Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libopenmpt-0.4.11/build/svn_version/svn_version.h
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_test.cpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_ext_impl.cpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt.h
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_stream_callbacks_buffer.h
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_version.h
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt.hpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_stream_callbacks_file.h
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.hpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_ext.hpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_ext.h
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_internal.h
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_stream_callbacks_fd.h
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_ext_impl.hpp
Examining data/libopenmpt-0.4.11/libopenmpt/libopenmpt_config.h
Examining data/libopenmpt-0.4.11/soundlib/Snd_defs.h
Examining data/libopenmpt-0.4.11/soundlib/MixerSettings.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_669.cpp
Examining data/libopenmpt-0.4.11/soundlib/ModSample.cpp
Examining data/libopenmpt-0.4.11/soundlib/OPL.cpp
Examining data/libopenmpt-0.4.11/soundlib/SampleFormatMP3.cpp
Examining data/libopenmpt-0.4.11/soundlib/SampleIO.h
Examining data/libopenmpt-0.4.11/soundlib/SampleFormatMediaFoundation.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_c67.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_stm.cpp
Examining data/libopenmpt-0.4.11/soundlib/Dither.cpp
Examining data/libopenmpt-0.4.11/soundlib/Snd_flt.cpp
Examining data/libopenmpt-0.4.11/soundlib/SampleFormatVorbis.cpp
Examining data/libopenmpt-0.4.11/soundlib/patternContainer.h
Examining data/libopenmpt-0.4.11/soundlib/UMXTools.cpp
Examining data/libopenmpt-0.4.11/soundlib/modsmp_ctrl.h
Examining data/libopenmpt-0.4.11/soundlib/MixerLoops.cpp
Examining data/libopenmpt-0.4.11/soundlib/ModSample.h
Examining data/libopenmpt-0.4.11/soundlib/WAVTools.cpp
Examining data/libopenmpt-0.4.11/soundlib/OggStream.h
Examining data/libopenmpt-0.4.11/soundlib/RowVisitor.h
Examining data/libopenmpt-0.4.11/soundlib/Loaders.h
Examining data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp
Examining data/libopenmpt-0.4.11/soundlib/MixFuncTable.cpp
Examining data/libopenmpt-0.4.11/soundlib/modcommand.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_mdl.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_ptm.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_plm.cpp
Examining data/libopenmpt-0.4.11/soundlib/WindowedFIR.h
Examining data/libopenmpt-0.4.11/soundlib/Load_mtm.cpp
Examining data/libopenmpt-0.4.11/soundlib/pattern.h
Examining data/libopenmpt-0.4.11/soundlib/Load_psm.cpp
Examining data/libopenmpt-0.4.11/soundlib/tuningbase.cpp
Examining data/libopenmpt-0.4.11/soundlib/FloatMixer.h
Examining data/libopenmpt-0.4.11/soundlib/MixerInterface.h
Examining data/libopenmpt-0.4.11/soundlib/Load_itp.cpp
Examining data/libopenmpt-0.4.11/soundlib/patternContainer.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_med.cpp
Examining data/libopenmpt-0.4.11/soundlib/MPEGFrame.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_amf.cpp
Examining data/libopenmpt-0.4.11/soundlib/modcommand.h
Examining data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp
Examining data/libopenmpt-0.4.11/soundlib/MixerLoops.h
Examining data/libopenmpt-0.4.11/soundlib/UpgradeModule.cpp
Examining data/libopenmpt-0.4.11/soundlib/SampleFormatOpus.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_s3m.cpp
Examining data/libopenmpt-0.4.11/soundlib/MIDIEvents.cpp
Examining data/libopenmpt-0.4.11/soundlib/Sndfile.cpp
Examining data/libopenmpt-0.4.11/soundlib/Fastmix.cpp
Examining data/libopenmpt-0.4.11/soundlib/mod_specifications.h
Examining data/libopenmpt-0.4.11/soundlib/Load_imf.cpp
Examining data/libopenmpt-0.4.11/soundlib/tuning.cpp
Examining data/libopenmpt-0.4.11/soundlib/Sndmix.cpp
Examining data/libopenmpt-0.4.11/soundlib/ContainerUMX.cpp
Examining data/libopenmpt-0.4.11/soundlib/Snd_fx.cpp
Examining data/libopenmpt-0.4.11/soundlib/ContainerXPK.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_ams.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_mo3.cpp
Examining data/libopenmpt-0.4.11/soundlib/ContainerPP20.cpp
Examining data/libopenmpt-0.4.11/soundlib/MixerSettings.h
Examining data/libopenmpt-0.4.11/soundlib/Load_okt.cpp
Examining data/libopenmpt-0.4.11/soundlib/tuning.h
Examining data/libopenmpt-0.4.11/soundlib/MPEGFrame.h
Examining data/libopenmpt-0.4.11/soundlib/BitReader.h
Examining data/libopenmpt-0.4.11/soundlib/Load_dsm.cpp
Examining data/libopenmpt-0.4.11/soundlib/InstrumentExtensions.cpp
Examining data/libopenmpt-0.4.11/soundlib/Sndfile.h
Examining data/libopenmpt-0.4.11/soundlib/UMXTools.h
Examining data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp
Examining data/libopenmpt-0.4.11/soundlib/ModSequence.cpp
Examining data/libopenmpt-0.4.11/soundlib/Tagging.h
Examining data/libopenmpt-0.4.11/soundlib/ModInstrument.h
Examining data/libopenmpt-0.4.11/soundlib/ModChannel.h
Examining data/libopenmpt-0.4.11/soundlib/WindowedFIR.cpp
Examining data/libopenmpt-0.4.11/soundlib/Paula.cpp
Examining data/libopenmpt-0.4.11/soundlib/ContainerMMCMP.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_stp.cpp
Examining data/libopenmpt-0.4.11/soundlib/SampleIO.cpp
Examining data/libopenmpt-0.4.11/soundlib/WAVTools.h
Examining data/libopenmpt-0.4.11/soundlib/modsmp_ctrl.cpp
Examining data/libopenmpt-0.4.11/soundlib/tuningcollection.h
Examining data/libopenmpt-0.4.11/soundlib/Mixer.h
Examining data/libopenmpt-0.4.11/soundlib/Load_it.cpp
Examining data/libopenmpt-0.4.11/soundlib/S3MTools.h
Examining data/libopenmpt-0.4.11/soundlib/ModSampleCopy.h
Examining data/libopenmpt-0.4.11/soundlib/ITTools.cpp
Examining data/libopenmpt-0.4.11/soundlib/Tagging.cpp
Examining data/libopenmpt-0.4.11/soundlib/ModInstrument.cpp
Examining data/libopenmpt-0.4.11/soundlib/ITTools.h
Examining data/libopenmpt-0.4.11/soundlib/MixFuncTable.h
Examining data/libopenmpt-0.4.11/soundlib/OggStream.cpp
Examining data/libopenmpt-0.4.11/soundlib/Dlsbank.h
Examining data/libopenmpt-0.4.11/soundlib/Load_gdm.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_xm.cpp
Examining data/libopenmpt-0.4.11/soundlib/ITCompression.cpp
Examining data/libopenmpt-0.4.11/soundlib/MIDIEvents.h
Examining data/libopenmpt-0.4.11/soundlib/Message.h
Examining data/libopenmpt-0.4.11/soundlib/tuningbase.h
Examining data/libopenmpt-0.4.11/soundlib/Load_dbm.cpp
Examining data/libopenmpt-0.4.11/soundlib/SoundFilePlayConfig.h
Examining data/libopenmpt-0.4.11/soundlib/Load_ult.cpp
Examining data/libopenmpt-0.4.11/soundlib/pattern.cpp
Examining data/libopenmpt-0.4.11/soundlib/S3MTools.cpp
Examining data/libopenmpt-0.4.11/soundlib/ChunkReader.h
Examining data/libopenmpt-0.4.11/soundlib/ModSequence.h
Examining data/libopenmpt-0.4.11/soundlib/Resampler.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/ParamEq.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Chorus.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/WavesReverb.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Echo.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Compressor.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Echo.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/DMOPlugin.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Compressor.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/ParamEq.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/WavesReverb.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Distortion.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Gargle.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/I3DL2Reverb.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Flanger.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Chorus.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/I3DL2Reverb.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Flanger.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/DMOPlugin.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Distortion.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/dmo/Gargle.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/PlugInterface.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/PluginManager.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/DigiBoosterEcho.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/PluginStructs.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/LFOPlugin.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/PlugInterface.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/LFOPlugin.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/PluginManager.h
Examining data/libopenmpt-0.4.11/soundlib/plugins/DigiBoosterEcho.cpp
Examining data/libopenmpt-0.4.11/soundlib/plugins/PluginMixBuffer.h
Examining data/libopenmpt-0.4.11/soundlib/SampleFormatFLAC.cpp
Examining data/libopenmpt-0.4.11/soundlib/load_j2b.cpp
Examining data/libopenmpt-0.4.11/soundlib/RowVisitor.cpp
Examining data/libopenmpt-0.4.11/soundlib/Dither.h
Examining data/libopenmpt-0.4.11/soundlib/MIDIMacros.cpp
Examining data/libopenmpt-0.4.11/soundlib/SoundFilePlayConfig.cpp
Examining data/libopenmpt-0.4.11/soundlib/opal.h
Examining data/libopenmpt-0.4.11/soundlib/Message.cpp
Examining data/libopenmpt-0.4.11/soundlib/ModChannel.cpp
Examining data/libopenmpt-0.4.11/soundlib/Container.h
Examining data/libopenmpt-0.4.11/soundlib/MIDIMacros.h
Examining data/libopenmpt-0.4.11/soundlib/Load_digi.cpp
Examining data/libopenmpt-0.4.11/soundlib/AudioReadTarget.h
Examining data/libopenmpt-0.4.11/soundlib/Load_wav.cpp
Examining data/libopenmpt-0.4.11/soundlib/tuningCollection.cpp
Examining data/libopenmpt-0.4.11/soundlib/ITCompression.h
Examining data/libopenmpt-0.4.11/soundlib/Load_mid.cpp
Examining data/libopenmpt-0.4.11/soundlib/AudioCriticalSection.h
Examining data/libopenmpt-0.4.11/soundlib/XMTools.h
Examining data/libopenmpt-0.4.11/soundlib/Load_uax.cpp
Examining data/libopenmpt-0.4.11/soundlib/Paula.h
Examining data/libopenmpt-0.4.11/soundlib/OPL.h
Examining data/libopenmpt-0.4.11/soundlib/Load_far.cpp
Examining data/libopenmpt-0.4.11/soundlib/XMTools.cpp
Examining data/libopenmpt-0.4.11/soundlib/mod_specifications.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_dmf.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_dtm.cpp
Examining data/libopenmpt-0.4.11/soundlib/IntMixer.h
Examining data/libopenmpt-0.4.11/soundlib/AudioCriticalSection.cpp
Examining data/libopenmpt-0.4.11/soundlib/Load_sfx.cpp
Examining data/libopenmpt-0.4.11/soundlib/Tables.h
Examining data/libopenmpt-0.4.11/soundlib/Load_mod.cpp
Examining data/libopenmpt-0.4.11/soundlib/Tables.cpp
Examining data/libopenmpt-0.4.11/test/TestToolsLib.h
Examining data/libopenmpt-0.4.11/test/test.h
Examining data/libopenmpt-0.4.11/test/test.cpp
Examining data/libopenmpt-0.4.11/test/TestTools.h
Examining data/libopenmpt-0.4.11/test/TestToolsLib.cpp
Examining data/libopenmpt-0.4.11/test/TestToolsTracker.h
Examining data/libopenmpt-0.4.11/common/mptStringParse.cpp
Examining data/libopenmpt-0.4.11/common/mptBaseMacros.h
Examining data/libopenmpt-0.4.11/common/mptRandom.cpp
Examining data/libopenmpt-0.4.11/common/mptAssert.h
Examining data/libopenmpt-0.4.11/common/mptLibrary.h
Examining data/libopenmpt-0.4.11/common/CompilerDetect.h
Examining data/libopenmpt-0.4.11/common/FileReaderFwd.h
Examining data/libopenmpt-0.4.11/common/Profiler.cpp
Examining data/libopenmpt-0.4.11/common/version.cpp
Examining data/libopenmpt-0.4.11/common/mptMemory.h
Examining data/libopenmpt-0.4.11/common/ComponentManager.h
Examining data/libopenmpt-0.4.11/common/mptTime.cpp
Examining data/libopenmpt-0.4.11/common/mptWine.h
Examining data/libopenmpt-0.4.11/common/FlagSet.h
Examining data/libopenmpt-0.4.11/common/versionNumber.h
Examining data/libopenmpt-0.4.11/common/mptStringFormat.h
Examining data/libopenmpt-0.4.11/common/mptWine.cpp
Examining data/libopenmpt-0.4.11/common/misc_util.h
Examining data/libopenmpt-0.4.11/common/mptBaseTypes.h
Examining data/libopenmpt-0.4.11/common/mptString.cpp
Examining data/libopenmpt-0.4.11/common/mptOS.h
Examining data/libopenmpt-0.4.11/common/mptMutex.h
Examining data/libopenmpt-0.4.11/common/mptBaseUtils.h
Examining data/libopenmpt-0.4.11/common/mptOS.cpp
Examining data/libopenmpt-0.4.11/common/mptStringParse.h
Examining data/libopenmpt-0.4.11/common/mptTime.h
Examining data/libopenmpt-0.4.11/common/mptCPU.h
Examining data/libopenmpt-0.4.11/common/Profiler.h
Examining data/libopenmpt-0.4.11/common/Logging.h
Examining data/libopenmpt-0.4.11/common/stdafx.h
Examining data/libopenmpt-0.4.11/common/mptFileIO.h
Examining data/libopenmpt-0.4.11/common/misc_util.cpp
Examining data/libopenmpt-0.4.11/common/BuildSettings.h
Examining data/libopenmpt-0.4.11/common/mptPathString.h
Examining data/libopenmpt-0.4.11/common/FileReader.h
Examining data/libopenmpt-0.4.11/common/mptFileIO.cpp
Examining data/libopenmpt-0.4.11/common/mptUUID.h
Examining data/libopenmpt-0.4.11/common/mptExceptionText.h
Examining data/libopenmpt-0.4.11/common/Logging.cpp
Examining data/libopenmpt-0.4.11/common/serialization_utils.h
Examining data/libopenmpt-0.4.11/common/ComponentManager.cpp
Examining data/libopenmpt-0.4.11/common/serialization_utils.cpp
Examining data/libopenmpt-0.4.11/common/mptStringBuffer.cpp
Examining data/libopenmpt-0.4.11/common/mptAlloc.h
Examining data/libopenmpt-0.4.11/common/mptRandom.h
Examining data/libopenmpt-0.4.11/common/mptLibrary.cpp
Examining data/libopenmpt-0.4.11/common/Endianness.h
Examining data/libopenmpt-0.4.11/common/mptBufferIO.h
Examining data/libopenmpt-0.4.11/common/mptAlloc.cpp
Examining data/libopenmpt-0.4.11/common/mptException.h
Examining data/libopenmpt-0.4.11/common/mptPathString.cpp
Examining data/libopenmpt-0.4.11/common/mptIO.cpp
Examining data/libopenmpt-0.4.11/common/mptStringFormat.cpp
Examining data/libopenmpt-0.4.11/common/mptCPU.cpp
Examining data/libopenmpt-0.4.11/common/version.h
Examining data/libopenmpt-0.4.11/common/mptStringBuffer.h
Examining data/libopenmpt-0.4.11/common/mptCRC.h
Examining data/libopenmpt-0.4.11/common/FileReader.cpp
Examining data/libopenmpt-0.4.11/common/mptThread.h
Examining data/libopenmpt-0.4.11/common/mptUUID.cpp
Examining data/libopenmpt-0.4.11/common/mptIO.h
Examining data/libopenmpt-0.4.11/common/mptSpan.h
Examining data/libopenmpt-0.4.11/common/mptString.h
Examining data/libopenmpt-0.4.11/libmodplug/modplug.h
Examining data/libopenmpt-0.4.11/libmodplug/stdafx.h
Examining data/libopenmpt-0.4.11/libmodplug/sndfile.h
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_config.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_allegro42.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_waveout.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_flac.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_portaudio.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_sdl2.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_raw.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_mmio.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_sndfile.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_pulseaudio.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_sdl.hpp
Examining data/libopenmpt-0.4.11/openmpt123/openmpt123_stdout.hpp
Examining data/libopenmpt-0.4.11/sounddsp/EQ.h
Examining data/libopenmpt-0.4.11/sounddsp/EQ.cpp
Examining data/libopenmpt-0.4.11/sounddsp/Reverb.cpp
Examining data/libopenmpt-0.4.11/sounddsp/DSP.cpp
Examining data/libopenmpt-0.4.11/sounddsp/AGC.h
Examining data/libopenmpt-0.4.11/sounddsp/Reverb.h
Examining data/libopenmpt-0.4.11/sounddsp/AGC.cpp
Examining data/libopenmpt-0.4.11/sounddsp/DSP.h
Examining data/libopenmpt-0.4.11/examples/libopenmpt_example_c_mem.c
Examining data/libopenmpt-0.4.11/examples/libopenmpt_example_cxx.cpp
Examining data/libopenmpt-0.4.11/examples/libopenmpt_example_c.c
Examining data/libopenmpt-0.4.11/examples/libopenmpt_example_c_stdout.c
Examining data/libopenmpt-0.4.11/examples/libopenmpt_example_c_unsafe.c
Examining data/libopenmpt-0.4.11/examples/libopenmpt_example_c_probe.c
Examining data/libopenmpt-0.4.11/soundbase/SampleFormatConverters.h
Examining data/libopenmpt-0.4.11/soundbase/SampleFormat.h
Examining data/libopenmpt-0.4.11/soundbase/SampleFormatCopy.h
Examining data/libopenmpt-0.4.11/debian/tests/pattern-dump-c.c
Examining data/libopenmpt-0.4.11/debian/tests/pattern-dump-cpp.cpp
Examining data/libopenmpt-0.4.11/debian/tests/pattern-dump-modplug.c

FINAL RESULTS:

data/libopenmpt-0.4.11/common/Logging.cpp:62:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	std::strcpy(g_FacilitySolo, solo.c_str());
data/libopenmpt-0.4.11/common/Logging.cpp:63:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	std::strcpy(g_FacilityBlocked, blocked.c_str());
data/libopenmpt-0.4.11/common/Logging.cpp:197:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(message, LOGBUF_SIZE, format, va);
data/libopenmpt-0.4.11/common/mptBaseMacros.h:242:79:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define MPT_PRINTF_FUNC(formatstringindex,varargsindex) __attribute__((format(printf, formatstringindex, varargsindex)))
data/libopenmpt-0.4.11/common/mptOS.cpp:148:48:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
Version::Version(mpt::Windows::Version::System system, mpt::Windows::Version::ServicePack servicePack, mpt::Windows::Version::Build build) noexcept
data/libopenmpt-0.4.11/common/mptOS.cpp:150:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	, m_System(system)
data/libopenmpt-0.4.11/common/mptOS.h:113:40:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	Version(mpt::Windows::Version::System system, mpt::Windows::Version::ServicePack servicePack, mpt::Windows::Version::Build build) noexcept;
data/libopenmpt-0.4.11/libmodplug/stdafx.h:96:9:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
#define lstrcpy strcpy
data/libopenmpt-0.4.11/libmodplug/stdafx.h:96:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define lstrcpy strcpy
data/libopenmpt-0.4.11/libmodplug/stdafx.h:116:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define wsprintf			sprintf
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:41:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	std::strcpy( dst, src );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:147:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(file->name,name);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:161:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(file->message,message);
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:1706:35:  [4] (buffer) lstrcpyA:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		if ((key >= 24) && (key <= 84)) lstrcpyA(s, szMidiPercussionNames[key-24]);
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:1709:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(&s[strlen(s)], " (%s", pDlsIns->szName);
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:1716:4:  [4] (buffer) lstrcatA:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			lstrcatA(s, ")");
data/libopenmpt-0.4.11/soundlib/Load_mid.cpp:330:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(pIns->name, szMidiProgramNames[program]);
data/libopenmpt-0.4.11/soundlib/Load_mid.cpp:334:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(pIns->name, szMidiPercussionNames[note - 24]);
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:297:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(m_szNames[targetSample], srcSong.m_szNames[sourceSample]);
data/libopenmpt-0.4.11/test/test.cpp:456:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		int size = snprintf(NULL, 0, format, x); // get required size, requires c99 compliant snprintf which msvc does not have
data/libopenmpt-0.4.11/test/test.cpp:458:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(&(temp[0]), size + 1, format, x);
data/libopenmpt-0.4.11/test/test.cpp:2791:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF(char, sprintf, "%s", char);
data/libopenmpt-0.4.11/test/test.cpp:2792:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF(char, sprintf, "%S", wchar_t);
data/libopenmpt-0.4.11/test/test.cpp:2793:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF(char, sprintf, "%hs", char);
data/libopenmpt-0.4.11/test/test.cpp:2794:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF(char, sprintf, "%hS", char);
data/libopenmpt-0.4.11/test/test.cpp:2795:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF(char, sprintf, "%ls", wchar_t);
data/libopenmpt-0.4.11/test/test.cpp:2796:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF(char, sprintf, "%lS", wchar_t);
data/libopenmpt-0.4.11/test/test.cpp:2797:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF(char, sprintf, "%ws", wchar_t);
data/libopenmpt-0.4.11/test/test.cpp:2798:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF(char, sprintf, "%wS", wchar_t);
data/libopenmpt-0.4.11/test/test.cpp:2801:29:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF_N(wchar_t, swprintf, L"%s", wchar_t);
data/libopenmpt-0.4.11/test/test.cpp:2802:29:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF_N(wchar_t, swprintf, L"%S", char);
data/libopenmpt-0.4.11/test/test.cpp:2803:29:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF_N(wchar_t, swprintf, L"%hs", char);
data/libopenmpt-0.4.11/test/test.cpp:2804:29:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF_N(wchar_t, swprintf, L"%hS", char);
data/libopenmpt-0.4.11/test/test.cpp:2805:29:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF_N(wchar_t, swprintf, L"%ls", wchar_t);
data/libopenmpt-0.4.11/test/test.cpp:2806:29:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF_N(wchar_t, swprintf, L"%lS", wchar_t);
data/libopenmpt-0.4.11/test/test.cpp:2807:29:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF_N(wchar_t, swprintf, L"%ws", wchar_t);
data/libopenmpt-0.4.11/test/test.cpp:2808:29:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	MPT_TEST_PRINTF_N(wchar_t, swprintf, L"%wS", wchar_t);
data/libopenmpt-0.4.11/common/misc_util.cpp:98:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
std::string getenv(const std::string &env_var, const std::string &def)
data/libopenmpt-0.4.11/common/misc_util.cpp:104:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *val = std::getenv(env_var.c_str());
data/libopenmpt-0.4.11/common/misc_util.h:226:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
std::string getenv(const std::string &env_var, const std::string &def = std::string());
data/libopenmpt-0.4.11/common/mptLibrary.cpp:122:16:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
					hModule = LoadLibraryEx(path.GetFileName().AsNative().c_str(), NULL, LOAD_LIBRARY_SEARCH_DEFAULT_DIRS);
data/libopenmpt-0.4.11/common/mptLibrary.cpp:125:16:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
					hModule = LoadLibraryEx(path.GetFileName().AsNative().c_str(), NULL, LOAD_LIBRARY_SEARCH_SYSTEM32);
data/libopenmpt-0.4.11/common/mptLibrary.cpp:139:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
							hModule = LoadLibrary((dllPath + path.GetFileName()).AsNative().c_str());
data/libopenmpt-0.4.11/common/mptLibrary.cpp:144:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
					hModule = LoadLibrary(path.GetFileName().AsNative().c_str());
data/libopenmpt-0.4.11/common/mptLibrary.cpp:149:16:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
					hModule = LoadLibraryEx(path.GetFileName().AsNative().c_str(), NULL, LOAD_LIBRARY_SEARCH_APPLICATION_DIR);
data/libopenmpt-0.4.11/common/mptLibrary.cpp:152:16:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
					hModule = LoadLibraryEx(path.GetFileName().AsNative().c_str(), NULL, LOAD_LIBRARY_SEARCH_DLL_LOAD_DIR);
data/libopenmpt-0.4.11/common/mptLibrary.cpp:164:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
					hModule = LoadLibrary(path.GetFileName().AsNative().c_str());
data/libopenmpt-0.4.11/common/mptLibrary.cpp:171:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
							hModule = LoadLibrary((dllPath + path.GetFileName()).AsNative().c_str());
data/libopenmpt-0.4.11/common/mptLibrary.cpp:180:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
							hModule = LoadLibrary((dllPath + path.GetFileName()).AsNative().c_str());
data/libopenmpt-0.4.11/common/mptLibrary.cpp:185:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
					hModule = LoadLibrary(path.GetFileName().AsNative().c_str());
data/libopenmpt-0.4.11/common/mptMutex.h:96:12:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	mutex() { InitializeCriticalSection(&impl); }
data/libopenmpt-0.4.11/common/mptMutex.h:98:16:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	void lock() { EnterCriticalSection(&impl); }
data/libopenmpt-0.4.11/common/mptMutex.h:108:22:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	recursive_mutex() { InitializeCriticalSection(&impl); }
data/libopenmpt-0.4.11/common/mptMutex.h:110:16:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	void lock() { EnterCriticalSection(&impl); }
data/libopenmpt-0.4.11/common/mptOS.cpp:630:19:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	HMODULE hNTDLL = LoadLibrary(TEXT("ntdll.dll"));
data/libopenmpt-0.4.11/common/mptRandom.cpp:116:7:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	std::srand(seed);
data/libopenmpt-0.4.11/common/mptRandom.cpp:226:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		result ^= mpt::random<result_type>(*rd_fallback);
data/libopenmpt-0.4.11/common/mptRandom.h:112:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline T random(Trng & rng)
data/libopenmpt-0.4.11/common/mptRandom.h:133:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline T random(Trng & rng)
data/libopenmpt-0.4.11/common/mptRandom.h:160:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline T random(Trng & rng, std::size_t required_entropy_bits)
data/libopenmpt-0.4.11/common/mptRandom.h:218:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		return ((b - a) * static_cast<T>(mpt::random<uint_type, bits>(rng)) / static_cast<T>((static_cast<uint_type>(1u) << bits))) + a;
data/libopenmpt-0.4.11/common/mptRandom.h:224:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline T random(Trng & rng, T min, T max)
data/libopenmpt-0.4.11/common/mptRandom.h:252:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		: state(mpt::random<state_type>(rd))
data/libopenmpt-0.4.11/common/mptRandom.h:314:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		reseed(mpt::random<uint32>(rd));
data/libopenmpt-0.4.11/common/mptRandom.h:538:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		return mpt::random<unsigned int>(rng);
data/libopenmpt-0.4.11/common/mptUUID.cpp:443:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	result.Data1 = mpt::random<uint32>(prng);
data/libopenmpt-0.4.11/common/mptUUID.cpp:444:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	result.Data2 = mpt::random<uint16>(prng);
data/libopenmpt-0.4.11/common/mptUUID.cpp:445:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	result.Data3 = mpt::random<uint16>(prng);
data/libopenmpt-0.4.11/common/mptUUID.cpp:446:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	result.Data4 = mpt::random<uint64>(prng);
data/libopenmpt-0.4.11/libmodplug/stdafx.h:40:9:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define srandom(_seed)  srand(_seed)
data/libopenmpt-0.4.11/libmodplug/stdafx.h:40:25:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define srandom(_seed)  srand(_seed)
data/libopenmpt-0.4.11/libmodplug/stdafx.h:41:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random()        rand()
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:2424:8:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		std::srand( std::uniform_int_distribution<unsigned int>()( prng ) );
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:85:12:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	mutex() { InitializeCriticalSection(&impl); }
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:87:16:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	void lock() { EnterCriticalSection(&impl); }
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:368:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			if ( std::getenv( "COLUMNS" ) ) {
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:369:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				std::istringstream istr( std::getenv( "COLUMNS" ) );
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:376:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			if ( std::getenv( "ROWS" ) ) {
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:377:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				std::istringstream istr( std::getenv( "ROWS" ) );
data/libopenmpt-0.4.11/soundlib/Dither.cpp:164:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				unoise = (mpt::random<unsigned int>(prng, noise_bits) + mpt::random<unsigned int>(prng, noise_bits)) >> 1;
data/libopenmpt-0.4.11/soundlib/Dither.cpp:164:66:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				unoise = (mpt::random<unsigned int>(prng, noise_bits) + mpt::random<unsigned int>(prng, noise_bits)) >> 1;
data/libopenmpt-0.4.11/soundlib/Dither.cpp:167:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				unoise = mpt::random<unsigned int>(prng, noise_bits);
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:388:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				case 3: p[i] = mpt::random<int8>(rng);          break; // Noise
data/libopenmpt-0.4.11/soundlib/Snd_fx.cpp:1841:47:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				chn.nVolSwing = static_cast<int16>(((mpt::random<int8>(AccessPRNG()) * pIns->nVolSwing) / 64 + 1) * (m_playBehaviour[kITSwingBehaviour] ? chn.nInsVol : ((chn.nVolume + 1) / 2)) / 199);
data/libopenmpt-0.4.11/soundlib/Snd_fx.cpp:1846:47:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				chn.nPanSwing = static_cast<int16>(((mpt::random<int8>(AccessPRNG()) * pIns->nPanSwing * 4) / 128));
data/libopenmpt-0.4.11/soundlib/Snd_fx.cpp:1855:73:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				int32 d = ((int32)pIns->nCutSwing * (int32)(static_cast<int32>(mpt::random<int8>(AccessPRNG())) + 1)) / 128;
data/libopenmpt-0.4.11/soundlib/Snd_fx.cpp:1862:73:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				int32 d = ((int32)pIns->nResSwing * (int32)(static_cast<int32>(mpt::random<int8>(AccessPRNG())) + 1)) / 128;
data/libopenmpt-0.4.11/soundlib/Sndmix.cpp:777:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			return mpt::random<int, 7>(AccessPRNG()) - 0x40;
data/libopenmpt-0.4.11/soundlib/Sndmix.cpp:1740:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				vdelta = mpt::random<int, 7>(AccessPRNG()) - 0x40;
data/libopenmpt-0.4.11/soundlib/plugins/LFOPlugin.cpp:462:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	m_nextRandom = mpt::random<int32>(m_PRNG) / static_cast<float>(int32_min);
data/libopenmpt-0.4.11/test/test.cpp:186:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		std::string env_srcdir = mpt::getenv( "srcdir" );
data/libopenmpt-0.4.11/test/test.cpp:2261:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<uint16, 7>(prng), 0u, 127u), true);
data/libopenmpt-0.4.11/test/test.cpp:2262:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<uint16, 8>(prng), 0u, 255u), true);
data/libopenmpt-0.4.11/test/test.cpp:2263:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<uint16, 9>(prng), 0u, 511u), true);
data/libopenmpt-0.4.11/test/test.cpp:2264:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<uint64, 1>(prng), 0u, 1u), true);
data/libopenmpt-0.4.11/test/test.cpp:2265:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<uint16>(prng, 7), 0u, 127u), true);
data/libopenmpt-0.4.11/test/test.cpp:2266:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<uint16>(prng, 8), 0u, 255u), true);
data/libopenmpt-0.4.11/test/test.cpp:2267:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<uint16>(prng, 9), 0u, 511u), true);
data/libopenmpt-0.4.11/test/test.cpp:2268:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<uint64>(prng, 1), 0u, 1u), true);
data/libopenmpt-0.4.11/test/test.cpp:2270:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<int16, 7>(prng), 0, 127), true);
data/libopenmpt-0.4.11/test/test.cpp:2271:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<int16, 8>(prng), 0, 255), true);
data/libopenmpt-0.4.11/test/test.cpp:2272:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<int16, 9>(prng), 0, 511), true);
data/libopenmpt-0.4.11/test/test.cpp:2273:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<int64, 1>(prng), 0, 1), true);
data/libopenmpt-0.4.11/test/test.cpp:2274:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<int16>(prng, 7), 0, 127), true);
data/libopenmpt-0.4.11/test/test.cpp:2275:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<int16>(prng, 8), 0, 255), true);
data/libopenmpt-0.4.11/test/test.cpp:2276:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<int16>(prng, 9), 0, 511), true);
data/libopenmpt-0.4.11/test/test.cpp:2277:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<int64>(prng, 1), 0, 1), true);
data/libopenmpt-0.4.11/test/test.cpp:2279:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<float>(prng, 0.0f, 1.0f), 0.0f, 1.0f), true);
data/libopenmpt-0.4.11/test/test.cpp:2280:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<double>(prng, 0.0, 1.0), 0.0, 1.0), true);
data/libopenmpt-0.4.11/test/test.cpp:2281:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<double>(prng, -1.0, 1.0), -1.0, 1.0), true);
data/libopenmpt-0.4.11/test/test.cpp:2282:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<double>(prng, -1.0, 0.0), -1.0, 0.0), true);
data/libopenmpt-0.4.11/test/test.cpp:2283:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<double>(prng, 1.0, 2.0), 1.0, 2.0), true);
data/libopenmpt-0.4.11/test/test.cpp:2284:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		VERIFY_EQUAL_QUIET_NONCONT(IsInRange(mpt::random<double>(prng, 1.0, 3.0), 1.0, 3.0), true);
data/libopenmpt-0.4.11/test/test.cpp:2291:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				uint8 value = mpt::random<uint8>(prng);
data/libopenmpt-0.4.11/test/test.cpp:2303:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				int8 value = mpt::random<int8>(prng);
data/libopenmpt-0.4.11/test/test.cpp:2315:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				uint8 value = mpt::random<uint8>(prng, 1);
data/libopenmpt-0.4.11/test/test.cpp:4144:7:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	std::srand(0);
data/libopenmpt-0.4.11/test/test.cpp:4147:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		sampleData[i] = mpt::random<int8>(*s_PRNG);
data/libopenmpt-0.4.11/test/test.cpp:4212:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return mpt::random(*s_PRNG, 0.0, 1.0);
data/libopenmpt-0.4.11/common/Endianness.h:182:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(&test, probe, sizeof(endian_probe_type));
data/libopenmpt-0.4.11/common/Endianness.h:946:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				std::memcpy(data.data(), &val, sizeof(val));
data/libopenmpt-0.4.11/common/Endianness.h:1133:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(&val, mem, sizeof(value_type));
data/libopenmpt-0.4.11/common/Endianness.h:1164:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(&val, mem, sizeof(value_type));
data/libopenmpt-0.4.11/common/Endianness.h:1195:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(&val, mem, sizeof(value_type));
data/libopenmpt-0.4.11/common/FileReader.h:582:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(&target, buf, sizeof(T));
data/libopenmpt-0.4.11/common/FileReader.h:865:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buffer[64];
data/libopenmpt-0.4.11/common/FileReader.h:894:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buffer[64];
data/libopenmpt-0.4.11/common/Logging.cpp:57:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char g_FacilitySolo[1024] = {0};
data/libopenmpt-0.4.11/common/Logging.cpp:58:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char g_FacilityBlocked[1024] = {0};
data/libopenmpt-0.4.11/common/Logging.cpp:131:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				s_logfile.open(P_("mptrack.log"), std::ios::app);
data/libopenmpt-0.4.11/common/Logging.cpp:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message[LOGBUF_SIZE];
data/libopenmpt-0.4.11/common/mptCPU.cpp:25:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ProcVendorID[16+1] = "";
data/libopenmpt-0.4.11/common/mptCPU.cpp:26:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ProcBrandID[4*4*3+1] = "";
data/libopenmpt-0.4.11/common/mptCPU.cpp:38:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char cpuid_result_string[12];
data/libopenmpt-0.4.11/common/mptCPU.h:42:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char ProcVendorID[16+1];
data/libopenmpt-0.4.11/common/mptCPU.h:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char ProcBrandID[4*4*3+1];
data/libopenmpt-0.4.11/common/mptFileIO.cpp:149:3:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fopen(filename.AsNativePrefixed().c_str(), fopen_mode.c_str())
data/libopenmpt-0.4.11/common/mptFileIO.cpp:462:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	m_File.open(m_Filename, std::ios::binary | std::ios::in);
data/libopenmpt-0.4.11/common/mptFileIO.cpp:478:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	m_File.open(m_Filename, std::ios::binary | std::ios::in);
data/libopenmpt-0.4.11/common/mptFileIO.h:71:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	base.open(mpt::ToCharset(mpt::CharsetLocale, filename.AsNative()).c_str(), mode);
data/libopenmpt-0.4.11/common/mptFileIO.h:73:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	base.open(filename.AsNativePrefixed().c_str(), mode);
data/libopenmpt-0.4.11/common/mptFileIO.h:94:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const mpt::PathString & filename, std::ios_base::openmode mode = std::ios_base::in | std::ios_base::out)
data/libopenmpt-0.4.11/common/mptFileIO.h:98:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const char * filename, std::ios_base::openmode mode = std::ios_base::in | std::ios_base::out) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:99:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const std::string & filename, std::ios_base::openmode mode = std::ios_base::in | std::ios_base::out) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:101:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const wchar_t * filename, std::ios_base::openmode mode = std::ios_base::in | std::ios_base::out) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:102:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const std::wstring & filename, std::ios_base::openmode mode = std::ios_base::in | std::ios_base::out) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:119:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const mpt::PathString & filename, std::ios_base::openmode mode = std::ios_base::in)
data/libopenmpt-0.4.11/common/mptFileIO.h:123:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const char * filename, std::ios_base::openmode mode = std::ios_base::in) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:124:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const std::string & filename, std::ios_base::openmode mode = std::ios_base::in) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:126:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const wchar_t * filename, std::ios_base::openmode mode = std::ios_base::in) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:127:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const std::wstring & filename, std::ios_base::openmode mode = std::ios_base::in) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:153:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const mpt::PathString & filename, std::ios_base::openmode mode = std::ios_base::out)
data/libopenmpt-0.4.11/common/mptFileIO.h:157:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const char * filename, std::ios_base::openmode mode = std::ios_base::out) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:158:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const std::string & filename, std::ios_base::openmode mode = std::ios_base::out) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:160:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const wchar_t * filename, std::ios_base::openmode mode = std::ios_base::out) = delete;
data/libopenmpt-0.4.11/common/mptFileIO.h:161:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	void open(const std::wstring & filename, std::ios_base::openmode mode = std::ios_base::out) = delete;
data/libopenmpt-0.4.11/common/mptIO.h:257:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	std::memcpy(&val, bytes, sizeof(T));
data/libopenmpt-0.4.11/common/mptIO.h:278:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	std::memcpy(&val, bytes, sizeof(T));
data/libopenmpt-0.4.11/common/mptIO.h:299:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	std::memcpy(&val, bytes, sizeof(T));
data/libopenmpt-0.4.11/common/mptMemory.h:185:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(&dst, &src, sizeof(Tdst));
data/libopenmpt-0.4.11/common/mptRandom.cpp:90:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(bytes, &time, sizeof(time));
data/libopenmpt-0.4.11/common/mptRandom.cpp:98:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(bytes, &time, sizeof(time));
data/libopenmpt-0.4.11/common/mptString.cpp:1300:23:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		int required_size = MultiByteToWideChar(codepage, 0, reinterpret_cast<const char*>(src.c_str()), -1, nullptr, 0);
data/libopenmpt-0.4.11/common/mptString.cpp:1307:4:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
			MultiByteToWideChar(codepage, 0, reinterpret_cast<const char*>(src.c_str()), -1, decoded_string.data(), required_size);
data/libopenmpt-0.4.11/common/mptString.cpp:1312:4:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
			MultiByteToWideChar(codepage, 0, reinterpret_cast<const char*>(src.c_str()), -1, decoded_string.data(), required_size);
data/libopenmpt-0.4.11/common/mptString.cpp:1339:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				std::memcpy(outbuf, &tmp, sizeof(widechar));
data/libopenmpt-0.4.11/common/mptString.cpp:1723:22:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	int required_size = MultiByteToWideChar(codepage, 0, src.c_str(), -1, nullptr, 0);
data/libopenmpt-0.4.11/common/mptString.cpp:1730:3:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		MultiByteToWideChar(codepage, 0, src.c_str(), -1, decoded_string.data(), required_size);
data/libopenmpt-0.4.11/common/mptString.cpp:1735:3:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		MultiByteToWideChar(codepage, 0, src.c_str(), -1, decoded_string.data(), required_size);
data/libopenmpt-0.4.11/common/mptTime.cpp:60:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR buf[bufsize];
data/libopenmpt-0.4.11/common/serialization_utils.cpp:127:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	std::memcpy(&val, m_ID.data(), m_ID.length());
data/libopenmpt-0.4.11/common/serialization_utils.cpp:430:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char temp[sizeof(s_EntryID)];
data/libopenmpt-0.4.11/common/serialization_utils.cpp:442:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char storedIdBuf[256];
data/libopenmpt-0.4.11/common/serialization_utils.h:291:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char s_EntryID[3];
data/libopenmpt-0.4.11/debian/tests/pattern-dump-c.c:16:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* in_file = fopen(argv[1], "rb");
data/libopenmpt-0.4.11/debian/tests/pattern-dump-modplug.c:17:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* in_file = fopen(filename, "rb");
data/libopenmpt-0.4.11/examples/libopenmpt_example_c.c:105:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen( argv[1], "rb" );
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_mem.c:108:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen( filename, "rb" );
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_probe.c:73:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen( filename, "rb" );
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_stdout.c:118:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen( argv[1], "rb" );
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_unsafe.c:46:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen( argv[1], "rb" );
data/libopenmpt-0.4.11/libmodplug/sndfile.h:441:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szName[MAX_CHANNELNAME];        // changed from CHAR
data/libopenmpt-0.4.11/libmodplug/sndfile.h:526:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szMidiGlb[9*32];      // changed from CHAR
data/libopenmpt-0.4.11/libmodplug/sndfile.h:527:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szMidiSFXExt[16*32];  // changed from CHAR
data/libopenmpt-0.4.11/libmodplug/sndfile.h:528:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szMidiZXXExt[128*32]; // changed from CHAR
data/libopenmpt-0.4.11/libmodplug/sndfile.h:579:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_szNames[MAX_INSTRUMENTS][32];    // changed from CHAR
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:33:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy( text, text_.c_str(), text_.length() + 1 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:44:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy( text, text_, std::strlen( text_ ) + 1 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:67:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy( text, text_, std::strlen( text_ ) + 1 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:746:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[ PROBE_RECOMMENDED_SIZE ];
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:788:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[ PROBE_RECOMMENDED_SIZE ];
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:130:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&file->settings,&globalsettings,sizeof(ModPlug_Settings));
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:311:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(settings,&globalsettings,sizeof(ModPlug_Settings));
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:317:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&globalsettings,settings,sizeof(ModPlug_Settings));
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:498:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:547:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&file->patterns[pattern][r*numc+c],&note,sizeof(ModPlugNote));
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:85:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	std::memcpy( that->CompressionTable, self_union.CompressionTable, sizeof( self_union.CompressionTable ) );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_stream_callbacks_buffer.h:85:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( dst, (const char*)s->file_data + s->file_pos, valid_bytes );
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:521:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sndfile_info[128];
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:882:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const channel_tags[4][4] = {
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cpu_str[64] = "";
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1196:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf( cpu_str, "%.2f%%", cpu_smooth * 100.0 );
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1637:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char buffer[BUFFER_SIZE];
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1647:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				file_stream.open( utf8_to_wstring( filename ), std::ios::binary );
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1652:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				file_stream.open( filename, std::ios::binary );
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1713:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char buffer[BUFFER_SIZE];
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1723:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				file_stream.open( utf8_to_wstring( filename ), std::ios::binary );
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1728:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				file_stream.open( filename, std::ios::binary );
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1880:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char buffer[BUFFER_SIZE];
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1889:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			file_stream.open( utf8_to_wstring( filename ), std::ios::binary );
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1891:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			file_stream.open( filename, std::ios::binary );
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:46:22:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	int required_size = MultiByteToWideChar( CP_UTF8, 0, utf8_string.c_str(), -1, NULL, 0 );
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:51:2:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	MultiByteToWideChar( CP_UTF8, 0, utf8_string.data(), -1, &unicode_buf[0], required_size );
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:66:22:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	int required_size = MultiByteToWideChar( CP_ACP, 0, locale_string.c_str(), -1, NULL, 0 );
data/libopenmpt-0.4.11/openmpt123/openmpt123.hpp:71:2:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	MultiByteToWideChar( CP_ACP, 0, locale_string.data(), -1, &unicode_buf[0], required_size );
data/libopenmpt-0.4.11/openmpt123/openmpt123_allegro42.hpp:141:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					std::memcpy( reinterpret_cast<unsigned char *>( p ) + ( ( ( frame * channels ) + channel ) * sizeof( std::uint8_t ) ), &u8sample, sizeof( std::uint8_t ) );
data/libopenmpt-0.4.11/openmpt123/openmpt123_allegro42.hpp:144:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					std::memcpy( reinterpret_cast<unsigned char *>( p ) + ( ( ( frame * channels ) + channel ) * sizeof( std::uint16_t ) ), &u16sample, sizeof( std::uint16_t ) );
data/libopenmpt-0.4.11/openmpt123/openmpt123_mmio.hpp:98:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				std::memcpy( data_info.pchNext, &( buffers[channel][frame] ), sizeof( float ) );
data/libopenmpt-0.4.11/openmpt123/openmpt123_mmio.hpp:111:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				std::memcpy( data_info.pchNext, &( buffers[channel][frame] ), sizeof( std::int16_t ) );
data/libopenmpt-0.4.11/openmpt123/openmpt123_sdl.hpp:102:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				std::memcpy( stream, &sample, sizeof( std::int16_t ) );
data/libopenmpt-0.4.11/openmpt123/openmpt123_sdl2.hpp:103:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy( &audiospec_obtained, &audiospec, sizeof( SDL_AudioSpec ) );
data/libopenmpt-0.4.11/openmpt123/openmpt123_sdl2.hpp:129:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				std::memcpy( stream, &sample, sizeof( Tsample ) );
data/libopenmpt-0.4.11/openmpt123/openmpt123_waveout.hpp:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[ sizeof( Tsample ) ];
data/libopenmpt-0.4.11/openmpt123/openmpt123_waveout.hpp:153:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				std::memcpy( buf, &val, sizeof( Tsample ) );
data/libopenmpt-0.4.11/soundlib/ContainerMMCMP.cpp:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     id[8];	// "ziRCONia"
data/libopenmpt-0.4.11/soundlib/ContainerPP20.cpp:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    magic[4];       // "PP20"
data/libopenmpt-0.4.11/soundlib/ContainerXPK.cpp:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     XPKF[4];
data/libopenmpt-0.4.11/soundlib/ContainerXPK.cpp:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     SQSH[4];
data/libopenmpt-0.4.11/soundlib/ContainerXPK.cpp:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     Name[16];
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:358:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     achPresetName[20];
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:387:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     achInstName[20];
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:411:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     achSampleName[20];
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:828:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char sid[5];
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:829:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(sid, &pchunk->id, 4);
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:977:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char sdbg[5];
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:978:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sdbg, &header.id, 4);
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:1383:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char sdbg[5];
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:1384:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(sdbg, &chunkHeader.id, 4);
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:1506:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(waveData.data(), &chunk, 12);
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:1704:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[64] = "";
data/libopenmpt-0.4.11/soundlib/Dlsbank.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szName[32];
data/libopenmpt-0.4.11/soundlib/Dlsbank.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   szName[20];
data/libopenmpt-0.4.11/soundlib/ITTools.cpp:170:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(id, "IMPI", 4);
data/libopenmpt-0.4.11/soundlib/ITTools.cpp:406:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iti.dummy, "XTPM", 4);
data/libopenmpt-0.4.11/soundlib/ITTools.cpp:442:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(id, "IMPS", 4);
data/libopenmpt-0.4.11/soundlib/ITTools.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     id[4];				// Magic Bytes (IMPM)
data/libopenmpt-0.4.11/soundlib/ITTools.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songname[26];		// Song Name, null-terminated (but may also contain nulls)
data/libopenmpt-0.4.11/soundlib/ITTools.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     id[4];			// Magic Bytes (IMPI)
data/libopenmpt-0.4.11/soundlib/ITTools.h:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[13];	// DOS Filename, null-terminated
data/libopenmpt-0.4.11/soundlib/ITTools.h:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     reserved1[2];	// Reserved
data/libopenmpt-0.4.11/soundlib/ITTools.h:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[26];		// Instrument Name, null-terminated (but may also contain nulls)
data/libopenmpt-0.4.11/soundlib/ITTools.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     reserved3[6];	// Even more reserved bytes
data/libopenmpt-0.4.11/soundlib/ITTools.h:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     id[4];			// Magic Bytes (IMPI)
data/libopenmpt-0.4.11/soundlib/ITTools.h:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[13];	// DOS Filename, null-terminated
data/libopenmpt-0.4.11/soundlib/ITTools.h:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[26];		// Instrument Name, null-terminated (but may also contain nulls)
data/libopenmpt-0.4.11/soundlib/ITTools.h:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char       dummy[4];	// IT saves some additional padding bytes to match the size of the old instrument format for simplified loading. We use them for some hacks.
data/libopenmpt-0.4.11/soundlib/ITTools.h:242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     id[4];			// Magic Bytes (IMPS)
data/libopenmpt-0.4.11/soundlib/ITTools.h:243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[13];	// DOS Filename, null-terminated
data/libopenmpt-0.4.11/soundlib/ITTools.h:247:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[26];		// Sample Name, null-terminated (but may also contain nulls)
data/libopenmpt-0.4.11/soundlib/Load_669.cpp:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  magic[2];			// 'if' (0x6669, ha ha) or 'JN'
data/libopenmpt-0.4.11/soundlib/Load_669.cpp:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  songMessage[108];	// Song Message
data/libopenmpt-0.4.11/soundlib/Load_669.cpp:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[13];
data/libopenmpt-0.4.11/soundlib/Load_amf.cpp:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  signature[32];
data/libopenmpt-0.4.11/soundlib/Load_amf.cpp:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[22];
data/libopenmpt-0.4.11/soundlib/Load_amf.cpp:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     amf[3];
data/libopenmpt-0.4.11/soundlib/Load_amf.cpp:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     title[32];
data/libopenmpt-0.4.11/soundlib/Load_ams.cpp:445:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[11];
data/libopenmpt-0.4.11/soundlib/Load_ams.cpp:976:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char patternName[11];
data/libopenmpt-0.4.11/soundlib/Load_ams.cpp:1027:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sample.sampleb(), source.sampleb(), source.GetSampleSizeInBytes());
data/libopenmpt-0.4.11/soundlib/Load_c67.cpp:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  sampleNames[32][13];
data/libopenmpt-0.4.11/soundlib/Load_c67.cpp:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  fmInstrNames[32][13];
data/libopenmpt-0.4.11/soundlib/Load_dbm.cpp:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  dbm0[4];
data/libopenmpt-0.4.11/soundlib/Load_dbm.cpp:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  reserved[2];
data/libopenmpt-0.4.11/soundlib/Load_dbm.cpp:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[30];
data/libopenmpt-0.4.11/soundlib/Load_dbm.cpp:369:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[44];
data/libopenmpt-0.4.11/soundlib/Load_dbm.cpp:600:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&plugin.Info.dwPluginId1, "DBM0", 4);
data/libopenmpt-0.4.11/soundlib/Load_dbm.cpp:601:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&plugin.Info.dwPluginId2, "Echo", 4);
data/libopenmpt-0.4.11/soundlib/Load_dbm.cpp:685:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(sample.sampleb(), smpData, sample.GetSampleSizeInBytes());
data/libopenmpt-0.4.11/soundlib/Load_digi.cpp:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     signature[20];
data/libopenmpt-0.4.11/soundlib/Load_digi.cpp:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     versionStr[4];	// Supposed to be "V1.6" or similar, but other values like "TAP!" have been found as well.
data/libopenmpt-0.4.11/soundlib/Load_digi.cpp:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     unknown[19];
data/libopenmpt-0.4.11/soundlib/Load_dmf.cpp:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   signature[4];	// "DDMF"
data/libopenmpt-0.4.11/soundlib/Load_dmf.cpp:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   tracker[8];		// "XTRACKER"
data/libopenmpt-0.4.11/soundlib/Load_dmf.cpp:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   songname[30];
data/libopenmpt-0.4.11/soundlib/Load_dmf.cpp:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   composer[20];
data/libopenmpt-0.4.11/soundlib/Load_dsm.cpp:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];
data/libopenmpt-0.4.11/soundlib/Load_dsm.cpp:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songName[28];
data/libopenmpt-0.4.11/soundlib/Load_dsm.cpp:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[13];
data/libopenmpt-0.4.11/soundlib/Load_dsm.cpp:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     sampleName[28];
data/libopenmpt-0.4.11/soundlib/Load_dsm.cpp:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fileMagic0[4];
data/libopenmpt-0.4.11/soundlib/Load_dsm.cpp:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fileMagic1[4];
data/libopenmpt-0.4.11/soundlib/Load_dsm.cpp:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fileMagic2[4];
data/libopenmpt-0.4.11/soundlib/Load_dtm.cpp:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];
data/libopenmpt-0.4.11/soundlib/Load_dtm.cpp:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[22];
data/libopenmpt-0.4.11/soundlib/Load_far.cpp:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songName[40];
data/libopenmpt-0.4.11/soundlib/Load_far.cpp:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[32];
data/libopenmpt-0.4.11/soundlib/Load_gdm.cpp:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];				// ID: 'GDM\xFE'
data/libopenmpt-0.4.11/soundlib/Load_gdm.cpp:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songTitle[32];			// Music's title
data/libopenmpt-0.4.11/soundlib/Load_gdm.cpp:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songMusician[32];		// Name of music's composer
data/libopenmpt-0.4.11/soundlib/Load_gdm.cpp:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     dosEOF[3];				// 13, 10, 26
data/libopenmpt-0.4.11/soundlib/Load_gdm.cpp:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic2[4];				// ID: 'GMFS'
data/libopenmpt-0.4.11/soundlib/Load_gdm.cpp:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[32];		// sample's name
data/libopenmpt-0.4.11/soundlib/Load_gdm.cpp:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     fileName[12];	// sample's filename
data/libopenmpt-0.4.11/soundlib/Load_imf.cpp:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  name[12];	// Channel name (ASCIIZ-String, max 11 chars)
data/libopenmpt-0.4.11/soundlib/Load_imf.cpp:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     title[32];			// Songname (ASCIIZ-String, max. 31 chars)
data/libopenmpt-0.4.11/soundlib/Load_imf.cpp:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     im10[4];			// 'IM10'
data/libopenmpt-0.4.11/soundlib/Load_imf.cpp:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char        name[32];	// Inst. name (ASCIIZ-String, max. 31 chars)
data/libopenmpt-0.4.11/soundlib/Load_imf.cpp:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char        ii10[4];	// 'II10'
data/libopenmpt-0.4.11/soundlib/Load_imf.cpp:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[13];	// Sample filename (12345678.ABC) */
data/libopenmpt-0.4.11/soundlib/Load_imf.cpp:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     is10[4];		// 'IS10'
data/libopenmpt-0.4.11/soundlib/Load_it.cpp:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATTERNNAME] = "";
data/libopenmpt-0.4.11/soundlib/Load_it.cpp:1361:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(itHeader.id, "IMPM", 4);
data/libopenmpt-0.4.11/soundlib/Load_it.cpp:1417:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&itHeader.reserved, "OMPT", 4);
data/libopenmpt-0.4.11/soundlib/Load_it.cpp:1530:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_PATTERNNAME];
data/libopenmpt-0.4.11/soundlib/Load_it.cpp:1544:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_CHANNELNAME];
data/libopenmpt-0.4.11/soundlib/Load_it.cpp:1942:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char id[4] = { 'F', 'X', '0', '0' };
data/libopenmpt-0.4.11/soundlib/Load_it.cpp:2013:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char code[4];
data/libopenmpt-0.4.11/soundlib/Load_it.cpp:2086:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char code[4];
data/libopenmpt-0.4.11/soundlib/Load_itp.cpp:283:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char patName[32];
data/libopenmpt-0.4.11/soundlib/Load_mdl.cpp:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  id[4];	// "DMDL"
data/libopenmpt-0.4.11/soundlib/Load_mdl.cpp:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     title[32];
data/libopenmpt-0.4.11/soundlib/Load_mdl.cpp:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     composer[20];
data/libopenmpt-0.4.11/soundlib/Load_mdl.cpp:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    name[16];
data/libopenmpt-0.4.11/soundlib/Load_mdl.cpp:706:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[17] = "";
data/libopenmpt-0.4.11/soundlib/Load_mdl.cpp:807:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[17];
data/libopenmpt-0.4.11/soundlib/Load_med.cpp:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     id[4];		// MMD1-MMD3
data/libopenmpt-0.4.11/soundlib/Load_med.cpp:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[32];
data/libopenmpt-0.4.11/soundlib/Load_mid.cpp:32:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *szMidiGroupNames[17] =
data/libopenmpt-0.4.11/soundlib/Load_mid.cpp:54:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *szMidiProgramNames[128] =
data/libopenmpt-0.4.11/soundlib/Load_mid.cpp:204:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *szMidiPercussionNames[61] =
data/libopenmpt-0.4.11/soundlib/Load_mid.cpp:336:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(pIns->name, "Percussions");
data/libopenmpt-0.4.11/soundlib/Load_mid.cpp:561:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/libopenmpt-0.4.11/soundlib/Load_mid.cpp:591:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char id[4];
data/libopenmpt-0.4.11/soundlib/Load_mo3.cpp:706:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[3];   // MO3
data/libopenmpt-0.4.11/soundlib/Load_mo3.cpp:1340:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(sample.sampleb(), smpFrom.sampleb(), sample.GetSampleSizeInBytes());
data/libopenmpt-0.4.11/soundlib/Load_mo3.cpp:1844:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char patName[MAX_PATTERNNAME];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:217:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[22];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     am[2];        // "AM"
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     zero[4];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:473:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[32];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:677:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static bool CheckMODMagic(const char magic[4], MODMagicResult &result)
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:757:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:785:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:1181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char stMagic[16];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:1302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            songname[20];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:1455:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char songname[20];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:1456:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	std::memcpy(songname, fileHeaders.songname, 20);
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:1817:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:1863:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:2028:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magicFORM[4]; // "FORM"
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:2030:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magicMODL[4]; // "MODL"
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:2204:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[20];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:2270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char modMagic[4];
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:2276:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(modMagic, "M.K.", 4);
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:2278:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(modMagic, "M!K!", 4);
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:2281:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(modMagic, "0CHN", 4);
data/libopenmpt-0.4.11/soundlib/Load_mod.cpp:2285:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(modMagic, "00CH", 4);
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     signature[4];		// "MT20"
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     trackerName[32];	// "MadTracker 2.0"
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songName[64];
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     dll[64];
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     programName[28];
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     reserved[17];
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:734:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(mixPlug.pluginData.data(), "fEvN", 4);	// 'NvEf' plugin data type
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:800:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy(mptIns->name, "Drum #x");
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:896:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char instrName[32];
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:1010:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sampleName[32];
data/libopenmpt-0.4.11/soundlib/Load_mtm.cpp:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     id[3];			// MTM file marker
data/libopenmpt-0.4.11/soundlib/Load_mtm.cpp:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songName[20];	// ASCIIZ songname
data/libopenmpt-0.4.11/soundlib/Load_mtm.cpp:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     samplename[22];
data/libopenmpt-0.4.11/soundlib/Load_okt.cpp:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[20];
data/libopenmpt-0.4.11/soundlib/Load_plm.cpp:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];		// "PLM\x1A"
data/libopenmpt-0.4.11/soundlib/Load_plm.cpp:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songName[48];
data/libopenmpt-0.4.11/soundlib/Load_plm.cpp:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];		// "PLS\x1A"
data/libopenmpt-0.4.11/soundlib/Load_plm.cpp:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[32];
data/libopenmpt-0.4.11/soundlib/Load_plm.cpp:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[12];
data/libopenmpt-0.4.11/soundlib/Load_plm.cpp:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     unused[4];
data/libopenmpt-0.4.11/soundlib/Load_plm.cpp:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[25];
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     formatID[4];	// "PSM " (new format)
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     fileInfoID[4];	// "FILE"
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  songType[9];		// Mostly "MAINSONG " (But not in Extreme Pinball!)
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     fileName[8];		// Filename of the original module (without extension)
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     sampleID[4];		// INS0...INS9 (only last digit of sample ID, i.e. sample 1 and sample 11 are equal)
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     sampleName[33];
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     padding[19];		// 00 ... 00
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     fileName[8];		// Filename of the original module (without extension)
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     sampleID[8];		// INS0...INS99999
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     sampleName[33];
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     padding[16];		// 00 ... 00
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char songName[10];
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char patternID[5];
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:359:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char cversion[7];
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:962:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     formatID[4];		// "PSM\xFE" (PSM16)
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:963:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songName[59];		// Song title, padded with nulls
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:983:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filler[40];
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:1000:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[13];	// null-terminated
data/libopenmpt-0.4.11/soundlib/Load_psm.cpp:1001:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[24];		// ditto
data/libopenmpt-0.4.11/soundlib/Load_ptm.cpp:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songname[28];		// Name of song, asciiz string
data/libopenmpt-0.4.11/soundlib/Load_ptm.cpp:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];			// Song identification, 'PTMF'
data/libopenmpt-0.4.11/soundlib/Load_ptm.cpp:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[12];		// Name of external sample file
data/libopenmpt-0.4.11/soundlib/Load_ptm.cpp:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     samplename[28];	// Name of sample, ASCIIZ
data/libopenmpt-0.4.11/soundlib/Load_ptm.cpp:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];			// Sample identification, 'PTMS'
data/libopenmpt-0.4.11/soundlib/Load_s3m.cpp:693:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fileHeader.magic, "SCRM", 4);
data/libopenmpt-0.4.11/soundlib/Load_sfx.cpp:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[22];
data/libopenmpt-0.4.11/soundlib/Load_sfx.cpp:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     dummy[2];	// Supposedly sample length, but almost always incorrect
data/libopenmpt-0.4.11/soundlib/Load_stm.cpp:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[12];	// Can't have long comments - just filename comments :)
data/libopenmpt-0.4.11/soundlib/Load_stm.cpp:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  songname[20];
data/libopenmpt-0.4.11/soundlib/Load_stm.cpp:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  trackername[8];	// !Scream! for ST 2.xx
data/libopenmpt-0.4.11/soundlib/Load_stp.cpp:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];
data/libopenmpt-0.4.11/soundlib/Load_stp.cpp:132:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	std::memcpy(dest.sampleb(), src.sampleb() + start, len);
data/libopenmpt-0.4.11/soundlib/Load_stp.cpp:187:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newSmp.sampleb() + start, smp.sampleb() + info.loopStart, info.loopLength);
data/libopenmpt-0.4.11/soundlib/Load_ult.cpp:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  signature[14];		// "MAS_UTrack_V00"
data/libopenmpt-0.4.11/soundlib/Load_ult.cpp:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  songName[32];			// Song Name, not guaranteed to be null-terminated
data/libopenmpt-0.4.11/soundlib/Load_ult.cpp:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[32];
data/libopenmpt-0.4.11/soundlib/Load_ult.cpp:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[12];
data/libopenmpt-0.4.11/soundlib/Load_xm.cpp:609:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char patName[MAX_PATTERNNAME];
data/libopenmpt-0.4.11/soundlib/Load_xm.cpp:758:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fileHeader.signature, "Extended Module: ", 17);
data/libopenmpt-0.4.11/soundlib/Load_xm.cpp:1094:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[MAX_PATTERNNAME];
data/libopenmpt-0.4.11/soundlib/Load_xm.cpp:1113:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[MAX_CHANNELNAME];
data/libopenmpt-0.4.11/soundlib/MIDIMacros.cpp:327:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szMidiGlb[MIDIOUT_START], "FF");
data/libopenmpt-0.4.11/soundlib/MIDIMacros.cpp:328:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szMidiGlb[MIDIOUT_STOP], "FC");
data/libopenmpt-0.4.11/soundlib/MIDIMacros.cpp:329:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szMidiGlb[MIDIOUT_NOTEON], "9c n v");
data/libopenmpt-0.4.11/soundlib/MIDIMacros.cpp:330:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szMidiGlb[MIDIOUT_NOTEOFF], "9c n 0");
data/libopenmpt-0.4.11/soundlib/MIDIMacros.cpp:331:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szMidiGlb[MIDIOUT_PROGRAM], "Cc p");
data/libopenmpt-0.4.11/soundlib/MIDIMacros.h:87:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	typedef char Macro[MACRO_LENGTH];
data/libopenmpt-0.4.11/soundlib/ModChannel.h:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szName[MAX_CHANNELNAME];	// Channel name
data/libopenmpt-0.4.11/soundlib/ModInstrument.h:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_INSTRUMENTNAME];
data/libopenmpt-0.4.11/soundlib/ModInstrument.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_INSTRUMENTFILENAME];
data/libopenmpt-0.4.11/soundlib/ModSample.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_SAMPLEFILENAME];
data/libopenmpt-0.4.11/soundlib/OggStream.cpp:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rawHeader[sizeof(PageHeader)];
data/libopenmpt-0.4.11/soundlib/OggStream.cpp:161:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	std::memcpy(rawHeader, &pageInfo.header, sizeof(PageHeader));
data/libopenmpt-0.4.11/soundlib/OggStream.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     capture_pattern[4]; // "OggS"
data/libopenmpt-0.4.11/soundlib/S3MTools.cpp:44:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(patch.data() + 0, mpt::as_raw_memory(length).data(), 4);
data/libopenmpt-0.4.11/soundlib/S3MTools.cpp:45:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(patch.data() + 4, mpt::as_raw_memory(loopStart).data(), 4);
data/libopenmpt-0.4.11/soundlib/S3MTools.cpp:46:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(patch.data() + 8, mpt::as_raw_memory(loopEnd).data(), 4);
data/libopenmpt-0.4.11/soundlib/S3MTools.cpp:71:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(magic, "SCRS", 4);
data/libopenmpt-0.4.11/soundlib/S3MTools.cpp:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(magic, "SCRI", 4);
data/libopenmpt-0.4.11/soundlib/S3MTools.cpp:77:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(mpt::as_raw_memory(length   ).data(), mptSmp.adlib.data() + 0, 4);
data/libopenmpt-0.4.11/soundlib/S3MTools.cpp:78:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(mpt::as_raw_memory(loopStart).data(), mptSmp.adlib.data() + 4, 4);
data/libopenmpt-0.4.11/soundlib/S3MTools.cpp:79:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(mpt::as_raw_memory(loopEnd  ).data(), mptSmp.adlib.data() + 8, 4);
data/libopenmpt-0.4.11/soundlib/S3MTools.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[28];			// Song Title
data/libopenmpt-0.4.11/soundlib/S3MTools.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     reserved1[2];		// Reserved
data/libopenmpt-0.4.11/soundlib/S3MTools.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];			// "SCRM" magic bytes
data/libopenmpt-0.4.11/soundlib/S3MTools.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     filename[12];		// Sample filename
data/libopenmpt-0.4.11/soundlib/S3MTools.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     reserved2[12];		// Reserved + Internal ST3 stuff
data/libopenmpt-0.4.11/soundlib/S3MTools.h:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[28];			// Sample name
data/libopenmpt-0.4.11/soundlib/S3MTools.h:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];			// "SCRS" magic bytes ("SCRI" for Adlib instruments)
data/libopenmpt-0.4.11/soundlib/SampleFormatFLAC.cpp:580:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(metadata[1]->data.application.id, "riff", 4);
data/libopenmpt-0.4.11/soundlib/SampleFormatFLAC.cpp:600:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(metadata[numBlocks]->data.application.id, "riff", 4);
data/libopenmpt-0.4.11/soundlib/SampleFormatFLAC.cpp:633:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(metadata[numBlocks]->data.application.id, "riff", 4);
data/libopenmpt-0.4.11/soundlib/SampleFormatMP3.cpp:513:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(buf_samples.data(), buf_bytes.data(), buf_bytes_decoded);
data/libopenmpt-0.4.11/soundlib/SampleFormatMP3.cpp:579:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		std::memcpy(Samples[sample].sampleb(), data.data() + (data_skip_frames * channels), (data.size() - (data_skip_frames * channels)) * sizeof(int16));
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:305:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(targetSmp.sampleb(), sourceSmp.sampleb(), nSize);
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:843:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[8];		// "GF1PATCH"
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:844:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     version[4];	// "100", or "110"
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:845:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     id[10];		// "ID#000002"
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:846:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     copyright[60];	// Copyright
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:853:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     reserved2[36];
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:862:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[16];		// Name of instrument. Gravis doesn't seem to use it
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:865:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     reserved[40];
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:873:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[7];		// null terminated string. name of the wave.
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:889:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     reserved[36];
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:931:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     reserved[40];
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:2611:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];	// FORM
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:2613:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     type[4];	// AIFF or AIFC
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:3329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     form[4];	// "FORM"
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:3331:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];	// "8SVX" or "16SV"
data/libopenmpt-0.4.11/soundlib/Snd_fx.cpp:5203:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&curData, macro, len);
data/libopenmpt-0.4.11/soundlib/Sndfile.cpp:1845:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char origName[MAX_SAMPLENAME];
data/libopenmpt-0.4.11/soundlib/Sndfile.h:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_szNames[MAX_SAMPLES][MAX_SAMPLENAME];		// Sample names
data/libopenmpt-0.4.11/soundlib/UMXTools.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];	// C1 83 2A 9E
data/libopenmpt-0.4.11/soundlib/WAVTools.cpp:441:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(memory.data() + position, data, numBytes);
data/libopenmpt-0.4.11/soundlib/WAVTools.cpp:626:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[MAX_SAMPLENAME];
data/libopenmpt-0.4.11/soundlib/WAVTools.cpp:630:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[MAX_SAMPLEFILENAME];
data/libopenmpt-0.4.11/soundlib/XMTools.cpp:289:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(signature, "Extended Instrument: ", 21);
data/libopenmpt-0.4.11/soundlib/XMTools.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     signature[17];		// "Extended Module: "
data/libopenmpt-0.4.11/soundlib/XMTools.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songName[20];		// Song Name, not null-terminated (any nulls are treated as spaces)
data/libopenmpt-0.4.11/soundlib/XMTools.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     trackerName[20];	// Software that was used to create the XM file
data/libopenmpt-0.4.11/soundlib/XMTools.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[22];			// Instrument Name, not null-terminated (any nulls are treated as spaces)
data/libopenmpt-0.4.11/soundlib/XMTools.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     signature[21];		// "Extended Instrument: "
data/libopenmpt-0.4.11/soundlib/XMTools.h:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[22];			// Instrument Name, not null-terminated (any nulls are treated as spaces)
data/libopenmpt-0.4.11/soundlib/XMTools.h:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     trackerName[20];	// Software that was used to create the XI file
data/libopenmpt-0.4.11/soundlib/XMTools.h:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[22];		// Sample Name, not null-terminated (any nulls are treated as spaces)
data/libopenmpt-0.4.11/soundlib/load_j2b.cpp:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     signature[4];		// MUSE
data/libopenmpt-0.4.11/soundlib/load_j2b.cpp:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     songname[64];
data/libopenmpt-0.4.11/soundlib/load_j2b.cpp:193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[28];
data/libopenmpt-0.4.11/soundlib/load_j2b.cpp:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[28];
data/libopenmpt-0.4.11/soundlib/load_j2b.cpp:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[32];
data/libopenmpt-0.4.11/soundlib/load_j2b.cpp:411:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     name[32];
data/libopenmpt-0.4.11/soundlib/modsmp_ctrl.cpp:64:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pNewSmp, smp.samplev(), silenceOffset);
data/libopenmpt-0.4.11/soundlib/modsmp_ctrl.cpp:68:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pNewSmp + silenceOffset + silenceBytes, smp.sampleb() + silenceOffset, smp.GetSampleSizeInBytes() - silenceOffset);
data/libopenmpt-0.4.11/soundlib/modsmp_ctrl.cpp:157:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pNewSmp, smp.sampleb(), newSmpBytes);
data/libopenmpt-0.4.11/soundlib/opal.h:261:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fd = fopen("exptab.txt", "wb");
data/libopenmpt-0.4.11/soundlib/opal.h:274:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = fopen("sintab.txt", "wb");
data/libopenmpt-0.4.11/soundlib/plugins/DigiBoosterEcho.cpp:91:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(m_pMixStruct->pluginData.data(), &m_chunk, sizeof(m_chunk));
data/libopenmpt-0.4.11/soundlib/plugins/DigiBoosterEcho.cpp:212:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&m_chunk, data, chunk.size());
data/libopenmpt-0.4.11/soundlib/plugins/DigiBoosterEcho.h:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  id[4];
data/libopenmpt-0.4.11/soundlib/plugins/DigiBoosterEcho.h:39:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(result.id, "Echo", 4);
data/libopenmpt-0.4.11/soundlib/plugins/DigiBoosterEcho.h:74:46:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	int32 GetUID() const override { int32le id; memcpy(&id, "Echo", 4); return id; }
data/libopenmpt-0.4.11/soundlib/plugins/LFOPlugin.cpp:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     magic[4];
data/libopenmpt-0.4.11/soundlib/plugins/LFOPlugin.cpp:327:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(chunk.magic, "LFO ", 4);
data/libopenmpt-0.4.11/soundlib/plugins/LFOPlugin.cpp:341:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(m_chunkData.data(), &chunk, sizeof(chunk));
data/libopenmpt-0.4.11/soundlib/plugins/LFOPlugin.h:77:44:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	int32 GetUID() const override { int32 id; memcpy(&id, "LFO ", 4); return id; }
data/libopenmpt-0.4.11/soundlib/plugins/PluginManager.cpp:249:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR keyname[128];
data/libopenmpt-0.4.11/soundlib/plugins/PluginManager.cpp:267:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						TCHAR name[64];
data/libopenmpt-0.4.11/soundlib/plugins/PluginStructs.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    szName[32];				// User-chosen plugin display name - this is locale ANSI!
data/libopenmpt-0.4.11/soundlib/plugins/PluginStructs.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    szLibraryName[64];		// original DLL name - this is UTF-8!
data/libopenmpt-0.4.11/soundlib/plugins/dmo/ParamEq.cpp:54:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out[0], in[0], numFrames * sizeof(float));
data/libopenmpt-0.4.11/soundlib/plugins/dmo/ParamEq.cpp:55:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out[1], in[1], numFrames * sizeof(float));
data/libopenmpt-0.4.11/soundlib/tuning.cpp:480:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char begin[8];
data/libopenmpt-0.4.11/soundlib/tuning.cpp:496:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char begin2[8];
data/libopenmpt-0.4.11/soundlib/tuning.cpp:572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char end2[8];
data/libopenmpt-0.4.11/soundlib/tuning.cpp:644:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char end[8];
data/libopenmpt-0.4.11/soundlib/tuning.h:31:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char s_FileExtension[5];
data/libopenmpt-0.4.11/soundlib/tuningcollection.h:31:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char s_FileExtension[4];
data/libopenmpt-0.4.11/test/test.cpp:1533:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	std::memcpy(&uuid2, uuiddata, 16);
data/libopenmpt-0.4.11/test/test.cpp:2533:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[4] = { 'x','x','x','x' };
data/libopenmpt-0.4.11/test/test.cpp:2541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[4] = { 'x','x','x','x' };
data/libopenmpt-0.4.11/test/test.cpp:2550:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[4] = { 'x','x','x','x' };
data/libopenmpt-0.4.11/test/test.cpp:2558:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[4] = { 'x','x','x','x' };
data/libopenmpt-0.4.11/test/test.cpp:2566:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char buf[4] = { 'f','o','o','b' };
data/libopenmpt-0.4.11/test/test.cpp:2758:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src_char[256];
data/libopenmpt-0.4.11/test/test.cpp:2759:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_wchar_t[256];
data/libopenmpt-0.4.11/test/test.cpp:2760:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR src_TCHAR[256];
data/libopenmpt-0.4.11/test/test.cpp:2762:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dst_char[256];
data/libopenmpt-0.4.11/test/test.cpp:2763:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_wchar_t[256];
data/libopenmpt-0.4.11/test/test.cpp:2764:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR dst_TCHAR[256];
data/libopenmpt-0.4.11/test/test.cpp:2770:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(src_char, "ab");
data/libopenmpt-0.4.11/test/test.cpp:2771:2:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
	wcscpy(src_wchar_t, L"ab");
data/libopenmpt-0.4.11/test/test.cpp:2772:2:  [2] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
	_tcscpy(src_TCHAR, _T("ab"));
data/libopenmpt-0.4.11/test/test.cpp:4290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src0[4] = { '\0', 'X', ' ', 'X' };		// Weird empty buffer
data/libopenmpt-0.4.11/test/test.cpp:4291:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src1[4] = { 'X', ' ', '\0', 'X' };		// Weird buffer (hello Impulse Tracker)
data/libopenmpt-0.4.11/test/test.cpp:4292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src2[4] = { 'X', 'Y', 'Z', ' ' };		// Full buffer, last character space
data/libopenmpt-0.4.11/test/test.cpp:4293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src3[4] = { 'X', 'Y', 'Z', '!' };		// Full buffer, last character non-space
data/libopenmpt-0.4.11/test/test.cpp:4294:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src4[4] = { 'x', 'y', '\t', '\n' };	// Full buffer containing non-space whitespace
data/libopenmpt-0.4.11/test/test.cpp:4295:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dst1[6];	// Destination buffer, larger than source buffer
data/libopenmpt-0.4.11/test/test.cpp:4296:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dst2[3];	// Destination buffer, smaller than source buffer
data/libopenmpt-0.4.11/common/Logging.cpp:70:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(std::strlen(g_FacilitySolo) > 0)
data/libopenmpt-0.4.11/common/Logging.cpp:77:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(std::strlen(g_FacilityBlocked) > 0)
data/libopenmpt-0.4.11/common/mptExceptionText.h:33:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(e.what() && (std::strlen(e.what()) > 0))
data/libopenmpt-0.4.11/common/mptExceptionText.h:36:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if(typeid(e).name() && (std::strlen(typeid(e).name()) > 0))
data/libopenmpt-0.4.11/common/mptIO.cpp:279:89:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
IO::Offset ReadRawImpl(std::istream & f, mpt::byte * data, std::size_t size) { return f.read(mpt::byte_cast<char *>(data), size) ? f.gcount() : std::streamsize(0); }
data/libopenmpt-0.4.11/common/mptIO.cpp:418:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	stream->read(mpt::byte_cast<char*>(dst), count);
data/libopenmpt-0.4.11/common/mptIO.cpp:579:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	stream->read(mpt::byte_cast<char*>(dst), count);
data/libopenmpt-0.4.11/common/mptIO.cpp:675:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if(!stream.read)
data/libopenmpt-0.4.11/common/mptIO.cpp:686:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int64 readcount = stream.read(stream.stream, dst, count);
data/libopenmpt-0.4.11/common/mptIO.cpp:719:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if(!stream.read)
data/libopenmpt-0.4.11/common/mptIO.cpp:727:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int64 readcount = stream.read(stream.stream, dst, count);
data/libopenmpt-0.4.11/common/mptIO.h:951:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t (*read)( void * stream, void * dst, std::size_t bytes );
data/libopenmpt-0.4.11/common/mptSpan.h:90:118:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	bool operator==(span const & other) const noexcept { return size() == other.size() && (m_beg == other.m_beg || std::equal(begin(), end(), other.begin())); }
data/libopenmpt-0.4.11/common/mptString.h:188:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return std::strlen(str);
data/libopenmpt-0.4.11/common/mptStringBuffer.h:648:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		std::strncpy(destBuffer, srcBuffer, copySize);
data/libopenmpt-0.4.11/common/mptWine.cpp:623:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			outputFile.read(&outputFileBuf[0], outputFileBuf.size());
data/libopenmpt-0.4.11/common/mptWine.cpp:640:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			errorFile.read(&errorFileBuf[0], errorFileBuf.size());
data/libopenmpt-0.4.11/common/serialization_utils.cpp:107:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		iStrm.read(&str[i], 1);
data/libopenmpt-0.4.11/common/serialization_utils.cpp:446:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		iStrm.read(storedIdBuf, storedIdLen);
data/libopenmpt-0.4.11/common/serialization_utils.cpp:599:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				iStrm.read(&m_Idarray[nOldEnd], nIdsize);
data/libopenmpt-0.4.11/examples/libopenmpt_example_c.c:95:7:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( wcslen( argv[1] ) == 0 ) {
data/libopenmpt-0.4.11/examples/libopenmpt_example_c.c:101:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strlen( argv[1] ) == 0 ) {
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_mem.c:186:7:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( wcslen( argv[1] ) == 0 ) {
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_mem.c:191:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strlen( argv[1] ) == 0 ) {
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_probe.c:59:7:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( wcslen( filename ) == 0 ) {
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_probe.c:64:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strlen( filename ) == 0 ) {
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_stdout.c:108:7:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( wcslen( argv[1] ) == 0 ) {
data/libopenmpt-0.4.11/examples/libopenmpt_example_c_stdout.c:114:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strlen( argv[1] ) == 0 ) {
data/libopenmpt-0.4.11/examples/libopenmpt_example_cxx.cpp:68:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			std::size_t count = mod.read( samplerate, buffersize, left.data(), right.data() );
data/libopenmpt-0.4.11/libmodplug/sndfile.h:605:33:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	void GetTitle(LPSTR s) const { lstrcpyn(s,m_szNames[0],32); }
data/libopenmpt-0.4.11/libmodplug/stdafx.h:95:9:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define lstrcpyn strncpy
data/libopenmpt-0.4.11/libmodplug/stdafx.h:95:18:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define lstrcpyn strncpy
data/libopenmpt-0.4.11/libopenmpt/libopenmpt.h:306:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	openmpt_stream_read_func read;
data/libopenmpt-0.4.11/libopenmpt/libopenmpt.hpp:588:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, std::int16_t * mono );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt.hpp:602:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, std::int16_t * left, std::int16_t * right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt.hpp:618:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, std::int16_t * left, std::int16_t * right, std::int16_t * rear_left, std::int16_t * rear_right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt.hpp:631:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, float * mono );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt.hpp:645:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, float * left, float * right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt.hpp:661:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, float * left, float * right, float * rear_left, float * rear_right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:37:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * dst = (char*)std::calloc( std::strlen( src ) + 1, sizeof( char ) );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:468:73:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		openmpt::callback_stream_wrapper istream = { stream, stream_callbacks.read, stream_callbacks.seek, stream_callbacks.tell };
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:505:73:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		openmpt::callback_stream_wrapper istream = { stream, stream_callbacks.read, stream_callbacks.seek, stream_callbacks.tell };
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:542:74:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			openmpt::callback_stream_wrapper istream = { stream, stream_callbacks.read, stream_callbacks.seek, stream_callbacks.tell };
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:808:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return mod->impl->read( samplerate, count, mono );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:817:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return mod->impl->read( samplerate, count, left, right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:826:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return mod->impl->read( samplerate, count, left, right, rear_left, rear_right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:835:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return mod->impl->read( samplerate, count, mono );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:844:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return mod->impl->read( samplerate, count, left, right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:853:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return mod->impl->read( samplerate, count, left, right, rear_left, rear_right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_c.cpp:1324:74:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			openmpt::callback_stream_wrapper istream = { stream, stream_callbacks.read, stream_callbacks.seek, stream_callbacks.tell };
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:42:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	text = static_cast<char*>( std::malloc( std::strlen( text_ ) + 1 ) );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:44:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		std::memcpy( text, text_, std::strlen( text_ ) + 1 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:65:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	text = static_cast<char*>( std::malloc( std::strlen( text_ ) + 1 ) );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:67:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		std::memcpy( text, text_, std::strlen( text_ ) + 1 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:249:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module::read( std::int32_t samplerate, std::size_t count, std::int16_t * mono ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:250:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return impl->read( samplerate, count, mono );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:252:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module::read( std::int32_t samplerate, std::size_t count, std::int16_t * left, std::int16_t * right ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:253:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return impl->read( samplerate, count, left, right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:255:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module::read( std::int32_t samplerate, std::size_t count, std::int16_t * left, std::int16_t * right, std::int16_t * rear_left, std::int16_t * rear_right ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:256:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return impl->read( samplerate, count, left, right, rear_left, rear_right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:258:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module::read( std::int32_t samplerate, std::size_t count, float * mono ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:259:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return impl->read( samplerate, count, mono );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:261:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module::read( std::int32_t samplerate, std::size_t count, float * left, float * right ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:262:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return impl->read( samplerate, count, left, right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:264:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module::read( std::int32_t samplerate, std::size_t count, float * left, float * right, float * rear_left, float * rear_right ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_cxx.cpp:265:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return impl->read( samplerate, count, left, right, rear_left, rear_right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:660:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	fstream.read = stream.read;
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:756:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		stream.read( buffer + size_read, size_toread );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:792:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ( !stream.read ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:797:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	fstream.read = stream.read;
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:803:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::size_t read_count = stream.read( stream.stream, buffer + size_read, size_toread );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:830:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	fstream.read = stream.read;
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:922:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module_impl::read( std::int32_t samplerate, std::size_t count, std::int16_t * mono ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:931:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module_impl::read( std::int32_t samplerate, std::size_t count, std::int16_t * left, std::int16_t * right ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:940:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module_impl::read( std::int32_t samplerate, std::size_t count, std::int16_t * left, std::int16_t * right, std::int16_t * rear_left, std::int16_t * rear_right ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:949:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module_impl::read( std::int32_t samplerate, std::size_t count, float * mono ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:958:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module_impl::read( std::int32_t samplerate, std::size_t count, float * left, float * right ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.cpp:967:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
std::size_t module_impl::read( std::int32_t samplerate, std::size_t count, float * left, float * right, float * rear_left, float * rear_right ) {
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.hpp:68:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t (*read)( void * stream, void * dst, std::size_t bytes );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.hpp:162:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, std::int16_t * mono );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.hpp:163:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, std::int16_t * left, std::int16_t * right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.hpp:164:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, std::int16_t * left, std::int16_t * right, std::int16_t * rear_left, std::int16_t * rear_right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.hpp:165:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, float * mono );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.hpp:166:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, float * left, float * right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_impl.hpp:167:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read( std::int32_t samplerate, std::size_t count, float * left, float * right, float * rear_left, float * rear_right );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:145:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		file->name = malloc(strlen(name)+1);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:152:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		file->name = malloc(strlen("")+1);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:154:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(file->name,"");
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:159:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		file->message = malloc(strlen(message)+1);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:166:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		file->message = malloc(strlen("")+1);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:168:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(file->message,"");
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:486:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buf,str,31);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:490:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buff,buf,32);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:492:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (unsigned int)strlen(buf);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:503:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buf,str,31);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:507:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buff,buf,32);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug.c:509:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (unsigned int)strlen(buf);
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:191:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		std::strncpy( m_szNames[0], mod->get_metadata("title").c_str(), sizeof( m_szNames[0] ) - 1 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:312:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			std::strncpy( buf, names[ nSample - 1 ].c_str(), 31 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:316:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		std::strncpy( s, buf, 32 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:318:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return static_cast<UINT>( std::strlen( buf ) );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:328:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			std::strncpy( buf, names[ nInstr - 1 ].c_str(), 31 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:332:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		std::strncpy( s, buf, 32 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:334:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return static_cast<UINT>( std::strlen( buf ) );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:632:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	std::strncpy( s, mod->get_metadata("message").c_str(), cbsize );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:634:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return static_cast<UINT>( std::strlen( s ) + 1 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:650:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	std::strncpy( s, mod->get_metadata("message_raw").c_str(), cbsize );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:652:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return static_cast<UINT>( std::strlen( s ) + 1 );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_modplug_cpp.cpp:740:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		frames_rendered = mod->read( get_samplerate(), frames_torender, out );
data/libopenmpt-0.4.11/libopenmpt/libopenmpt_stream_callbacks_fd.h:66:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		retval = read( fd, dst, bytes );
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1156:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if ( read( STDIN_FILENO, &c, 1 ) != 1 ) {
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1182:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			case 1: count = mod.read( flags.samplerate, bufsize, left.data() ); break;
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1183:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			case 2: count = mod.read( flags.samplerate, bufsize, left.data(), right.data() ); break;
data/libopenmpt-0.4.11/openmpt123/openmpt123.cpp:1184:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			case 4: count = mod.read( flags.samplerate, bufsize, left.data(), right.data(), rear_left.data(), rear_right.data() ); break;
data/libopenmpt-0.4.11/openmpt123/openmpt123_pulseaudio.hpp:35:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( std::strlen(str) == 0 ) {
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:1709:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(&s[strlen(s)], " (%s", pDlsIns->szName);
data/libopenmpt-0.4.11/soundlib/Dlsbank.cpp:1710:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t n = strlen(s);
data/libopenmpt-0.4.11/soundlib/Load_mt2.cpp:684:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					const size_t len = strlen(mixPlug.Info.szLibraryName);
data/libopenmpt-0.4.11/soundlib/Load_wav.cpp:139:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(m_szNames[channel + 1], "");
data/libopenmpt-0.4.11/soundlib/SampleFormatFLAC.cpp:170:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(client.sndFile.m_szNames[client.sample], "");
data/libopenmpt-0.4.11/soundlib/SampleFormatMP3.cpp:659:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(m_szNames[sample], "");
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:434:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(m_szNames[nSample], "");
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:2886:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(m_szNames[nSample], "");
data/libopenmpt-0.4.11/soundlib/SampleFormats.cpp:3426:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(m_szNames[nSample], "");
data/libopenmpt-0.4.11/soundlib/Sndfile.cpp:1387:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy(m_szNames[nSmp], "");
data/libopenmpt-0.4.11/soundlib/Tables.cpp:180:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	std::size_t lena = std::strlen(a);
data/libopenmpt-0.4.11/soundlib/Tables.cpp:181:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	std::size_t lenb = std::strlen(b);
data/libopenmpt-0.4.11/soundlib/UMXTools.cpp:80:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	std::size_t name_len = std::strlen(name);
data/libopenmpt-0.4.11/soundlib/XMTools.cpp:413:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(mptSmp.filename, "");
data/libopenmpt-0.4.11/soundlib/modsmp_ctrl.cpp:399:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(sndFile.m_szNames[i], "");
data/libopenmpt-0.4.11/soundlib/modsmp_ctrl.cpp:400:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(sample.filename, "");
data/libopenmpt-0.4.11/soundlib/plugins/dmo/DMOPlugin.cpp:532:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							text += wcslen(text) + 1;
data/libopenmpt-0.4.11/soundlib/tuning.cpp:482:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	inStrm.read(begin, sizeof(begin));
data/libopenmpt-0.4.11/soundlib/tuning.cpp:498:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	inStrm.read(begin2, sizeof(begin2));
data/libopenmpt-0.4.11/soundlib/tuning.cpp:574:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	inStrm.read(end2, sizeof(end2));
data/libopenmpt-0.4.11/soundlib/tuning.cpp:646:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	inStrm.read(reinterpret_cast<char*>(&end), sizeof(end));
data/libopenmpt-0.4.11/test/test.cpp:1490:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		VERIFY_EQUAL(strlen(spec->commands), (size_t)MAX_EFFECTS);
data/libopenmpt-0.4.11/test/test.cpp:1491:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		VERIFY_EQUAL(strlen(spec->volcommands), (size_t)MAX_VOLCMDS);
data/libopenmpt-0.4.11/test/test.cpp:1601:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		s.read(&a, 1);
data/libopenmpt-0.4.11/test/test.cpp:4302:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for(size_t i = strlen(dst); i < mpt::size(dst); i++) \
data/libopenmpt-0.4.11/test/test.cpp:4307:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for(size_t i = strlen(dst); i < mpt::size(dst); i++) \

ANALYSIS SUMMARY:

Hits = 681
Lines analyzed = 135642 in approximately 3.22 seconds (42090 lines/second)
Physical Source Lines of Code (SLOC) = 103571
Hits@level = [0]  72 [1] 141 [2] 421 [3]  82 [4]  37 [5]   0
Hits@level+ = [0+] 753 [1+] 681 [2+] 540 [3+] 119 [4+]  37 [5+]   0
Hits/KSLOC@level+ = [0+] 7.27037 [1+] 6.5752 [2+] 5.21381 [3+] 1.14897 [4+] 0.357243 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.