer1, "(unnamed%d): Glyph Operations", ed->id);
data/gbdfed-1.6/guipref.c:291:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&tmp_opts.colors, &options.colors,
data/gbdfed-1.6/guipref.c:711:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(buffer1, "Unicode Character Database Selection");
data/gbdfed-1.6/guipref.c:713:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(buffer1, "Adobe Glyph Name File Selection");
data/gbdfed-1.6/guipref.c:785:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer1, "%dx%d", i, i);
data/gbdfed-1.6/guipref.c:904:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy((char *) &options, (char *) &tmp_opts,
data/gbdfed-1.6/guipref.c:940:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(buffer1, "w")) == 0) {
data/gbdfed-1.6/guipref.c:1078:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void) memcpy((char *) &tmp_opts, (char *) &options,
data/gbdfed-1.6/hbf.c:419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAXLINE];
data/gbdfed-1.6/hbf.c:673:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file->bmf_name, READ_BINARY);
data/gbdfed-1.6/hbf.c:678:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	tmp[400];
data/gbdfed-1.6/hbf.c:681:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((f = fopen(tmp, "r")) != NULL) {
data/gbdfed-1.6/hbf.c:840:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	filename[MAXLINE];
data/gbdfed-1.6/hbf.c:1002:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[MAXLINE];
data/gbdfed-1.6/hbf.c:1112:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((f = fopen(fullname, "r")) != NULL) {
data/gbdfed-1.6/hbf.c:1126:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		return fopen(*fullp, "r");
data/gbdfed-1.6/hbf.c:1308:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((char *)buffer,
data/gbdfed-1.6/bdf.c:574:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while (!done && (n = read(fd, pp, bytes)) > 0) {
data/gbdfed-1.6/bdf.c:998:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (unsigned int) (strlen(font->name) + 1);
data/gbdfed-1.6/bdf.c:1113:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len = strlen(value) + 1;
data/gbdfed-1.6/bdf.c:1171:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(value) + 1;
data/gbdfed-1.6/bdf.c:1264:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(p->font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1366:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1383:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1474:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1500:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1518:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1540:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1584:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1625:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1674:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(p->font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1682:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(p->font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1790:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(p->font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1831:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(p->font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1852:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    _bdf_add_acmsg(p->font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1857:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(p->font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:1940:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(p.font, msgbuf, strlen(msgbuf));
data/gbdfed-1.6/bdf.c:1952:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(p.font, msgbuf, strlen(msgbuf));
data/gbdfed-1.6/bdf.c:1958:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(p.font, msgbuf, strlen(msgbuf));
data/gbdfed-1.6/bdf.c:1964:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(p.font, msgbuf, strlen(msgbuf));
data/gbdfed-1.6/bdf.c:1970:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(p.font, msgbuf, strlen(msgbuf));
data/gbdfed-1.6/bdf.c:1977:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(p.font, msgbuf, strlen(msgbuf));
data/gbdfed-1.6/bdf.c:1982:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              _bdf_add_acmsg(p.font, ACMSG8, strlen(ACMSG8));
data/gbdfed-1.6/bdf.c:2012:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _bdf_add_acmsg(p.font, msgbuf, strlen(msgbuf));
data/gbdfed-1.6/bdf.c:2229:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(p->font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:2237:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                _bdf_add_acmsg(p->font, nbuf, strlen(nbuf));
data/gbdfed-1.6/bdf.c:2316:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = (unsigned int) strlen(nbuf);
data/gbdfed-1.6/bdf.c:3223:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = (unsigned int) (strlen(name) + 1);
data/gbdfed-1.6/bdf.c:3395:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len = strlen(property->value.atom) + 1;
data/gbdfed-1.6/bdf.c:3458:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len = strlen(property->value.atom) + 1;
data/gbdfed-1.6/bdf.c:4032:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        font->name = (char *) malloc(strlen(name) + 1);
data/gbdfed-1.6/bdf.c:4266:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                dp->name = (char *) malloc(strlen(cp->name) + 1);
data/gbdfed-1.6/bdf.c:5121:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                               strlen(dgp->name) + 1);
data/gbdfed-1.6/bdf.c:5633:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                            strlen(gp->name) + 1);
data/gbdfed-1.6/bdf.c:5722:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (unsigned int) (strlen(font->name) + 1);
data/gbdfed-1.6/bdf.c:5754:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5762:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5772:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5782:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5792:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5802:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5818:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5827:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5836:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5845:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5861:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5886:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5894:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5902:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np += strlen(np);
data/gbdfed-1.6/bdf.c:5927:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = (unsigned int) strlen(font->name);
data/gbdfed-1.6/bdf.c:5962:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        np += strlen(np);
data/gbdfed-1.6/bdf.c:5973:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = (unsigned int) (strlen(nname) + 1);
data/gbdfed-1.6/bdf.c:6002:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = (unsigned int) strlen(font->name);
data/gbdfed-1.6/bdf.c:6067:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i = (unsigned int) strlen(font->name);
data/gbdfed-1.6/bdf.c:6077:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            used = strlen(num) - strlen(list.field[12]);
data/gbdfed-1.6/bdf.c:6077:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            used = strlen(num) - strlen(list.field[12]);
data/gbdfed-1.6/bdf.c:6097:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                np += strlen(np);
data/gbdfed-1.6/bdffnt.c:660:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((c = getc(font->in)) > 0) {
data/gbdfed-1.6/bdffnt.c:684:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sp += strlen((char *) sp);
data/gbdfed-1.6/bdffnt.c:891:47:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  gp->bitmap[(y * bpr) + x] = getc(font->in);
data/gbdfed-1.6/bdfgname.c:49:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((c = getc(in)) == EOF || (c == '\n' || c == '\r'))
data/gbdfed-1.6/bdfgname.c:59:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(in);
data/gbdfed-1.6/bdfgname.c:65:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(in);
data/gbdfed-1.6/bdfgname.c:193:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (int) strlen(name);
data/gbdfed-1.6/bdfgname.c:198:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (int) strlen(name);
data/gbdfed-1.6/bdfgname.c:224:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (int) strlen(name);
data/gbdfed-1.6/bdfgname.c:251:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (gp->name) ? strlen(gp->name) : 0;
data/gbdfed-1.6/bdfgname.c:320:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (gp->name) ? strlen(gp->name) : 0;
data/gbdfed-1.6/bdfgrab.c:156:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                gp->name = (char *) malloc(strlen(name) + 1);
data/gbdfed-1.6/bdfgrab.c:335:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (unsigned int) strlen(name);
data/gbdfed-1.6/bdfgrid.c:384:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            gr->name = (char *) malloc(strlen(glp->name) + 1);
data/gbdfed-1.6/bdfgrid.c:385:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (void) memcpy(gr->name, glp->name, strlen(glp->name) + 1);
data/gbdfed-1.6/bdfgrid.c:388:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            gr->name = (char *) malloc(strlen(name) + 1);
data/gbdfed-1.6/bdfgrid.c:389:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (void) memcpy(gr->name, name, strlen(name) + 1);
data/gbdfed-1.6/bdfgrid.c:423:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gr->name = (char *) malloc(strlen(name) + 1);
data/gbdfed-1.6/bdfgrid.c:424:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (void) memcpy(gr->name, name, strlen(name) + 1);
data/gbdfed-1.6/bdfgrid.c:2838:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(grid->name) + 1;
data/gbdfed-1.6/bdfpkgf.c:132:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return (getc(in) << 8) | (getc(in) & 0xff);
data/gbdfed-1.6/bdfpkgf.c:132:31:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return (getc(in) << 8) | (getc(in) & 0xff);
data/gbdfed-1.6/bdfpkgf.c:157:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf += strlen((char *) buf);
data/gbdfed-1.6/bdfpkgf.c:192:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((c = getc(in)) >= PK_xxx1 && c != GF_char_loc) {
data/gbdfed-1.6/bdfpkgf.c:266:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                printscaled(num, comment + strlen((char *) comment));
data/gbdfed-1.6/bdfpkgf.c:268:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen((char *) comment));
data/gbdfed-1.6/bdfpkgf.c:294:20:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        state->c = getc(in);
data/gbdfed-1.6/bdfpkgf.c:309:20:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        state->c = getc(in);
data/gbdfed-1.6/bdfpkgf.c:466:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen((char *) glyphname)) {
data/gbdfed-1.6/bdfpkgf.c:467:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g.name = malloc(strlen((char *) glyphname)+1);
data/gbdfed-1.6/bdfpkgf.c:928:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((c = getc(in)) >= GF_xxx1) {
data/gbdfed-1.6/bdfpkgf.c:996:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                printscaled(num, comment + strlen((char *) comment));
data/gbdfed-1.6/bdfpkgf.c:998:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen((char *) comment));
data/gbdfed-1.6/bdfpkgf.c:1103:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strlen((char *) glyphname)) {
data/gbdfed-1.6/bdfpkgf.c:1104:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g.name = malloc(strlen((char *) glyphname)+1);
data/gbdfed-1.6/bdfpkgf.c:1125:26:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            g.encoding = getc(in);
data/gbdfed-1.6/bdfpkgf.c:1126:27:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            g.bbx.width = getc(in);
data/gbdfed-1.6/bdfpkgf.c:1127:30:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            g.bbx.x_offset = getc(in) - g.bbx.width;
data/gbdfed-1.6/bdfpkgf.c:1128:28:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            g.bbx.height = getc(in);
data/gbdfed-1.6/bdfpkgf.c:1129:30:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            g.bbx.y_offset = getc(in) - g.bbx.height;
data/gbdfed-1.6/bdfpkgf.c:1159:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        while ((res = getc(in)) < GF_xxx1) {
data/gbdfed-1.6/bdfpkgf.c:1165:27:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    res = getc(in);
data/gbdfed-1.6/bdfpkgf.c:1171:55:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    res = (_bdf_mf_get16(in) << 8) | (getc(in) & 0xff);
data/gbdfed-1.6/bdfpkgf.c:1182:27:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    res = getc(in);
data/gbdfed-1.6/bdfpkgf.c:1188:55:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    res = (_bdf_mf_get16(in) << 8) | (getc(in) & 0xff);
data/gbdfed-1.6/bdfpkgf.c:1360:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((res = getc(in)) != GF_post_post) {
data/gbdfed-1.6/bdfpkgf.c:1364:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        num = getc(in);
data/gbdfed-1.6/bdfpkgf.c:1385:43:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            gp->dwidth = (unsigned short) getc(in);
data/gbdfed-1.6/bdfpsf.c:106:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((c0 = getc(in)) >= 0) {
data/gbdfed-1.6/bdfpsf.c:117:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((c1 = getc(in)) < 0)
data/gbdfed-1.6/bdfpsf.c:174:31:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    if ((c0 = getc(in)) < 0)
data/gbdfed-1.6/bdfpsf.c:527:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(as) - strlen(bs);
data/gbdfed-1.6/bdfpsf.c:527:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(as) - strlen(bs);
data/gbdfed-1.6/bdfpsf.c:809:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          _bdf_add_acmsg(fp, msgbuf, strlen(msgbuf));
data/gbdfed-1.6/fontgrid.c:980:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(nbuf);
data/gbdfed-1.6/fontgrid.c:3536:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (comments) ? (unsigned int) strlen(comments) : 0;
data/gbdfed-1.6/fontgrid.c:3929:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nlen = (gp->name) ? (guint32) (strlen(gp->name) + 1) : 0;
data/gbdfed-1.6/fontgrid.c:4010:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nlen = (gp->name) ? (guint32) (strlen(gp->name) + 1) : 0;
data/gbdfed-1.6/guiedit.c:398:14:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      (void) strcpy(buffer1, "0");
data/gbdfed-1.6/guiedit.c:404:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(buffer1, "0");
data/gbdfed-1.6/guiedit.c:410:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(buffer1, "0");
data/gbdfed-1.6/guiedit.c:423:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(buffer1, "0");
data/gbdfed-1.6/guiedit.c:429:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(buffer1, "0");
data/gbdfed-1.6/guifile.c:1729:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    np = dot + strlen(dot) - 1;
data/gbdfed-1.6/guifile.c:2033:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dot = file + strlen(file);
data/gbdfed-1.6/guifile.c:2039:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (filename[strlen(filename) - 1] == G_DIR_SEPARATOR) {
data/gbdfed-1.6/guigedit.c:1148:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(v) == 0)
data/gbdfed-1.6/hbf.c:403:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_s = malloc((unsigned)strlen(s) + 1);
data/gbdfed-1.6/hbf.c:535:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fullname = malloc(dirlen + strlen(stem) + 2);
data/gbdfed-1.6/hbf.c:539:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fullname = malloc(dirlen + strlen(stem) + 2);
data/gbdfed-1.6/hbf.c:546:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fullname = malloc(dirlen + strlen(stem) + 2);
data/gbdfed-1.6/hbf.c:554:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fullname = malloc(dirlen + strlen(stem) + 1);
data/gbdfed-1.6/hbf.c:583:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s = malloc((unsigned)size + strlen(name) + 1);
data/gbdfed-1.6/hbf.c:592:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s = (unsigned char *)hbf_name + strlen((unsigned char *)hbf_name) - 1;
data/gbdfed-1.6/hbf.c:613:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s = malloc((unsigned)size + strlen(name) + 1);
data/gbdfed-1.6/hbf.c:631:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s = malloc((unsigned)size + strlen(name) + 1);
data/gbdfed-1.6/hbf.c:738:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((c = getc(f)) != EOF) {
data/gbdfed-1.6/hbf.c:909:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ((c = getc(f)) == EOF) {
data/gbdfed-1.6/hbf.c:963:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    sscanf(line + strlen(keyword), "%i %i %i %i",
data/gbdfed-1.6/hbf.c:1106:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(filename);
data/gbdfed-1.6/hbf.c:1110:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				p_next = path + strlen(path);
data/gbdfed-1.6/hbf.c:1427:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if ((c = getc(f)) == EOF)

ANALYSIS SUMMARY:

Hits = 633
Lines analyzed = 44435 in approximately 1.14 seconds (38981 lines/second)
Physical Source Lines of Code (SLOC) = 29842
Hits@level = [0] 203 [1] 142 [2] 342 [3]   3 [4] 146 [5]   0
Hits@level+ = [0+] 836 [1+] 633 [2+] 491 [3+] 149 [4+] 146 [5+]   0
Hits/KSLOC@level+ = [0+] 28.0142 [1+] 21.2117 [2+] 16.4533 [3+] 4.99296 [4+] 4.89243 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.