Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/kemoticons-5.74.0/autotests/kemoticontest.cpp Examining data/kemoticons-5.74.0/autotests/ktexttohtmlplugintest.cpp Examining data/kemoticons-5.74.0/autotests/autotestbase.h Examining data/kemoticons-5.74.0/tests/main.cpp Examining data/kemoticons-5.74.0/src/providers/xmpp/xmpp_emoticons.h Examining data/kemoticons-5.74.0/src/providers/xmpp/xmpp_emoticons.cpp Examining data/kemoticons-5.74.0/src/providers/pidgin/pidgin_emoticons.h Examining data/kemoticons-5.74.0/src/providers/pidgin/pidgin_emoticons.cpp Examining data/kemoticons-5.74.0/src/providers/kde/kde_emoticons.cpp Examining data/kemoticons-5.74.0/src/providers/kde/kde_emoticons.h Examining data/kemoticons-5.74.0/src/providers/adium/adium_emoticons.cpp Examining data/kemoticons-5.74.0/src/providers/adium/adium_emoticons.h Examining data/kemoticons-5.74.0/src/core/kemoticonsprovider.cpp Examining data/kemoticons-5.74.0/src/core/kemoticonsglobal_p.h Examining data/kemoticons-5.74.0/src/core/kemoticons.h Examining data/kemoticons-5.74.0/src/core/kemoticonstheme.cpp Examining data/kemoticons-5.74.0/src/core/kemoticonstheme.h Examining data/kemoticons-5.74.0/src/core/kemoticonsprovider.h Examining data/kemoticons-5.74.0/src/core/kemoticonsglobal.cpp Examining data/kemoticons-5.74.0/src/core/kemoticons.cpp Examining data/kemoticons-5.74.0/src/integrationplugin/ktexttohtml.cpp Examining data/kemoticons-5.74.0/src/integrationplugin/kemoticonsintegrationplugin.h Examining data/kemoticons-5.74.0/src/integrationplugin/kemoticonsintegrationplugin.cpp Examining data/kemoticons-5.74.0/src/integrationplugin/ktexttohtml.h FINAL RESULTS: data/kemoticons-5.74.0/autotests/kemoticontest.cpp:106:30: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). } else if (inputFile.open(QIODevice::ReadOnly) && expectedFile.open(QIODevice::ReadOnly)) { data/kemoticons-5.74.0/autotests/kemoticontest.cpp:106:72: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). } else if (inputFile.open(QIODevice::ReadOnly) && expectedFile.open(QIODevice::ReadOnly)) { data/kemoticons-5.74.0/src/core/kemoticons.cpp:262:31: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!archive || !archive->open(QIODevice::ReadOnly)) { data/kemoticons-5.74.0/src/providers/adium/adium_emoticons.cpp:114:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!fp.open(QIODevice::WriteOnly)) { data/kemoticons-5.74.0/src/providers/adium/adium_emoticons.cpp:135:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!file.open(QIODevice::ReadOnly)) { data/kemoticons-5.74.0/src/providers/adium/adium_emoticons.cpp:197:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!fp.open(QIODevice::WriteOnly)) { data/kemoticons-5.74.0/src/providers/kde/kde_emoticons.cpp:90:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!fp.open(QIODevice::WriteOnly)) { data/kemoticons-5.74.0/src/providers/kde/kde_emoticons.cpp:111:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!file.open(QIODevice::ReadOnly)) { data/kemoticons-5.74.0/src/providers/kde/kde_emoticons.cpp:186:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!fp.open(QIODevice::WriteOnly)) { data/kemoticons-5.74.0/src/providers/pidgin/pidgin_emoticons.cpp:107:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!fp.open(QIODevice::WriteOnly)) { data/kemoticons-5.74.0/src/providers/pidgin/pidgin_emoticons.cpp:134:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!file.open(QIODevice::ReadOnly)) { data/kemoticons-5.74.0/src/providers/pidgin/pidgin_emoticons.cpp:199:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!fp.open(QIODevice::WriteOnly)) { data/kemoticons-5.74.0/src/providers/xmpp/xmpp_emoticons.cpp:107:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!fp.open(QIODevice::WriteOnly)) { data/kemoticons-5.74.0/src/providers/xmpp/xmpp_emoticons.cpp:128:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!file.open(QIODevice::ReadOnly)) { data/kemoticons-5.74.0/src/providers/xmpp/xmpp_emoticons.cpp:195:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!fp.open(QIODevice::WriteOnly)) { ANALYSIS SUMMARY: Hits = 15 Lines analyzed = 3162 in approximately 0.85 seconds (3737 lines/second) Physical Source Lines of Code (SLOC) = 2035 Hits@level = [0] 0 [1] 0 [2] 15 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 15 [1+] 15 [2+] 15 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 7.37101 [1+] 7.37101 [2+] 7.37101 [3+] 0 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.