Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/ksysguard-5.19.5/ksystemstats/client.cpp
Examining data/ksysguard-5.19.5/ksystemstats/main.cpp
Examining data/ksysguard-5.19.5/ksystemstats/autotests/main.cpp
Examining data/ksysguard-5.19.5/ksystemstats/ksysguarddaemon.h
Examining data/ksysguard-5.19.5/ksystemstats/client.h
Examining data/ksysguard-5.19.5/ksystemstats/ksysguarddaemon.cpp
Examining data/ksysguard-5.19.5/ksystemstats/test/main.cpp
Examining data/ksysguard-5.19.5/plugins/process/nvidia/nvidia.cpp
Examining data/ksysguard-5.19.5/plugins/process/nvidia/nvidia.h
Examining data/ksysguard-5.19.5/plugins/process/network/network.h
Examining data/ksysguard-5.19.5/plugins/process/network/network.cpp
Examining data/ksysguard-5.19.5/plugins/process/network/helper/Capture.cpp
Examining data/ksysguard-5.19.5/plugins/process/network/helper/main.cpp
Examining data/ksysguard-5.19.5/plugins/process/network/helper/Accumulator.h
Examining data/ksysguard-5.19.5/plugins/process/network/helper/Accumulator.cpp
Examining data/ksysguard-5.19.5/plugins/process/network/helper/ConnectionMapping.h
Examining data/ksysguard-5.19.5/plugins/process/network/helper/Packet.cpp
Examining data/ksysguard-5.19.5/plugins/process/network/helper/ConnectionMapping.cpp
Examining data/ksysguard-5.19.5/plugins/process/network/helper/Capture.h
Examining data/ksysguard-5.19.5/plugins/process/network/helper/Packet.h
Examining data/ksysguard-5.19.5/plugins/process/network/helper/TimeStamps.h
Examining data/ksysguard-5.19.5/plugins/global/nvidia/nvidia.cpp
Examining data/ksysguard-5.19.5/plugins/global/nvidia/nvidia.h
Examining data/ksysguard-5.19.5/plugins/global/ksgrd/ksgrdiface.cpp
Examining data/ksysguard-5.19.5/plugins/global/ksgrd/ksgrdiface.h
Examining data/ksysguard-5.19.5/libkstats/AggregateSensor.cpp
Examining data/ksysguard-5.19.5/libkstats/SensorObject.cpp
Examining data/ksysguard-5.19.5/libkstats/SensorProperty.cpp
Examining data/ksysguard-5.19.5/libkstats/SensorObject.h
Examining data/ksysguard-5.19.5/libkstats/SensorContainer.h
Examining data/ksysguard-5.19.5/libkstats/SensorContainer.cpp
Examining data/ksysguard-5.19.5/libkstats/SensorProperty.h
Examining data/ksysguard-5.19.5/libkstats/types.h
Examining data/ksysguard-5.19.5/libkstats/AggregateSensor.h
Examining data/ksysguard-5.19.5/libkstats/SensorPlugin.h
Examining data/ksysguard-5.19.5/libkstats/SensorPlugin.cpp
Examining data/ksysguard-5.19.5/ksysguardd/Solaris/Memory.h
Examining data/ksysguard-5.19.5/ksysguardd/Solaris/Memory.c
Examining data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c
Examining data/ksysguard-5.19.5/ksysguardd/Solaris/LoadAvg.c
Examining data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.h
Examining data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.h
Examining data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c
Examining data/ksysguard-5.19.5/ksysguardd/Solaris/LoadAvg.h
Examining data/ksysguard-5.19.5/ksysguardd/PWUIDCache.c
Examining data/ksysguard-5.19.5/ksysguardd/CContLib/ccont.h
Examining data/ksysguard-5.19.5/ksysguardd/CContLib/ccont.c
Examining data/ksysguard-5.19.5/ksysguardd/ksysguardd.h
Examining data/ksysguard-5.19.5/ksysguardd/conf.h
Examining data/ksysguard-5.19.5/ksysguardd/Tru64/Memory.h
Examining data/ksysguard-5.19.5/ksysguardd/Tru64/Memory.c
Examining data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c
Examining data/ksysguard-5.19.5/ksysguardd/Tru64/LoadAvg.c
Examining data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.h
Examining data/ksysguard-5.19.5/ksysguardd/Tru64/LoadAvg.h
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/CPU.c
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/diskstat.h
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/logfile.c
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/apm.c
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/Memory.h
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/logfile.h
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/loadavg.h
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/loadavg.c
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/Memory.c
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/CPU.h
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/diskstat.c
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/netdev.c
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/apm.h
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/netdev.h
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/ProcessList.h
Examining data/ksysguard-5.19.5/ksysguardd/NetBSD/ProcessList.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/uptime.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/uptime.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/diskstat.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/logfile.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/apm.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/Memory.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/logfile.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/loadavg.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/loadavg.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/Memory.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/cpuinfo.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/cpuinfo.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/diskstat.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/netdev.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/apm.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/netdev.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/stat.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/stat.h
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c
Examining data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/uptime.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/diskstat.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/logfile.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/softraid.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/apm.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/Memory.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/logfile.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/loadavg.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/acpi.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/loadavg.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/Memory.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/i8k.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/netstat.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/diskstat.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/apm.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/netdev.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/stat.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/i8k.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/stat.h
Examining data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c
Examining data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.h
Examining data/ksysguard-5.19.5/ksysguardd/OpenBSD/memory.h
Examining data/ksysguard-5.19.5/ksysguardd/OpenBSD/cpu.h
Examining data/ksysguard-5.19.5/ksysguardd/OpenBSD/ProcessList.h
Examining data/ksysguard-5.19.5/ksysguardd/OpenBSD/cpu.c
Examining data/ksysguard-5.19.5/ksysguardd/OpenBSD/ProcessList.c
Examining data/ksysguard-5.19.5/ksysguardd/OpenBSD/memory.c
Examining data/ksysguard-5.19.5/ksysguardd/conf.c
Examining data/ksysguard-5.19.5/ksysguardd/PWUIDCache.h
Examining data/ksysguard-5.19.5/ksysguardd/ksysguardd.c
Examining data/ksysguard-5.19.5/ksysguardd/modules.h
Examining data/ksysguard-5.19.5/ksysguardd/Irix/Memory.h
Examining data/ksysguard-5.19.5/ksysguardd/Irix/Memory.c
Examining data/ksysguard-5.19.5/ksysguardd/Irix/cpu.h
Examining data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c
Examining data/ksysguard-5.19.5/ksysguardd/Irix/LoadAvg.c
Examining data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.h
Examining data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.h
Examining data/ksysguard-5.19.5/ksysguardd/Irix/cpu.c
Examining data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c
Examining data/ksysguard-5.19.5/ksysguardd/Irix/LoadAvg.h
Examining data/ksysguard-5.19.5/ksysguardd/Command.h
Examining data/ksysguard-5.19.5/ksysguardd/Command.c
Examining data/ksysguard-5.19.5/ksysguardd/GNU/dummy.cpp
Examining data/ksysguard-5.19.5/gui/WorkSheet.h
Examining data/ksysguard-5.19.5/gui/SensorBrowser.cpp
Examining data/ksysguard-5.19.5/gui/HostConnector.cpp
Examining data/ksysguard-5.19.5/gui/SensorBrowser.h
Examining data/ksysguard-5.19.5/gui/ksortfilterproxymodel.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/FancyPlotterSettings.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/DancingBars.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/DancingBarsSettings.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorLoggerDlg.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorModel.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/ListView.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/ProcessController.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorLoggerSettings.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/DancingBarsSettings.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorLoggerSettings.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/MultiMeterSettings.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorLoggerDlg.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorLogger.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/DummyDisplay.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/MultiMeterSettings.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/ListViewSettings.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorLogger.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/ProcessController.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/ListViewSettings.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorDisplay.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorModel.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/FancyPlotter.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorDisplay.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/DummyDisplay.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/BarGraph.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/LogFile.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/DancingBars.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/ListView.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/MultiMeter.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/LogFile.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/FancyPlotterSettings.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/BarGraph.cpp
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/FancyPlotter.h
Examining data/ksysguard-5.19.5/gui/SensorDisplayLib/MultiMeter.h
Examining data/ksysguard-5.19.5/gui/WorkSheetSettings.cpp
Examining data/ksysguard-5.19.5/gui/Workspace.cpp
Examining data/ksysguard-5.19.5/gui/StyleEngine.h
Examining data/ksysguard-5.19.5/gui/StyleEngine.cpp
Examining data/ksysguard-5.19.5/gui/SignalIDs.h
Examining data/ksysguard-5.19.5/gui/ksortfilterproxymodel.h
Examining data/ksysguard-5.19.5/gui/Workspace.h
Examining data/ksysguard-5.19.5/gui/HostConnector.h
Examining data/ksysguard-5.19.5/gui/SharedSettings.h
Examining data/ksysguard-5.19.5/gui/WorkSheetSettings.h
Examining data/ksysguard-5.19.5/gui/WorkSheet.cpp
Examining data/ksysguard-5.19.5/gui/ksysguard.cpp
Examining data/ksysguard-5.19.5/gui/ksysguard.h

FINAL RESULTS:

data/ksysguard-5.19.5/ksysguardd/Command.c:72:6:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  if(vfprintf(CurrentClient, fmt, az) < 0) {
data/ksysguard-5.19.5/ksysguardd/Command.c:84:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf( errmsg, sizeof( errmsg ) - 1, fmt, az );
data/ksysguard-5.19.5/ksysguardd/Command.c:102:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf( errmsg, sizeof( errmsg ) - 1, fmt, az );
data/ksysguard-5.19.5/ksysguardd/Command.c:137:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy( cmd->command, command );
data/ksysguard-5.19.5/ksysguardd/Command.c:178:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy( cmd->command, command );
data/ksysguard-5.19.5/ksysguardd/Command.c:187:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy( cmd->type, type );
data/ksysguard-5.19.5/ksysguardd/Command.c:206:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy( cmd->command, command );
data/ksysguard-5.19.5/ksysguardd/Command.c:243:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy( buf, command );
data/ksysguard-5.19.5/ksysguardd/Command.h:45:35:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    __attribute__ (  (  format (  printf, 1, 2 ) ) )
data/ksysguard-5.19.5/ksysguardd/Command.h:54:35:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    __attribute__ (  (  format (  printf, 1, 2 ) ) )
data/ksysguard-5.19.5/ksysguardd/Command.h:63:35:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    __attribute__ (  (  format (  printf, 1, 2 ) ) )
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:70:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(name, TZ_MIB_LEN, TZ_MIB, tz_cnt);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:74:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, BUF_LEN, TZ_MONITOR, tz_cnt + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:89:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, BUF_LEN, BAT_CHARGE_MONITOR, bat_cnt + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:91:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, BUF_LEN, BAT_CAPACITY_MONITOR, bat_cnt + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:93:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, BUF_LEN, BAT_REMAINING_MONITOR, bat_cnt + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:95:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, BUF_LEN, BAT_VOLTAGE_MONITOR, bat_cnt + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:97:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, BUF_LEN, BAT_RATE_MONITOR, bat_cnt + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:108:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(name, BUF_LEN, TZ_MONITOR, tz + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:114:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, TZ_MIB_LEN, BAT_CHARGE_MONITOR, bat + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:116:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, BUF_LEN, BAT_CAPACITY_MONITOR, bat + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:118:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, BUF_LEN, BAT_REMAINING_MONITOR, bat + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:120:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(name, BUF_LEN, BAT_VOLTAGE_MONITOR, bat + 1);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:136:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(name, TZ_MIB_LEN, TZ_MIB, tz);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:98:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor,"network/interfaces/%s/receiver/packets", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:100:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor ,"network/interfaces/%s/receiver/errors", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:112:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor,"network/interfaces/%s/transmitter/packets", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:114:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor,"network/interfaces/%s/transmitter/errors", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:122:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor,"network/interfaces/%s/transmitter/collisions", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:133:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor,"network/interfaces/%s/receiver/packets", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:135:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor,"network/interfaces/%s/receiver/errors", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:146:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor,"network/interfaces/%s/transmitter/packets", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:148:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor,"network/interfaces/%s/transmitter/errors", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:156:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(monitor,"network/interfaces/%s/transmitter/collisions", NetDevs[i].name);
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:84:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "sleep" );
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:87:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "run" );
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:90:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "zombie" );
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:93:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "stop" );
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:96:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "start" );
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:99:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "wmem" );
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:101:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s/%d", "cpu", (int) lwpinfo.pr_sonproc );
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:104:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "???" );
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:173:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s/pinfo/%ld", PROCDIR, pid );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:247:10:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if ( fscanf( fd, format, buf ) != 1 )
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:250:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf( buf, tagformat, tag );
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:341:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(filename, sizeof(filename), fileFormat, number);
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:522:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(th_file, sizeof(th_file),
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:583:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fan_state_file, sizeof(fan_state_file),
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:74:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    while ( sscanf( cibp, format, tag, value ) == 2 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:107:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(freqName, sizeof(freqName) - 1, freqTemplate, coreUniqueId);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:288:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Rate/totalio", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:291:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Rate/rio", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:294:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Rate/wio", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:297:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Rate/rblk", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:300:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Rate/wblk", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:304:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Delta/totalio", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:307:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Delta/rio", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:310:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Delta/wio", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:313:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Delta/rblk", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:316:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Delta/wblk", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:319:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Delta/rtim", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:322:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/Delta/wtim", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:326:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "disk/%s_(%d:%d)/ioqueue", devname, major, minor);
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:345:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Rate/totalio", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:347:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Rate/rio", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:349:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Rate/wio", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:351:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Rate/rblk", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:353:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Rate/wblk", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:356:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Delta/totalio", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:358:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Delta/rio", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:360:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Delta/wio", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:362:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Delta/rblk", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:364:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Delta/wblk", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:366:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Delta/rtim", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:368:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/Delta/wtim", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:371:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)/ioqueue", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:181:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			sscanf(netDevBufP, format, buf);
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:186:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		for (i = 0; sscanf(netDevBufP, format, buf) == 1; ++i) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:190:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			if (sscanf(buf, devFormat, tag)) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:226:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			sscanf(netDevWifiBufP, format, buf);
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:231:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		for (j = 0; sscanf(netDevWifiBufP, format, buf) == 1; ++j) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:235:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			if (sscanf(buf, devFormat, tag)) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:313:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf( netDevBufP, format, buf );
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:318:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  for ( i = 0; sscanf( netDevBufP, format, buf ) == 1; ++i ) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:323:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if ( sscanf( buf, devFormat, tag ) ) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:350:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf( netDevWifiBufP, format, buf );
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:355:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  for ( j = 0; sscanf( netDevWifiBufP, format, buf ) == 1; ++j ) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:359:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if ( sscanf( buf, devFormat, tag ) ) {
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:245:3:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execl ("/sbin/mdadm", "mdadm", "--detail", arrayDevice, (char *)0);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:268:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	while (sscanf(mdadmStatBufP, format, lineBuf) != EOF) {
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:275:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(sensorName, "SoftRaid/%s/ArraySizeKB", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:288:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(sensorName, "SoftRaid/%s/UsedDeviceSizeKB", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:297:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(sensorName, "SoftRaid/%s/PreferredMinor", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:354:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( MyArray->ArrayName, key.ArrayName );
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:358:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/NumBlocks", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:361:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/TotalDevices", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:364:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/FailedDevices", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:367:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/SpareDevices", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:370:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/NumRaidDevices", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:373:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/WorkingDevices", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:376:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/ActiveDevices", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:379:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/RaidType", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:382:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/DeviceNumber", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:385:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/ResyncingPercent", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:388:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sensorName, "SoftRaid/%s/DiskInfo", MyArray->ArrayName);
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:133:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/disk%d/%s", i, shortLabel );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:270:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/total", ptr->devname, major, minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:272:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/rio", ptr->devname, major, minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:274:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/wio", ptr->devname, major, minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:276:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/rblk", ptr->devname, major, minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:278:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/wblk", ptr->devname, major, minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:304:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/total", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:306:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/rio", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:308:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/wio", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:310:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/rblk", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:312:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( sensorName, "disk/%s_(%d:%d)24/wblk", ptr->devname, ptr->major, ptr->minor );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:355:10:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	while ( fscanf( stat, format, buf ) == 1 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:357:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		sscanf( buf, tagFormat, tag );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:418:17:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        while ( fscanf( stat, format, buf ) == 1 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:420:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            sscanf( buf, tagFormat, tag );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:500:10:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	while ( fscanf( stat, format, buf ) == 1 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:502:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		sscanf( buf, tagFormat, tag );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:608:17:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        while ( fscanf( stat, format, buf ) == 1 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:610:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            sscanf( buf, tagFormat, tag );
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:61:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(uptimeBufP, format, buf) == 1) {
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:84:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(uptimeBufP, format, buf) == 1)
data/ksysguard-5.19.5/ksysguardd/NetBSD/netdev.c:261:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(NetDevs[i].name, newval[i].name);
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:266:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( mon, "network/interfaces/%s/receiver/packets", IfInfo[i].Name );
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:269:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( mon, "network/interfaces/%s/transmitter/packets", IfInfo[i].Name );
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:280:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/interfaces/%s/receiver/errors",
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:287:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/interfaces/%s/transmitter/errors",
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:294:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/interfaces/%s/transmitter/collisions",
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:301:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/interfaces/%s/transmitter/multicast",
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:308:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/interfaces/%s/receiver/multicast",
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:315:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/interfaces/%s/transmitter/broadcast",
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:322:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/interfaces/%s/receiver/broadcast",
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:330:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/interfaces/%s/receiver/data",
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:334:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/interfaces/%s/transmitter/data",
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:85:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "sleep" );
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:88:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "run" );
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:91:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "zombie" );
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:94:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "stop" );
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:97:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "start" );
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:101:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s/%d", "cpu", processor );
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:104:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( result, "%s", "???" );
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:259:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( mon, "network/%s/ipackets", IfInfo[i].Name );
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:262:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( mon, "network/%s/opackets", IfInfo[i].Name );
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:273:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/%s/ierrors",
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:280:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/%s/oerrors",
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:287:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/%s/collisions",
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:294:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/%s/multixmt",
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:301:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/%s/multircv",
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:308:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/%s/brdcstxmt",
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:315:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( mon, "network/%s/brdcstrcv",
data/ksysguard-5.19.5/ksysguardd/ksysguardd.c:108:22:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ( ( option = getopt( argc, argv, "-p:f:dih" ) ) != EOF ) {
data/ksysguard-5.19.5/plugins/process/network/helper/main.cpp:49:22:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((option = getopt_long(argc, argv, "", long_options, &optionIndex)) != -1) {
data/ksysguard-5.19.5/gui/SensorDisplayLib/FancyPlotter.cpp:294:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    mSettingsDialog->open();	// open() opens the dialog modaly (ie. blocks the parent window)
data/ksysguard-5.19.5/gui/SensorDisplayLib/SensorLogger.cpp:345:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( !mLogFile.open( QIODevice::ReadWrite | QIODevice::Append ) ) {
data/ksysguard-5.19.5/gui/WorkSheet.cpp:86:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( !file.open( QIODevice::ReadOnly ) ) {
data/ksysguard-5.19.5/gui/WorkSheet.cpp:238:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( !file.open( QIODevice::WriteOnly ) ) {
data/ksysguard-5.19.5/ksysguardd/Command.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Command.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/Memory.c:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[_POSIX2_LINE_MAX];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[NAMELEN];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:75:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char (*cpunames)[8] = NULL;
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MONITORBUF];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:107:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(name, "processes/ps");
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MONITORBUF];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:134:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(name, "processes/ps");
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:157:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(prev_list, proc_buf, sizeof(struct kinfo_proc) * nproc);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:158:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(prev_sorted, sorted_proc, sizeof(int) * nproc);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[STATEBUF + 1], buf2[UNAMEBUF], buf3[NAMEBUF], args[ARGBUF];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[BUF_LEN];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:79:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((acpifd = open("/dev/acpi", O_RDONLY)) == -1) {
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[BUF_LEN];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/acpi.c:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[TZ_MIB_LEN];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/apm.c:44:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((ApmFD = open(APMDEV, O_RDONLY)) < 0)
data/ksysguard-5.19.5/ksysguardd/FreeBSD/cpuinfo.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[SYSCTL_ID_LEN];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/cpuinfo.c:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[SYSCTL_ID_LEN];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/cpuinfo.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[SYSCTL_ID_LEN];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/cpuinfo.c:551:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[FREQ_LEVEL_BUFFER];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/cpuinfo.c:552:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mid[SYSCTL_ID_LEN];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/diskstat.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char device[256];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/diskstat.c:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mntpnt[256];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/diskstat.c:62:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char device[1025];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/diskstat.c:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/diskstat.c:130:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/logfile.c:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[256];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/logfile.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/logfile.c:61:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fp = fopen(entry->path, "r")) != NULL)
data/ksysguard-5.19.5/ksysguardd/FreeBSD/logfile.c:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[1024];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/logfile.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[257];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/logfile.c:115:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if ((file = fopen(conf->path, "r")) == NULL) {
data/ksysguard-5.19.5/ksysguardd/FreeBSD/netdev.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/netdev.c:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/netdev.c:156:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/FreeBSD/stat.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IRQ_NAME], *cp;
data/ksysguard-5.19.5/ksysguardd/FreeBSD/stat.c:157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IRQ_NAME];
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IFNAMSIZ];
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAXNETDEVS*sizeof(struct ifreq)];
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	State[8];	/*  process state		  	*/
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	Command[PRCOMSIZ];/*  command name			*/
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	CmdLine[PRARGSZ];/*  command line		  	*/
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:80:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char result[8];
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[BUFSIZE];
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:174:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( (fd = open( buf, O_RDONLY )) < 0 ) {
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:315:26:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		updateProcess( (pid_t) atol( de->d_name ));
data/ksysguard-5.19.5/ksysguardd/Irix/cpu.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mname[50];
data/ksysguard-5.19.5/ksysguardd/Irix/cpu.c:84:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(mname,"cpu/cpu%d/user",i+1);
data/ksysguard-5.19.5/ksysguardd/Irix/cpu.c:87:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(mname,"cpu/cpu%d/sys",i+1);
data/ksysguard-5.19.5/ksysguardd/Irix/cpu.c:90:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(mname,"cpu/cpu%d/idle",i+1);
data/ksysguard-5.19.5/ksysguardd/Linux/Memory.c:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char MemInfoBuf[ MEMINFOBUFSIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/Memory.c:151:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = open( "/proc/meminfo", O_RDONLY ) ) < 0 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char status[ 16 ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tty[10];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[ 64 ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmdline[ 256 ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:191:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char userName[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cGroup[ 256 ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char macContext[ 256 ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[ BUFSIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[ TAGSIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char format[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:231:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tagformat[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:236:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = fopen( buf, "r" ) ) == 0 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:244:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( format, "%%%d[^\n]\n", (int)sizeof( buf ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:245:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( tagformat, "%%%ds", (int)sizeof( tag ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:273:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = fopen( buf, "r" ) ) == 0 )
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:317:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = fopen( buf, "r" ) ) != 0 )  {
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:330:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( ps->status, "running" );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:332:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( ps->status, "sleeping" );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:334:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( ps->status, "disk sleep" );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:336:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( ps->status, "zombie" );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:338:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( ps->status, "stopped" );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:340:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( ps->status, "paging" );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:342:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( ps->status, "Unknown: %c", status );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:346:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = fopen( buf, "r" ) ) == 0 )
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:372:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ps->name, ps->cmdline + processNameStartPosition, processNameLength);
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:416:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = fopen( buf, "r" ) ) != 0 )  {
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:432:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = fopen( buf, "r" ) ) != 0 )  {
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:452:13:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      pid = atol( entry->d_name );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:630:5:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
	if(vfork() == 0) {
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensorName [ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensorName [ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensorName [ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensorName [ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensorName [ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensorName [ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:121:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                int number = atoi(de->d_name + (sizeof("BAT")-1));
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [ 200 ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [ 200 ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [ 200 ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [ 200 ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:276:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [ 200 ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [ 200 ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:340:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:343:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int typeFile = open(filename, O_RDONLY);
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:359:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:362:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensorName [ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:371:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensorName [ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:383:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char th_ref[ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:393:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              int number = atoi(de->d_name + (sizeof("thermal_zone")-1));
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:405:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              int number = atoi(de->d_name+( sizeof("cooling_device")-1));
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:445:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char th_file[ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:446:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char input_buf[ 100 ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:448:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(th_file, O_RDONLY);
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [ 200 ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:513:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char th_file[ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input_buf[ OLD_TEMPERATURE_FILE_MAXLEN ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:526:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(th_file, O_RDONLY);
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [ 200 ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fan_state_file[ ACPIFILENAMELENGTHMAX ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:573:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input_buf[ OLD_FAN_STATE_FILE_MAXLEN ];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:576:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fan_state[4];
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:587:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fan_state_file, O_RDONLY);
data/ksysguard-5.19.5/ksysguardd/Linux/apm.c:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ApmBuf[ APMBUFSIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/apm.c:75:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = open( "/proc/apm", O_RDONLY ) ) < 0 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char format[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tag[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[ 256 ];
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:71:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( format, "%%%d[^:]: %%%d[^\n]\n", (int)sizeof( tag ) - 1,
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:90:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char cmdName[ 24 ];
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:106:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char freqName[sizeof(freqTemplate) + 3];
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:108:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                FILE *freqFd = fopen(freqName, "r");
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:186:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( ( fd = open( "/proc/cpuinfo", O_RDONLY ) ) < 0 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:214:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( new_buffer, CpuInfoBuf, n ); /* copy read data */
data/ksysguard-5.19.5/ksysguardd/Linux/diskstat.c:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char device[ 256 ];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstat.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mntpnt[ 256 ];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstat.c:62:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char device[ 1025 ];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstat.c:100:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char monitor[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:114:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( ( file = fopen( "/proc/diskstats", "r" ) ) == NULL )
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                     devname[DISKDEVNAMELEN];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                     sensorName[128];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:341:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char sensorName[ 128 ];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[DISKDEVNAMELEN];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:398:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ 17 ];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:494:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[DISKDEVNAMELEN];
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:495:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ 17 ];
data/ksysguard-5.19.5/ksysguardd/Linux/i8k.c:38:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char I8kBuf[ I8KBUFSIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/i8k.c:73:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = open( "/proc/i8k", O_RDONLY ) ) < 0 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.c:91:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[256];
data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.c:125:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char scnbuf[BUFFER_SIZE_LMSEN];
data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFFER_SIZE_LMSEN];
data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.c:200:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( input = fopen( "/etc/sensors.conf", "r" ) ) == NULL ) {
data/ksysguard-5.19.5/ksysguardd/Linux/loadavg.c:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char LoadAvgBuf[ LOADAVGBUFSIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/loadavg.c:80:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = open( "/proc/loadavg", O_RDONLY ) ) < 0 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/logfile.c:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[ 256 ];
data/ksysguard-5.19.5/ksysguardd/Linux/logfile.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char monitor[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/logfile.c:59:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( ( fp = fopen( entry->path, "r" ) ) != NULL ) {
data/ksysguard-5.19.5/ksysguardd/Linux/logfile.c:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/logfile.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[ 257 ];
data/ksysguard-5.19.5/ksysguardd/Linux/logfile.c:115:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( ( file = fopen( conf->path, "r" ) ) == NULL ) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:150:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char NetDevBuf[ NETDEVBUFSIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:151:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char NetDevWifiBuf[ NETDEVBUFSIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char format[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char devFormat[ 16 ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[ 64 ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:174:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( format, "%%%d[^\n]\n", (int)sizeof( buf ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:175:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( devFormat, "%%%ds", (int)sizeof( tag ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char format[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char devFormat[ 16 ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:298:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[ 64 ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:308:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( format, "%%%d[^\n]\n", (int)sizeof( buf ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:309:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( devFormat, "%%%ds", (int)sizeof( tag ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:327:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char mon[ MON_SIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:362:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char mon[ MON_SIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:388:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mon[ MON_SIZE ];
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:412:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open("/proc/net/dev", O_RDONLY)) > 0) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:440:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fd = open( "/proc/net/wireless", O_RDONLY ) ) < 0 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:467:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dev[ 64 ]; \
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:497:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dev[ 64 ]; \
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:518:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dev[ 64 ]; \
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dev[ 64 ]; \
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char local_addr[128];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char local_port[128];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remote_addr[128];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remote_port[128];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char state[128];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[128];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char state[128];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[256];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:113:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[1024];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:131:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[1024];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:153:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[1024];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:199:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((netstat = fopen("/proc/net/tcp", "r")) != NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:206:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((netstat = fopen("/proc/net/udp", "r")) != NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:211:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((netstat = fopen("/proc/net/unix", "r")) != NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:216:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((netstat = fopen("/proc/net/raw", "r")) != NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:242:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((netstat = fopen("/proc/net/tcp", "r")) != NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:247:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((netstat = fopen("/proc/net/udp", "r")) != NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:252:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((netstat = fopen("/proc/net/unix", "r")) != NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:256:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((netstat = fopen("/proc/net/raw", "r")) != NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:293:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((netstat = fopen(buffer, "r")) == NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[256];
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:373:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((file = fopen("/proc/net/unix", "r")) == NULL) {
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:45:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mdstatBuf[ MDSTATBUFSIZE ];	/* Buffer for /proc/mdstat */
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ArrayName[ ARRAYNAMELEN +1];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char attribute[40];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char attribute[40];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sensorName[128];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arrayDevice[ARRAYNAMELEN + 5 + 1];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char format[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lineBuf[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mdadmStatBuf[ MDADMSTATBUFSIZE ];	/* Buffer for mdadm --detail */
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:266:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( format, "%%%d[^\n]\n", (int)sizeof( lineBuf ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:320:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( ( fd = open( "/proc/mdstat", O_RDONLY ) ) < 0 )
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:357:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sensorName[128];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:485:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[100];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:486:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char status[100];
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:575:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				MyArray->ResyncingPercent = atoi(eq+1);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:585:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				MyArray->ResyncingPercent = atoi(current_word);
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sensorName[ 128 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sensorName[ 128 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:300:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char sensorName[ 128 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char format[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tagFormat[ 16 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:338:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tag[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:341:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( format, "%%%d[^\n]\n", (int)sizeof( buf ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:342:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tagFormat, "%%%ds", (int)sizeof( tag ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:347:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *stat = fopen("/proc/stat", "r");
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:416:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    stat = fopen("/proc/vmstat", "r");
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:483:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char format[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:484:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tagFormat[ 16 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:486:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tag[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:490:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( format, "%%%d[^\n]\n", (int)sizeof( buf ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:491:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tagFormat, "%%%ds", (int)sizeof( tag ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:493:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *stat = fopen("/proc/stat", "r");
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:522:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char cmdName[ 24 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:529:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( cmdName, "cpu/cpu%d/user", id );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:531:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( cmdName, "cpu/cpu%d/nice", id );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:533:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( cmdName, "cpu/cpu%d/sys", id );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:535:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( cmdName, "cpu/cpu%d/TotalLoad", id );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:537:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( cmdName, "cpu/cpu%d/idle", id );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:539:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( cmdName, "cpu/cpu%d/wait", id );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:570:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char cmdName[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:593:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf( cmdName, "cpu/interrupts/int%02d", i );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:604:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	stat = fopen("/proc/vmstat", "r");
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:1012:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[DISKDEVNAMELEN];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:1013:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ 17 ];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:1051:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[DISKDEVNAMELEN];
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:1052:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ 17 ];
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char UptimeBuf[ UPTIMEBUFSIZE ];	/* Buffer for /proc/uptime */
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char format[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:58:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( format, "%%%d[^\n]\n", (int)sizeof( buf ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char format[ 32 ];
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ 1024 ];
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:80:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( format, "%%%d[^\n]\n", (int)sizeof( buf ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:103:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( ( fd = open( "/proc/uptime", O_RDONLY ) ) < 0 )
data/ksysguard-5.19.5/ksysguardd/NetBSD/ProcessList.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char status[16];
data/ksysguard-5.19.5/ksysguardd/NetBSD/ProcessList.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/ksysguard-5.19.5/ksysguardd/NetBSD/ProcessList.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[256];
data/ksysguard-5.19.5/ksysguardd/NetBSD/ProcessList.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 	char userName[32];
data/ksysguard-5.19.5/ksysguardd/NetBSD/ProcessList.c:220:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(ps->cmdline, "????");
data/ksysguard-5.19.5/ksysguardd/NetBSD/apm.c:45:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((ApmFD = open(APMDEV, O_RDONLY)) < 0)
data/ksysguard-5.19.5/ksysguardd/NetBSD/diskstat.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device[256];
data/ksysguard-5.19.5/ksysguardd/NetBSD/diskstat.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mntpnt[256];
data/ksysguard-5.19.5/ksysguardd/NetBSD/diskstat.c:52:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char device[1025];
data/ksysguard-5.19.5/ksysguardd/NetBSD/diskstat.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/NetBSD/diskstat.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/NetBSD/logfile.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ksysguard-5.19.5/ksysguardd/NetBSD/logfile.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char monitor[1024];
data/ksysguard-5.19.5/ksysguardd/NetBSD/logfile.c:62:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fp = fopen(entry->path, "r")) != NULL)
data/ksysguard-5.19.5/ksysguardd/NetBSD/logfile.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/ksysguard-5.19.5/ksysguardd/NetBSD/logfile.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[257];
data/ksysguard-5.19.5/ksysguardd/NetBSD/logfile.c:118:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((file = fopen(conf->path, "r")) == NULL) {
data/ksysguard-5.19.5/ksysguardd/NetBSD/netdev.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[32];
data/ksysguard-5.19.5/ksysguardd/NetBSD/netdev.c:113:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(nv->name, sdl->sdl_data, sdl->sdl_nlen);
data/ksysguard-5.19.5/ksysguardd/NetBSD/netdev.c:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/ksysguard-5.19.5/ksysguardd/OpenBSD/ProcessList.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char status[16];
data/ksysguard-5.19.5/ksysguardd/OpenBSD/ProcessList.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/ksysguard-5.19.5/ksysguardd/OpenBSD/ProcessList.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[256];
data/ksysguard-5.19.5/ksysguardd/OpenBSD/ProcessList.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 	char userName[32];
data/ksysguard-5.19.5/ksysguardd/Solaris/LoadAvg.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cmdName[ 24 ];
data/ksysguard-5.19.5/ksysguardd/Solaris/LoadAvg.c:87:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( cmdName, "cpu/cpu%d/user", id );
data/ksysguard-5.19.5/ksysguardd/Solaris/LoadAvg.c:89:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( cmdName, "cpu/cpu%d/sys", id );
data/ksysguard-5.19.5/ksysguardd/Solaris/LoadAvg.c:91:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( cmdName, "cpu/cpu%d/TotalLoad", id );
data/ksysguard-5.19.5/ksysguardd/Solaris/LoadAvg.c:93:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( cmdName, "cpu/cpu%d/idle", id );
data/ksysguard-5.19.5/ksysguardd/Solaris/LoadAvg.c:95:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( cmdName, "cpu/cpu%d/wait", id );
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:261:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	mon[128];
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	result[8];
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[BUFSIZE];
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:173:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( (fd = open( buf, O_RDONLY )) < 0 ) {
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:288:26:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		updateProcess( (pid_t) atol( de->d_name ));
data/ksysguard-5.19.5/ksysguardd/Tru64/Memory.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dummy[128];
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	mon[128];
data/ksysguard-5.19.5/ksysguardd/conf.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[ 2048 ];
data/ksysguard-5.19.5/ksysguardd/conf.c:62:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( config = fopen( filename, "r" ) ) == NULL ) {
data/ksysguard-5.19.5/ksysguardd/ksysguardd.c:111:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        SocketPort = atoi( optarg );
data/ksysguard-5.19.5/ksysguardd/ksysguardd.c:150:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( file = fopen( LockFile, "w+" ) ) != NULL ) {
data/ksysguard-5.19.5/ksysguardd/ksysguardd.c:229:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open("/dev/null", O_RDWR, 0);
data/ksysguard-5.19.5/ksysguardd/ksysguardd.c:409:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmdBuf[ CMDBUFSIZE ];
data/ksysguard-5.19.5/plugins/process/network/helper/Capture.cpp:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorBuffer[PCAP_ERRBUF_SIZE];
data/ksysguard-5.19.5/plugins/process/network/helper/ConnectionMapping.cpp:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[100] = { "\0" };
data/ksysguard-5.19.5/gui/ksysguard.cpp:554:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while( read( initpipe[ 0 ], &c, 1 ) < 0 );
data/ksysguard-5.19.5/ksysguardd/Command.c:132:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(!cmd || !(cmd->command = (char*)malloc( strlen( command ) + 1 ))) {
data/ksysguard-5.19.5/ksysguardd/Command.c:172:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(!cmd || !(cmd->command = (char*)malloc( strlen( command ) + 1 ))) {
data/ksysguard-5.19.5/ksysguardd/Command.c:180:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cmd->type = (char*)malloc( strlen( type ) + 1 );
data/ksysguard-5.19.5/ksysguardd/Command.c:199:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cmd->command = (char*)malloc( strlen( command ) + 2 );
data/ksysguard-5.19.5/ksysguardd/Command.c:207:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cmd->command[ strlen( command ) ] = '?';
data/ksysguard-5.19.5/ksysguardd/Command.c:208:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cmd->command[ strlen( command ) + 1 ] = '\0';
data/ksysguard-5.19.5/ksysguardd/Command.c:237:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf = (char*)malloc( strlen( command ) + 2 );
data/ksysguard-5.19.5/ksysguardd/Command.c:244:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat( buf, "?" );
data/ksysguard-5.19.5/ksysguardd/Command.c:309:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strcmp( cmd->command, c + strlen( "test " ) ) == 0 ) {
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:229:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while ((arg_fix += strlen(arg_fix)) < args + len - 1)
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:338:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncasecmp(cmd + 12, statuses[idx], strlen(cmd + 12) - 1) == 0)
data/ksysguard-5.19.5/ksysguardd/FreeBSD/ProcessList.c:349:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncasecmp(cmd + 12, statuses[idx], strlen(cmd + 12) - 1) == 0)
data/ksysguard-5.19.5/ksysguardd/FreeBSD/diskstat.c:66:5:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    sscanf(cmd, "partitions%1024s", device);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/diskstat.c:182:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                strncpy(disk_info->mntpnt, "/root", 6);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/logfile.c:111:5:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    sscanf(cmd, "%*s %256s", name);
data/ksysguard-5.19.5/ksysguardd/FreeBSD/stat.c:115:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
			strncpy(cp, "IRQ", 3);
data/ksysguard-5.19.5/ksysguardd/Irix/NetDev.c:203:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(NetDevs[i].name,ifc.ifc_req[i].ifr_name, IFNAMSIZ);
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:47:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define KDEINITLEN strlen("kdeinit: ")
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:127:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy( string, " " );
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:197:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy (ps->State,lwpStateName( psinfo ),8);
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:226:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ps->Command,psinfo.pr_fname,PRCOMSIZ);
data/ksysguard-5.19.5/ksysguardd/Irix/ProcessList.c:229:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ps->CmdLine,psinfo.pr_psargs,PRARGSZ);
data/ksysguard-5.19.5/ksysguardd/Linux/Memory.c:57:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sscanf( b + strlen( key ), ": %llu", val );
data/ksysguard-5.19.5/ksysguardd/Linux/Memory.c:158:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  n = read( fd, MemInfoBuf, MEMINFOBUFSIZE - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:222:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy( str, " " );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:253:7:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
      sscanf( buf, "%*s %63s", ps->name );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:356:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while( (c = fgetc(fd)) != EOF && i < sizeof(ps->cmdline)-3) {
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:396:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen( ps->cmdline + KDEINITLEN );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:400:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy( ps->name, ps->cmdline + KDEINITLEN, len );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:406:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( ps->userName, uName, sizeof( ps->userName ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/ProcessList.c:423:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy( ps->cGroup, &buf[3], sizeof( ps->cGroup ) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:351:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int readBytes = read( typeFile, buffer, bufferSize - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:452:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int read_bytes = read( fd, input_buf, sizeof(input_buf) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:534:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	read_bytes = read( fd, input_buf, sizeof(input_buf) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:596:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	read_bytes = read( fd, input_buf, sizeof(input_buf) - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/acpi.c:604:2:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	sscanf(input_buf, "status: %2s", fan_state);
data/ksysguard-5.19.5/ksysguardd/Linux/apm.c:83:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  n = read( fd, ApmBuf, APMBUFSIZE - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:81:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p = tag + strlen( tag ) - 1;
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:141:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cibp = CpuInfoBuf + strlen( CpuInfoBuf );
data/ksysguard-5.19.5/ksysguardd/Linux/cpuinfo.c:200:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t len = read( fd, CpuInfoBuf + n, CpuInfoBufSize - 1 - n );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstat.c:66:5:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    sscanf( cmd, "partitions%1024s", device );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstat.c:235:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy( disk_info->device, mnt_info->mnt_fsname, sizeof( disk_info->device ) );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstat.c:238:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy( disk_info->mntpnt, mnt_info->mnt_dir, sizeof( disk_info->mntpnt ) );
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:404:5:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	if(sscanf( cmd, "disk/%[^_]_(%d:%d)/Rate/%16s", devname, &major, &minor, name ) == 4) {
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:434:10:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	else if(sscanf( cmd, "disk/%[^_]_(%d:%d)/Delta/%16s", devname, &major, &minor, name ) == 4) {
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:468:10:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	else if(sscanf( cmd, "disk/%[^_]_(%d:%d)/%16s", devname, &major, &minor, name ) == 4) {
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:499:5:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	if(sscanf( cmd, "disk/%[^_]_(%d:%d)/Rate/%16s", devname, &major, &minor, name ) == 4) {
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:501:10:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	else if(sscanf( cmd, "disk/%[^_]_(%d:%d)/Delta/%16s", devname, &major, &minor, name ) == 4) {
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:503:10:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	else if(sscanf( cmd, "disk/%[^_]_(%d:%d)/%16s", devname, &major, &minor, name ) == 4) {
data/ksysguard-5.19.5/ksysguardd/Linux/diskstats.c:520:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	name[ strlen( name ) - 1 ] = '\0';
data/ksysguard-5.19.5/ksysguardd/Linux/i8k.c:80:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( ( n = read( fd, I8kBuf, I8KBUFSIZE - 1 ) ) == I8KBUFSIZE - 1 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.c:76:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int end = strlen(key.fullName)-1;
data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.c:161:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      p->fullName = (char*)malloc( strlen( "lmsensors/" ) +
data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.c:162:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                   strlen( scnbuf ) + 1 +
data/ksysguard-5.19.5/ksysguardd/Linux/lmsensors.c:163:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                   strlen( label ) + 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/loadavg.c:88:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  n = read( fd, LoadAvgBuf, LOADAVGBUFSIZE - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/logfile.c:110:3:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
  sscanf( cmd, "%*s %256s", name );
data/ksysguard-5.19.5/ksysguardd/Linux/logfile.c:131:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy( entry->name, conf->name, 256 );
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:183:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			netDevBufP += strlen(buf) + 1; /* move netDevBufP to next line */
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:188:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			netDevBufP += strlen(buf) + 1; /* move netDevBufP to next line */
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:228:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			netDevWifiBufP += strlen(buf) + 1; /* move netDevWifiBufP to next line */
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:233:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			netDevWifiBufP += strlen(buf) + 1; /* move netDevWifiBufP to next line */
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:315:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    netDevBufP += strlen( buf ) + 1;  /* move netDevBufP to next line */
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:320:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    netDevBufP += strlen( buf ) + 1;  /* move netDevBufP to next line */
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:329:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy( NetDevs[ i ].name, tag, sizeof( NetDevs[ i ].name ) );
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:352:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    netDevWifiBufP += strlen( buf ) + 1;  /* move netDevWifiBufP to next line */
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:357:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    netDevWifiBufP += strlen( buf ) + 1;  /* move netDevWifiBufP to next line */
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:413:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = read(fd, NetDevBuf, NETDEVBUFSIZE - 1);
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:443:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  } else if ( ( n = read( fd, NetDevWifiBuf, NETDEVBUFSIZE - 1 ) ) == NETDEVBUFSIZE - 1 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:472:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( dev, beg + 1, end - beg - 1 ); \
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:502:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( dev, beg + 1, end - beg - 1 ); \
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:523:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( dev, beg + 1, end - beg - 1 ); \
data/ksysguard-5.19.5/ksysguardd/Linux/netdev.c:548:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( dev, beg + 1, end - beg - 1 ); \
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:123:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buffer, service->s_name, sizeof(buffer)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:145:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buffer, host->h_name, sizeof(buffer)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:163:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buffer, protocol->p_name, sizeof(buffer)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:313:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(socket_info->local_addr, get_host_name(local_addr), sizeof(socket_info->local_addr)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:315:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(socket_info->remote_addr, get_host_name(remote_addr), sizeof(socket_info->remote_addr)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:319:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(socket_info->local_port, get_serv_name(local_port, "tcp"), sizeof(socket_info->local_port)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:321:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(socket_info->remote_port, get_serv_name(remote_port, "tcp"), sizeof(socket_info->remote_port)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:324:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(socket_info->state, conn_state[state], sizeof(socket_info->state));
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:332:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(socket_info->local_port, get_serv_name(local_port, "udp"), sizeof(socket_info->local_port)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:334:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(socket_info->remote_port, get_serv_name(remote_port, "udp"), sizeof(socket_info->remote_port)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:337:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(socket_info->state, conn_state[state], sizeof(socket_info->state)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:346:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(socket_info->local_port, get_proto_name(local_port), sizeof(socket_info->local_port)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:348:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(socket_info->remote_port, get_proto_name(remote_port), sizeof(socket_info->remote_port)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:385:18:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			int matches = sscanf(buffer, "%*x: %d %*d %*d %d %d %d %255s",
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:396:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(unix_info->type, raw_type[type], sizeof(unix_info->type)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:398:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(unix_info->state, raw_state[state], sizeof(unix_info->state)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/netstat.c:401:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(unix_info->path, path, sizeof(unix_info->path)-1);
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:108:7:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	if ( sscanf(cmd, "SoftRaid/%[^/]/%39s", key.ArrayName, attribute) == 2 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:163:7:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	if ( sscanf(cmd, "SoftRaid/%[^/]/%39s", key.ArrayName, attribute) == 2 ) {
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:258:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nbytes = read( fd[0], mdadmStatBuf, MDADMSTATBUFSIZE-1 );
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:270:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		mdadmStatBufP += strlen(lineBuf) + 1;  /* move mdadmStatBufP to next line */
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:323:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	n = read( fd, mdstatBuf, MDSTATBUFSIZE - 1 );
data/ksysguard-5.19.5/ksysguardd/Linux/softraid.c:340:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(key.ArrayName, array_name, array_name_length);
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:127:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf = buf + strlen( label ) + 1;
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:184:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf = buf + strlen( label ) + 1;
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:210:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p = buf + strlen( "disk_io: " );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:984:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sscanf( cmd + strlen( "cpu/interrupts/int" ), "%d", &id );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:991:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sscanf( cmd + strlen( "cpu/interrupt/int" ), "%d", &id );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:1016:2:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	sscanf( cmd, "disk/%[^_]_(%d:%d)/%16s", devname, &major, &minor, name );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:1055:2:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	sscanf( cmd, "disk/%[^_]_(%d:%d)/%16s", devname, &major, &minor, name );
data/ksysguard-5.19.5/ksysguardd/Linux/stat.c:1067:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	name[ strlen( name ) - 1 ] = '\0';
data/ksysguard-5.19.5/ksysguardd/Linux/uptime.c:106:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	n = read( fd, UptimeBuf, UPTIMEBUFSIZE - 1 );
data/ksysguard-5.19.5/ksysguardd/NetBSD/diskstat.c:56:2:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	sscanf(cmd, "partitions%1024s", device);
data/ksysguard-5.19.5/ksysguardd/NetBSD/diskstat.c:155:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
				strncpy(disk_info->mntpnt, "/root", 6);
data/ksysguard-5.19.5/ksysguardd/NetBSD/logfile.c:114:2:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	sscanf(cmd, "%*s %256s", name);
data/ksysguard-5.19.5/ksysguardd/NetBSD/netdev.c:149:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  cmdExecutor read, inform;
data/ksysguard-5.19.5/ksysguardd/NetBSD/netdev.c:207:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  q = p+strlen(p)-1;
data/ksysguard-5.19.5/ksysguardd/NetBSD/netdev.c:243:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			  opTable[j].read,
data/ksysguard-5.19.5/ksysguardd/Solaris/NetDev.c:372:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ptr = name + strlen( name ) - 1;
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:127:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy( string, " " );
data/ksysguard-5.19.5/ksysguardd/Solaris/ProcessList.c:177:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if( read( fd, &psinfo, sizeof( psinfo_t )) != sizeof( psinfo_t )) {
data/ksysguard-5.19.5/ksysguardd/Tru64/NetDev.c:351:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ptr = name + strlen( name ) - 1;
data/ksysguard-5.19.5/ksysguardd/conf.c:92:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( ( line[ 0 ] == '#') || ( strlen( line ) == 0 ) )
data/ksysguard-5.19.5/ksysguardd/conf.c:98:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( line[ strlen( line ) - 1 ] == '\n' )
data/ksysguard-5.19.5/ksysguardd/conf.c:99:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      line[ strlen( line ) - 1 ] = '\0';
data/ksysguard-5.19.5/ksysguardd/ksysguardd.c:223:7:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
      umask( 0 );
data/ksysguard-5.19.5/ksysguardd/ksysguardd.c:248:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int result = read( fd, &c, 1 );

ANALYSIS SUMMARY:

Hits = 588
Lines analyzed = 37037 in approximately 1.77 seconds (20922 lines/second)
Physical Source Lines of Code (SLOC) = 24863
Hits@level = [0] 762 [1] 121 [2] 311 [3]   2 [4] 154 [5]   0
Hits@level+ = [0+] 1350 [1+] 588 [2+] 467 [3+] 156 [4+] 154 [5+]   0
Hits/KSLOC@level+ = [0+] 54.2976 [1+] 23.6496 [2+] 18.7829 [3+] 6.27438 [4+] 6.19394 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.