Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libfixbuf-2.4.0+ds/include/fixbuf/private.h
Examining data/libfixbuf-2.4.0+ds/include/fixbuf/public.h
Examining data/libfixbuf-2.4.0+ds/include/fixbuf/autoinc.h
Examining data/libfixbuf-2.4.0+ds/src/fbconnspec.c
Examining data/libfixbuf-2.4.0+ds/src/fbsflow.c
Examining data/libfixbuf-2.4.0+ds/src/fbnetflow.c
Examining data/libfixbuf-2.4.0+ds/src/fbtemplate.c
Examining data/libfixbuf-2.4.0+ds/src/fbcollector.c
Examining data/libfixbuf-2.4.0+ds/src/fbuf.c
Examining data/libfixbuf-2.4.0+ds/src/fbexporter.c
Examining data/libfixbuf-2.4.0+ds/src/ipfixDump.c
Examining data/libfixbuf-2.4.0+ds/src/fblistener.c
Examining data/libfixbuf-2.4.0+ds/src/fbsession.c
Examining data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c
Examining data/libfixbuf-2.4.0+ds/src/fbxml.c
Examining data/libfixbuf-2.4.0+ds/src/fbcollector.h
Examining data/libfixbuf-2.4.0+ds/src/fbinfomodel.c

FINAL RESULTS:

data/libfixbuf-2.4.0+ds/src/ipfixDump.c:190:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(stderr, ("%s: Replace --yaf with --element-file and"
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:59:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    __attribute__((format (printf, 2, 3)));
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:124:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(fp, format, args);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:253:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(frac_str, sizeof(frac_str), ".%0*" PRIu64, frac_places, frac);
data/libfixbuf-2.4.0+ds/include/fixbuf/private.h:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    name[MAX_GROUP_NAME];
data/libfixbuf-2.4.0+ds/include/fixbuf/private.h:107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            privgroup[MAX_GROUP_NAME + 2];
data/libfixbuf-2.4.0+ds/include/fixbuf/private.h:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            recv_privgroup[MAX_GROUP_NAME + 2];
data/libfixbuf-2.4.0+ds/src/fbcollector.c:453:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fp = fopen(path, "r");
data/libfixbuf-2.4.0+ds/src/fbcollector.c:781:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(collector->peer.so), from,
data/libfixbuf-2.4.0+ds/src/fbcollector.c:802:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(udp->peer.so), from, (fromlen > sizeof(udp->peer)) ?
data/libfixbuf-2.4.0+ds/src/fbcollector.c:993:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(collector->peer.so), peer,
data/libfixbuf-2.4.0+ds/src/fbcollector.c:1293:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(collector->peer.so), peer,
data/libfixbuf-2.4.0+ds/src/fbcollector.c:1336:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char grp[MAX_GROUP_NAME];
data/libfixbuf-2.4.0+ds/src/fbcollector.c:1471:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sender[MAX_GROUP_NAME];
data/libfixbuf-2.4.0+ds/src/fbcollector.c:1855:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(collector->peer.so), address,
data/libfixbuf-2.4.0+ds/src/fbexporter.c:141:31:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        exporter->stream.fp = fopen(exporter->spec.path, "w");
data/libfixbuf-2.4.0+ds/src/fbexporter.c:273:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(exporter->stream.buffer, msgbase, msglen);
data/libfixbuf-2.4.0+ds/src/fbexporter.c:964:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            grp[MAX_GROUP_NAME];
data/libfixbuf-2.4.0+ds/src/fbexporter.c:968:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sender[MAX_GROUP_NAME];
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:165:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(revname, FB_IE_REVERSE_STR, FB_IE_REVERSE_STRLEN);
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:200:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(found, model_ie, sizeof(*found));
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                revname[FB_IE_REVERSE_BUFSZ];
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:546:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                name[500];
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:547:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                description[4096];
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:91:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ru16_t16val, ru16_t16ptr, sizeof(uint16_t)); \
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:99:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ru16_t16val, ru16_t16ptr, sizeof(uint16_t)); \
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:106:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ru16_t16ptr, &ru16_t16val, sizeof(uint16_t)); \
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:126:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ru32_t32val, ru32_t32ptr, sizeof(uint32_t));    \
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:135:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ru32_t32val, ru32_t32ptr, sizeof(uint32_t)); \
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:142:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ru32_t32ptr, &ru32_t32val, sizeof(uint32_t)); \
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:1310:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(msgOsetPtr, &(transState->sysUpTime),
data/libfixbuf-2.4.0+ds/src/fbsflow.c:99:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ru16_t16val, ru16_t16ptr, sizeof(uint16_t)); \
data/libfixbuf-2.4.0+ds/src/fbsflow.c:107:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ru16_t16val, ru16_t16ptr, sizeof(uint16_t)); \
data/libfixbuf-2.4.0+ds/src/fbsflow.c:114:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ru16_t16ptr, &ru16_t16val, sizeof(uint16_t)); \
data/libfixbuf-2.4.0+ds/src/fbsflow.c:134:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ru32_t32val, ru32_t32ptr, sizeof(uint32_t));    \
data/libfixbuf-2.4.0+ds/src/fbsflow.c:143:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ru32_t32val, ru32_t32ptr, sizeof(uint32_t)); \
data/libfixbuf-2.4.0+ds/src/fbsflow.c:150:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ru32_t32ptr, &ru32_t32val, sizeof(uint32_t)); \
data/libfixbuf-2.4.0+ds/src/fbsflow.c:569:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sflowrec->sourceMacAddress, data, 6);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:571:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sflowrec->destinationMacAddress, data, 6);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:651:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sflowrec->sourceIPv6Address, &(iph->ip6_src), 16);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:652:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sflowrec->destinationIPv6Address, &(iph->ip6_dst), 16);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:766:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sflowrec->sourceMacAddress, data, 6);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:769:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sflowrec->destinationMacAddress, data, 6);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:795:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sflowrec->sourceIPv6Address, data, 16);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:797:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sflowrec->destinationIPv6Address, data, 16);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:1085:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(sflowrec->nextHopIPv6Address, dataBuf+4, 16);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:1111:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(sflowrec->bgpNextHopIPv6Address, dataBuf+4, 16);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:1224:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&sflowrec->inoct, dataBuf+24, 8);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:1232:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&sflowrec->outoct, dataBuf+56, 8);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:1334:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sflowrec.collectorIPv6Address, msgOsetPtr, 16);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:1380:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dataBuf, transState->ipfixBuffer, msglen);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:1526:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(sflowctr.ipv6, sflowrec.collectorIPv6Address, 16);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:1544:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(sflowctr.ipv6, sflowrec.collectorIPv6Address, 16);
data/libfixbuf-2.4.0+ds/src/fbsflow.c:1589:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dataBuf, transState->ipfixBuffer, msglen);
data/libfixbuf-2.4.0+ds/src/fbuf.c:519:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&_x, _ptr_, sizeof(uint16_t));       \
data/libfixbuf-2.4.0+ds/src/fbuf.c:525:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&_x, _ptr_, sizeof(uint32_t));       \
data/libfixbuf-2.4.0+ds/src/fbuf.c:531:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_ptr_, &_x, sizeof(uint16_t));       \
data/libfixbuf-2.4.0+ds/src/fbuf.c:536:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_ptr_, &_x, sizeof(uint32_t));       \
data/libfixbuf-2.4.0+ds/src/fbuf.c:785:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*dp, sp, d_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:788:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp, sp + (s_len - d_len), d_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:790:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp, sp, d_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:795:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp + (d_len - s_len), sp, s_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:797:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp, sp, s_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:853:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*dp, sp, d_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:856:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp, sp, d_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:858:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp, sp + (s_len - d_len), d_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:863:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp, sp, s_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:865:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp + (d_len - s_len), sp, s_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:900:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*dp, sp, d_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:904:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp, sp + (s_len - d_len), d_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:906:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp, sp, d_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:911:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp + (d_len - s_len), sp, s_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:913:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dp, sp, s_len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:952:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sv, sp, sizeof(fbVarfield_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:972:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (sv->len && sv->buf) memcpy(*dp, sv->buf, sv->len);
data/libfixbuf-2.4.0+ds/src/fbuf.c:1022:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*dp, dv, sizeof(fbVarfield_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:1354:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(basicList, src, sizeof(fbBasicList_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:1517:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(basicList, *dst, sizeof(fbBasicList_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:1704:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*dst, basicList, sizeof(fbBasicList_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:1735:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(subTemplateList, src, sizeof(fbSubTemplateList_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:1859:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(subTemplateList, *dst, sizeof(fbSubTemplateList_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:2041:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*dst, subTemplateList, sizeof(fbSubTemplateList_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:2074:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(multiList, src, sizeof(fbSubTemplateMultiList_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:2209:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(multiList, *dst, sizeof(fbSubTemplateMultiList_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:2407:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*dst, multiList, sizeof(fbSubTemplateMultiList_t));
data/libfixbuf-2.4.0+ds/src/fbuf.c:2961:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(fbuf->setbase + 2, &setlen, sizeof(setlen));
data/libfixbuf-2.4.0+ds/src/fbuf.c:2991:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    fbSessionSetGroup(fbuf->session, (char *)groups[0]);
data/libfixbuf-2.4.0+ds/src/fbuf.c:3452:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(fbuf->msgbase + 2, &msglen, sizeof(msglen));
data/libfixbuf-2.4.0+ds/src/fbuf.c:4593:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newDataPtr, basicList->dataPtr, basicList->dataLength);
data/libfixbuf-2.4.0+ds/src/fbuf.c:4842:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newDataPtr, sTL->dataPtr, sTL->dataLength.length);
data/libfixbuf-2.4.0+ds/src/fbuf.c:4948:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newFirstEntry, sTML->firstEntry,
data/libfixbuf-2.4.0+ds/src/fbuf.c:5071:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newDataPtr, entry->dataPtr, entry->dataLength);
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:307:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            infile = fopen(inspec, "r");
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:329:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            outfile = fopen(outspec, "w");
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:484:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[UINT16_MAX];
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:511:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(name, (char *)var.buf, len);
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:515:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(name, (char *)b, len);
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:570:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&rec.ie_pen, b, ie->len);
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:572:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy((((uint8_t *)&rec.ie_pen)
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:607:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&rec.ie_range_begin, b, ie->len);
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:609:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy((((uint8_t *)&rec.ie_range_begin)
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:621:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&rec.ie_range_end, b, ie->len);
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:623:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy((((uint8_t *)&rec.ie_range_end)
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:215:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char frac_str[32] = "";
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:392:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dt_str[25];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:393:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prefix[PREFIX_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:459:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_prefix[PREFIX_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_template[TMPL_NAME_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:491:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prefix[PREFIX_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:492:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_prefix[PREFIX_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:493:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_template[TMPL_NAME_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:494:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_semantic[SEMANTIC_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:531:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prefix[PREFIX_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:532:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_prefix[PREFIX_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_semantic[SEMANTIC_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:568:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                     prefix[PREFIX_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:569:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                     str_prefix[PREFIX_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:570:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                     str_elem[ELEMENT_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:571:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                     str_semantic[SEMANTIC_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:620:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(((uint8_t *)(&u64)) + (8 - ie->len), val, ie->len);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:622:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&u64, val, ie->len);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:641:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(((uint8_t *)(&i64)) + (8 - ie->len), val, ie->len);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:643:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&i64, val, ie->len);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:666:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char ip_buf[40];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:752:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[UINT16_MAX + 1];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:757:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, val, len);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:767:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(((uint8_t *)(&u64)) + (8 - ie->len), val, ie->len);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:769:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&u64, val, ie->len);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:790:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char charbuf[2 * UINT16_MAX + 1];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:825:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_prefix[PREFIX_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:826:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_elem[ELEMENT_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:827:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_tmpl[TMPL_NAME_BUFSIZ];
data/libfixbuf-2.4.0+ds/src/fbcollector.c:440:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(path) == 1) && (path[0] == '-'))
data/libfixbuf-2.4.0+ds/src/fbcollector.c:579:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read(collector->rip, &byte, sizeof(byte));
data/libfixbuf-2.4.0+ds/src/fbcollector.c:617:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        rc = read(collector->stream.fd, msgbase, rrem);
data/libfixbuf-2.4.0+ds/src/fbcollector.c:651:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        rc = read(collector->stream.fd, msgbase, rrem);
data/libfixbuf-2.4.0+ds/src/fbcollector.c:1410:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy( grp, spread->groups[i].name, sizeof( grp) - 2 );
data/libfixbuf-2.4.0+ds/src/fbcollector.c:1411:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat( grp, "T" );
data/libfixbuf-2.4.0+ds/src/fbconnspec.c:259:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(pwbuf, (const char *)vpwstr, pwsz);
data/libfixbuf-2.4.0+ds/src/fbconnspec.c:260:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(pwbuf);
data/libfixbuf-2.4.0+ds/src/fbconnspec.c:466:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy( spec->groups[n++].name, *g, MAX_GROUP_NAME-1 );
data/libfixbuf-2.4.0+ds/src/fbexporter.c:127:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(exporter->spec.path) == 1) &&
data/libfixbuf-2.4.0+ds/src/fbexporter.c:1000:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(grp, spread->groups[i].name, sizeof(grp) - 2);
data/libfixbuf-2.4.0+ds/src/fbexporter.c:1001:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(grp, "T");
data/libfixbuf-2.4.0+ds/src/fbexporter.c:1268:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(spread->groups_to_send[n].name, *g, MAX_GROUP_NAME-1);
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:158:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(revname + FB_IE_REVERSE_STRLEN, fwdname, revname_sz - FB_IE_REVERSE_STRLEN - 1);
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:518:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    rec.ie_name.len = strlen(model_ie->ref.name);
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:521:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        rec.ie_desc.len = strlen(model_ie->description);
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:559:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(name, (char *)rec->ie_name.buf, len);
data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:564:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(description, (char *)rec->ie_desc.buf, len);
data/libfixbuf-2.4.0+ds/src/fblistener.c:830:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read(pfd->fd, &byte, sizeof(byte));
data/libfixbuf-2.4.0+ds/src/fblistener.c:916:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read(pfd->fd, &byte, sizeof(byte));
data/libfixbuf-2.4.0+ds/src/fblistener.c:1251:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                            read(cpfd->fd, &byte, sizeof(byte));
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:372:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        rc = read(collector->stream.fd, bufOffset, 4);
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:387:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        rc = read(collector->stream.fd, bufOffset, 12);
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:426:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            rc = read(collector->stream.fd, bufOffset, 4);
data/libfixbuf-2.4.0+ds/src/fbnetflow.c:451:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            rc = read(collector->stream.fd, bufOffset, setLength);
data/libfixbuf-2.4.0+ds/src/fbsession.c:981:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(session->all_groups[loop].name)) == 0)
data/libfixbuf-2.4.0+ds/src/fbtemplate.c:398:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    metadata_rec->template_name.len = strlen(name);
data/libfixbuf-2.4.0+ds/src/fbtemplate.c:403:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        metadata_rec->template_description.len = strlen(description);
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:304:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((strlen(inspec) == 1) && inspec[0] == '-') {
data/libfixbuf-2.4.0+ds/src/ipfixDump.c:326:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((strlen(outspec) == 1) && outspec[0] == '-') {
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:272:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "octet", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:275:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "uint8", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:278:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "uint16", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:281:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "uint32", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:284:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "uint64", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:287:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "int8", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:290:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "int16", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:293:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "int32", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:296:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "int64", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:299:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "float32", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:302:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "float64", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:305:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "bool", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:308:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "mac", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:311:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "string", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:314:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "sec", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:317:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "millisec", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:320:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "microsec", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:323:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "nanosec", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:326:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "ipv4", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:329:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "ipv6", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:332:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "bl", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:335:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "stl", dt_str_bufsiz);
data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:338:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(dt_str, "stml", dt_str_bufsiz);

ANALYSIS SUMMARY:

Hits = 186
Lines analyzed = 26051 in approximately 0.79 seconds (32904 lines/second)
Physical Source Lines of Code (SLOC) = 14446
Hits@level = [0] 145 [1]  53 [2] 129 [3]   0 [4]   4 [5]   0
Hits@level+ = [0+] 331 [1+] 186 [2+] 133 [3+]   4 [4+]   4 [5+]   0
Hits/KSLOC@level+ = [0+] 22.9129 [1+] 12.8755 [2+] 9.2067 [3+] 0.276893 [4+] 0.276893 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.