Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/macutils-2.0b3/comm/zm_to.c
Examining data/macutils-2.0b3/comm/zm_from.c
Examining data/macutils-2.0b3/comm/ym_to.c
Examining data/macutils-2.0b3/comm/ym_from.c
Examining data/macutils-2.0b3/comm/xm_to.c
Examining data/macutils-2.0b3/comm/tty.c
Examining data/macutils-2.0b3/comm/globals.c
Examining data/macutils-2.0b3/comm/tomac.c
Examining data/macutils-2.0b3/comm/globals.h
Examining data/macutils-2.0b3/comm/protocol.h
Examining data/macutils-2.0b3/comm/frommac.c
Examining data/macutils-2.0b3/comm/xm_from.c
Examining data/macutils-2.0b3/comm/comm.h
Examining data/macutils-2.0b3/binhex/dofile.c
Examining data/macutils-2.0b3/binhex/binhex.c
Examining data/macutils-2.0b3/mixed/macbinary.c
Examining data/macutils-2.0b3/mixed/globals.h
Examining data/macutils-2.0b3/mixed/mcb.c
Examining data/macutils-2.0b3/mixed/macstream.c
Examining data/macutils-2.0b3/mixed/globals.c
Examining data/macutils-2.0b3/mixed/dir.c
Examining data/macutils-2.0b3/mixed/macsave.c
Examining data/macutils-2.0b3/hexbin/hexbin.h
Examining data/macutils-2.0b3/hexbin/hecx.c
Examining data/macutils-2.0b3/hexbin/printhdr.h
Examining data/macutils-2.0b3/hexbin/mu.c
Examining data/macutils-2.0b3/hexbin/buffer.h
Examining data/macutils-2.0b3/hexbin/readline.c
Examining data/macutils-2.0b3/hexbin/hqx.c
Examining data/macutils-2.0b3/hexbin/printhdr.c
Examining data/macutils-2.0b3/hexbin/readline.h
Examining data/macutils-2.0b3/hexbin/dl.c
Examining data/macutils-2.0b3/hexbin/crc.h
Examining data/macutils-2.0b3/hexbin/globals.h
Examining data/macutils-2.0b3/hexbin/globals.c
Examining data/macutils-2.0b3/hexbin/crc.c
Examining data/macutils-2.0b3/hexbin/hexbin.c
Examining data/macutils-2.0b3/hexbin/buffer.c
Examining data/macutils-2.0b3/macunpack/de_lzh.c
Examining data/macutils-2.0b3/macunpack/dd.c
Examining data/macutils-2.0b3/macunpack/dd.h
Examining data/macutils-2.0b3/macunpack/macunpack.h
Examining data/macutils-2.0b3/macunpack/jdw.h
Examining data/macutils-2.0b3/macunpack/jdw.c
Examining data/macutils-2.0b3/macunpack/arc.h
Examining data/macutils-2.0b3/macunpack/dia.h
Examining data/macutils-2.0b3/macunpack/dia.c
Examining data/macutils-2.0b3/macunpack/de_compress.c
Examining data/macutils-2.0b3/macunpack/de_huffman.c
Examining data/macutils-2.0b3/macunpack/macunpack.c
Examining data/macutils-2.0b3/macunpack/zmahdr.h
Examining data/macutils-2.0b3/macunpack/bits_be.c
Examining data/macutils-2.0b3/macunpack/bits_be.h
Examining data/macutils-2.0b3/macunpack/stf.h
Examining data/macutils-2.0b3/macunpack/zma.h
Examining data/macutils-2.0b3/macunpack/sit.h
Examining data/macutils-2.0b3/macunpack/huffman.h
Examining data/macutils-2.0b3/macunpack/cpt.h
Examining data/macutils-2.0b3/macunpack/stf.c
Examining data/macutils-2.0b3/macunpack/pit.h
Examining data/macutils-2.0b3/macunpack/globals.h
Examining data/macutils-2.0b3/macunpack/crc.h
Examining data/macutils-2.0b3/macunpack/bin.c
Examining data/macutils-2.0b3/macunpack/dir.c
Examining data/macutils-2.0b3/macunpack/crc.c
Examining data/macutils-2.0b3/macunpack/globals.c
Examining data/macutils-2.0b3/macunpack/macbinary.c
Examining data/macutils-2.0b3/macunpack/lzc.c
Examining data/macutils-2.0b3/macunpack/lzh.c
Examining data/macutils-2.0b3/macunpack/zma.c
Examining data/macutils-2.0b3/macunpack/cpt.c
Examining data/macutils-2.0b3/macunpack/mcb.c
Examining data/macutils-2.0b3/macunpack/lzc.h
Examining data/macutils-2.0b3/macunpack/sit.c
Examining data/macutils-2.0b3/macunpack/pit.c
Examining data/macutils-2.0b3/macunpack/de_lzah.c
Examining data/macutils-2.0b3/macunpack/lzh.h
Examining data/macutils-2.0b3/fileio/rdfileopt.h
Examining data/macutils-2.0b3/fileio/kind.h
Examining data/macutils-2.0b3/fileio/appledouble.h
Examining data/macutils-2.0b3/fileio/rdfile.h
Examining data/macutils-2.0b3/fileio/rdfile.c
Examining data/macutils-2.0b3/fileio/fileglob.c
Examining data/macutils-2.0b3/fileio/aufs.h
Examining data/macutils-2.0b3/fileio/wrfileopt.h
Examining data/macutils-2.0b3/fileio/machdr.h
Examining data/macutils-2.0b3/fileio/wrfile.c
Examining data/macutils-2.0b3/fileio/fileglob.h
Examining data/macutils-2.0b3/fileio/wrfile.h
Examining data/macutils-2.0b3/util/transname.c
Examining data/macutils-2.0b3/util/curtime.h
Examining data/macutils-2.0b3/util/backtrans.c
Examining data/macutils-2.0b3/util/masks.h
Examining data/macutils-2.0b3/util/patchlevel.h
Examining data/macutils-2.0b3/util/util.h
Examining data/macutils-2.0b3/util/util.c
Examining data/macutils-2.0b3/crc/makecrc.c

FINAL RESULTS:

data/macutils-2.0b3/binhex/binhex.c:8:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat();
data/macutils-2.0b3/binhex/binhex.c:36:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, get_rdfileopt());
data/macutils-2.0b3/binhex/binhex.c:37:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, LOCALOPT);
data/macutils-2.0b3/comm/frommac.c:36:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, get_wrfileopt());
data/macutils-2.0b3/comm/frommac.c:37:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, LOCALOPT);
data/macutils-2.0b3/comm/tomac.c:10:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat();
data/macutils-2.0b3/comm/tomac.c:39:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, get_rdfileopt());
data/macutils-2.0b3/comm/tomac.c:40:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, LOCALOPT);
data/macutils-2.0b3/crc/makecrc.c:36:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat();
data/macutils-2.0b3/crc/makecrc.c:63:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(buf, name);
data/macutils-2.0b3/fileio/rdfile.c:47:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char *strcpy();
data/macutils-2.0b3/fileio/rdfile.c:49:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat();
data/macutils-2.0b3/fileio/rdfile.c:226:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    (void)strcat(filename, infodir);
data/macutils-2.0b3/fileio/rdfile.c:228:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    (void)strcat(filename, current_files->files[i]);
data/macutils-2.0b3/fileio/rdfile.c:239:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    (void)strcat(filename, current_files->files[i]);
data/macutils-2.0b3/fileio/rdfile.c:256:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    (void)strcat(filename, current_files->files[i]);
data/macutils-2.0b3/fileio/rdfile.c:258:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    (void)strcpy(filename1, filename);
data/macutils-2.0b3/fileio/rdfile.c:279:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    (void)strcat(filename, current_files->files[i]);
data/macutils-2.0b3/fileio/rdfile.c:317:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(filename, current_files->files[i]);
data/macutils-2.0b3/fileio/rdfile.c:361:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void)strcpy(file_info + I_NAMEOFF + 1, filename);
data/macutils-2.0b3/fileio/rdfile.c:547:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void)strcpy(filename1, infodir);
data/macutils-2.0b3/fileio/rdfile.c:549:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(filename1, filename);
data/macutils-2.0b3/fileio/rdfile.c:555:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void)strcpy(filename1, rsrcdir);
data/macutils-2.0b3/fileio/rdfile.c:557:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(filename1, filename);
data/macutils-2.0b3/fileio/rdfile.c:606:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void)strcpy(filename1, infodir);
data/macutils-2.0b3/fileio/rdfile.c:608:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(filename1, filename);
data/macutils-2.0b3/fileio/rdfile.c:674:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void)strcpy(file_info + I_NAMEOFF + 1, filename);
data/macutils-2.0b3/fileio/rdfile.c:691:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void)strcpy(filetable + cursize, curentry->d_name);
data/macutils-2.0b3/fileio/rdfile.c:720:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(filename1, infodir);
data/macutils-2.0b3/fileio/rdfile.c:722:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(filename1, filename);
data/macutils-2.0b3/fileio/rdfile.c:729:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void)strcpy(filename1, infodir);
data/macutils-2.0b3/fileio/wrfile.c:40:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char *strcpy();
data/macutils-2.0b3/fileio/wrfile.c:42:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat();
data/macutils-2.0b3/fileio/wrfile.c:46:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
char *sprintf();
data/macutils-2.0b3/fileio/wrfile.c:112:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_info, "%s.info", text);
data/macutils-2.0b3/fileio/wrfile.c:113:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_rsrc, "%s.rsrc", text);
data/macutils-2.0b3/fileio/wrfile.c:114:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_data, "%s.data", text);
data/macutils-2.0b3/fileio/wrfile.c:115:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_text, "%s.text", text);
data/macutils-2.0b3/fileio/wrfile.c:116:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_bin, "%s.bin", text);
data/macutils-2.0b3/fileio/wrfile.c:117:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_unix, "%s", text);
data/macutils-2.0b3/fileio/wrfile.c:384:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void)strcpy(share_name, name);
data/macutils-2.0b3/fileio/wrfile.c:387:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void)strcpy(share_name, name);
data/macutils-2.0b3/fileio/wrfile.c:396:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(command, "mkdir %s", share_name);
data/macutils-2.0b3/fileio/wrfile.c:397:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if((sysreturn = system(command)) != 0) {
data/macutils-2.0b3/fileio/wrfile.c:441:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(dirinfo, infodir);
data/macutils-2.0b3/fileio/wrfile.c:443:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(dirinfo, share_name);
data/macutils-2.0b3/fileio/wrfile.c:479:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(dirinfo, infodir);
data/macutils-2.0b3/fileio/wrfile.c:565:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_info_aufs, "%s/%s", infodir, share_name);
data/macutils-2.0b3/fileio/wrfile.c:566:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_rsrc_aufs, "%s/%s", rsrcdir, share_name);
data/macutils-2.0b3/fileio/wrfile.c:567:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_data, "%s", share_name);
data/macutils-2.0b3/fileio/wrfile.c:628:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_info_appledouble, "%s/%s", infodir, share_name);
data/macutils-2.0b3/fileio/wrfile.c:629:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(f_data, "%s", share_name);
data/macutils-2.0b3/hexbin/hexbin.c:53:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, get_wrfileopt());
data/macutils-2.0b3/hexbin/hexbin.c:54:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, LOCALOPT);
data/macutils-2.0b3/hexbin/hexbin.c:180:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    (void)sprintf(namebuf, "%s%s", filename, *ep);
data/macutils-2.0b3/macunpack/dd.c:14:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char *strcpy();
data/macutils-2.0b3/macunpack/dd.c:189:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void)strcpy(locname, text);
data/macutils-2.0b3/macunpack/macunpack.c:11:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat();
data/macutils-2.0b3/macunpack/macunpack.c:40:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, get_wrfileopt());
data/macutils-2.0b3/macunpack/macunpack.c:41:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, LOCALOPT);
data/macutils-2.0b3/mixed/macsave.c:9:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat();
data/macutils-2.0b3/mixed/macsave.c:27:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, get_wrfileopt());
data/macutils-2.0b3/mixed/macsave.c:28:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, LOCALOPT);
data/macutils-2.0b3/mixed/macstream.c:9:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat();
data/macutils-2.0b3/mixed/macstream.c:35:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, get_rdfileopt());
data/macutils-2.0b3/mixed/macstream.c:36:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(options, LOCALOPT);
data/macutils-2.0b3/binhex/binhex.c:40:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while((c = getopt(argc, argv, options)) != EOF) {
data/macutils-2.0b3/comm/frommac.c:40:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while((c = getopt(argc, argv, options)) != EOF) {
data/macutils-2.0b3/comm/tomac.c:43:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while((c = getopt(argc, argv, options)) != EOF) {
data/macutils-2.0b3/hexbin/hexbin.c:59:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while((c = getopt(argc, argv, options)) != EOF) {
data/macutils-2.0b3/macunpack/macunpack.c:44:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while((c = getopt(argc, argv, options)) != EOF) {
data/macutils-2.0b3/mixed/macsave.c:31:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while((c = getopt(argc, argv, options)) != EOF) {
data/macutils-2.0b3/mixed/macstream.c:39:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while((c = getopt(argc, argv, options)) != EOF) {
data/macutils-2.0b3/binhex/binhex.c:18:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char options[128];
data/macutils-2.0b3/binhex/binhex.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text[32], ftype[5], fauth[5];
data/macutils-2.0b3/comm/frommac.c:19:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char options[128];
data/macutils-2.0b3/comm/frommac.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tname[64];
data/macutils-2.0b3/comm/frommac.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fauth[5];
data/macutils-2.0b3/comm/frommac.c:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5];
data/macutils-2.0b3/comm/tomac.c:22:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char options[128];
data/macutils-2.0b3/comm/tomac.c:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text[32], ftype[5], fauth[5];
data/macutils-2.0b3/comm/xm_from.c:18:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char info[INFOBYTES];
data/macutils-2.0b3/comm/xm_from.c:23:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char text[64];
data/macutils-2.0b3/crc/makecrc.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[20];
data/macutils-2.0b3/crc/makecrc.c:64:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    (void)strcat(buf, ".c");
data/macutils-2.0b3/crc/makecrc.c:65:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fd = fopen(buf, "w")) == NULL) {
data/macutils-2.0b3/fileio/appledouble.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_magic[4];	/* magic header */
data/macutils-2.0b3/fileio/appledouble.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_version[2];	/* version number */
data/macutils-2.0b3/fileio/appledouble.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill1[4];	/* = 0, ???? */
data/macutils-2.0b3/fileio/appledouble.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill2[4];	/* = 0, ???? */
data/macutils-2.0b3/fileio/appledouble.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill3[4];	/* = 0, ???? */
data/macutils-2.0b3/fileio/appledouble.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill4[4];	/* = 0, ???? */
data/macutils-2.0b3/fileio/appledouble.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill5[4];	/* = 5, ???? */
data/macutils-2.0b3/fileio/appledouble.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill6[4];	/* = 2, ???? */
data/macutils-2.0b3/fileio/appledouble.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_hlen[4];	/* = 589, header length */
data/macutils-2.0b3/fileio/appledouble.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_rsrc[4];	/* resource length */
data/macutils-2.0b3/fileio/appledouble.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill7[4];	/* = 3, ???? */
data/macutils-2.0b3/fileio/appledouble.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_namptr[4];	/* = 86, filename pointer */
data/macutils-2.0b3/fileio/appledouble.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_namlen[4];	/* Mac filename length */
data/macutils-2.0b3/fileio/appledouble.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill9[4];	/* = 4, ???? */
data/macutils-2.0b3/fileio/appledouble.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_commptr[4];	/* = 341, comment pointer */
data/macutils-2.0b3/fileio/appledouble.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_commsize[4];	/* = 0, comment size */
data/macutils-2.0b3/fileio/appledouble.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill12[4];	/* = 7, ???? */
data/macutils-2.0b3/fileio/appledouble.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_timeptr[4];	/* = 541, pointer to times */
data/macutils-2.0b3/fileio/appledouble.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_timesize[4];	/* = 16, size of times */
data/macutils-2.0b3/fileio/appledouble.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill15[4];	/* = 9, ???? */
data/macutils-2.0b3/fileio/appledouble.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_infoptr[4];	/* = 557, finder info pointer */
data/macutils-2.0b3/fileio/appledouble.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_infosize[4];	/* = 32, finder info size */
data/macutils-2.0b3/fileio/appledouble.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_name[255];	/* Macintosh filename */
data/macutils-2.0b3/fileio/appledouble.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_comment[200];/* = 0, Comment */
data/macutils-2.0b3/fileio/appledouble.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_ctime[4];	/* Creation time (Unix time) */
data/macutils-2.0b3/fileio/appledouble.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_mtime[4];	/* Modification time (Unix time) */
data/macutils-2.0b3/fileio/appledouble.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill19[4];	/* = 0, ???? */
data/macutils-2.0b3/fileio/appledouble.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_fill20[4];	/* = 0, ???? */
data/macutils-2.0b3/fileio/appledouble.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_type[4];	/* File type */
data/macutils-2.0b3/fileio/appledouble.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_auth[4];	/* File creator */
data/macutils-2.0b3/fileio/appledouble.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fi_finfo[24];	/* Finder info */
data/macutils-2.0b3/fileio/aufs.h:15:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fi_fndr[FINFOLEN];	/* finder info */
data/macutils-2.0b3/fileio/aufs.h:21:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fi_shortfilename[12+1];	/* possible short file name */
data/macutils-2.0b3/fileio/aufs.h:22:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fi_macfilename[32+1];	/* possible macintosh file name */
data/macutils-2.0b3/fileio/aufs.h:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fi_comnt[MAXCLEN+1];	/* comment string */
data/macutils-2.0b3/fileio/aufs.h:28:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fi_ctime[4];		/* mac file create time */
data/macutils-2.0b3/fileio/aufs.h:29:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fi_mtime[4];		/* mac file modify time */
data/macutils-2.0b3/fileio/aufs.h:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	fi_utime[4];		/* (real) time mtime was set */
data/macutils-2.0b3/fileio/rdfile.c:58:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file_info[INFOBYTES];
data/macutils-2.0b3/fileio/rdfile.c:79:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_auth[5];
data/macutils-2.0b3/fileio/rdfile.c:80:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_type[5];
data/macutils-2.0b3/fileio/rdfile.c:95:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filename[255];
data/macutils-2.0b3/fileio/rdfile.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[255], filename1[255];
data/macutils-2.0b3/fileio/rdfile.c:240:12:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    (void)strcat(filename, ".info");
data/macutils-2.0b3/fileio/rdfile.c:259:12:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    (void)strcat(filename, ".data");
data/macutils-2.0b3/fileio/rdfile.c:260:12:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    (void)strcat(filename1, ".rsrc");
data/macutils-2.0b3/fileio/rdfile.c:281:12:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    (void)strcat(filename, ".info");
data/macutils-2.0b3/fileio/rdfile.c:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename1[255];
data/macutils-2.0b3/fileio/rdfile.c:387:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    if((fd = fopen(filename, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:418:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    if((fd = fopen(filename, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:438:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	(void)strcat(filename, ".info");
data/macutils-2.0b3/fileio/rdfile.c:441:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fd = fopen(filename, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:469:12:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    (void)strcat(filename, ".data");
data/macutils-2.0b3/fileio/rdfile.c:470:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    if((fd = fopen(filename, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:481:12:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    (void)strcat(filename, ".rsrc");
data/macutils-2.0b3/fileio/rdfile.c:482:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    if((fd = fopen(filename, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:493:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fd = fopen(filename, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:550:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fd = fopen(filename1, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:570:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if((fd = fopen(filename1, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:593:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if((fd = fopen(filename, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:609:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fd = fopen(filename1, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:641:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if((fd = fopen(filename, "r")) == NULL) {
data/macutils-2.0b3/fileio/rdfile.c:668:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename1[255];
data/macutils-2.0b3/fileio/rdfile.c:710:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fd = fopen(f_name, "r")) != NULL) {
data/macutils-2.0b3/fileio/rdfile.c:719:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	(void)strcpy(filename1, "../");
data/macutils-2.0b3/fileio/rdfile.c:723:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fd = fopen(filename1, "r")) != NULL) {
data/macutils-2.0b3/fileio/rdfile.c:730:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	(void)strcat(filename1, "/.Parent");
data/macutils-2.0b3/fileio/rdfile.c:731:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fd = fopen(filename1, "r")) != NULL) {
data/macutils-2.0b3/fileio/rdfile.c:739:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fd = fopen(f_name, "r")) != NULL) {
data/macutils-2.0b3/fileio/rdfile.c:794:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(theinfo.fi_fndr, file_info + I_TYPEOFF, 4);
data/macutils-2.0b3/fileio/rdfile.c:795:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(theinfo.fi_fndr + 4, file_info + I_AUTHOFF, 4);
data/macutils-2.0b3/fileio/rdfile.c:796:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(theinfo.fi_fndr + 8, file_info + I_FLAGOFF, 2);
data/macutils-2.0b3/fileio/rdfile.c:858:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(theinfo.fi_type, file_info + I_TYPEOFF, 4);
data/macutils-2.0b3/fileio/rdfile.c:859:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(theinfo.fi_auth, file_info + I_AUTHOFF, 4);
data/macutils-2.0b3/fileio/rdfile.c:860:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(theinfo.fi_finfo, file_info + I_FLAGOFF, 2);
data/macutils-2.0b3/fileio/rdfile.c:944:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char name[32];
data/macutils-2.0b3/fileio/rdfile.h:6:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char file_info[INFOBYTES];
data/macutils-2.0b3/fileio/wrfile.c:65:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(src,dest,length)	memcpy((dest),(src),(length))
data/macutils-2.0b3/fileio/wrfile.c:65:32:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(src,dest,length)	memcpy((dest),(src),(length))
data/macutils-2.0b3/fileio/wrfile.c:73:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_info[I_NAMELEN];
data/macutils-2.0b3/fileio/wrfile.c:74:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_data[I_NAMELEN*3];
data/macutils-2.0b3/fileio/wrfile.c:75:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_rsrc[I_NAMELEN];
data/macutils-2.0b3/fileio/wrfile.c:76:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_text[I_NAMELEN];
data/macutils-2.0b3/fileio/wrfile.c:77:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_unix[I_NAMELEN];
data/macutils-2.0b3/fileio/wrfile.c:78:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_bin[I_NAMELEN];
data/macutils-2.0b3/fileio/wrfile.c:80:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char share_name[256];
data/macutils-2.0b3/fileio/wrfile.c:89:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_info_aufs[I_NAMELEN*3+INFOSZ];
data/macutils-2.0b3/fileio/wrfile.c:90:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_rsrc_aufs[I_NAMELEN*3+RSRCSZ];
data/macutils-2.0b3/fileio/wrfile.c:95:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char f_info_appledouble[I_NAMELEN*3+INFOSZ];
data/macutils-2.0b3/fileio/wrfile.c:103:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char init_buffer[128];
data/macutils-2.0b3/fileio/wrfile.c:150:11:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)bcopy(info, ptr, 128);
data/macutils-2.0b3/fileio/wrfile.c:184:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_info, "w");
data/macutils-2.0b3/fileio/wrfile.c:192:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fp = fopen(f_rsrc, "w");
data/macutils-2.0b3/fileio/wrfile.c:201:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fp = fopen(f_data, "w");
data/macutils-2.0b3/fileio/wrfile.c:211:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_rsrc, "w");
data/macutils-2.0b3/fileio/wrfile.c:220:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_data, "w");
data/macutils-2.0b3/fileio/wrfile.c:229:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_text, "w");
data/macutils-2.0b3/fileio/wrfile.c:244:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_unix, "w");
data/macutils-2.0b3/fileio/wrfile.c:259:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_bin, "w");
data/macutils-2.0b3/fileio/wrfile.c:285:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_info_aufs, "w");
data/macutils-2.0b3/fileio/wrfile.c:292:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_rsrc_aufs, "w");
data/macutils-2.0b3/fileio/wrfile.c:299:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_data, "w");
data/macutils-2.0b3/fileio/wrfile.c:310:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_info_appledouble, "w");
data/macutils-2.0b3/fileio/wrfile.c:318:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_data, "w");
data/macutils-2.0b3/fileio/wrfile.c:361:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[21]; /* Systems without mkdir system call but more than 14
data/macutils-2.0b3/fileio/wrfile.c:366:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char dirinfo[I_NAMELEN*3+INFOSZ+10];
data/macutils-2.0b3/fileio/wrfile.c:381:8:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void)bcopy(header, buffer, INFOBYTES);
data/macutils-2.0b3/fileio/wrfile.c:440:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	(void)strcat(dirinfo, "../");
data/macutils-2.0b3/fileio/wrfile.c:444:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(dirinfo, "w");
data/macutils-2.0b3/fileio/wrfile.c:452:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_folder, "w");
data/macutils-2.0b3/fileio/wrfile.c:480:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	(void)strcat(dirinfo, "/.Parent");
data/macutils-2.0b3/fileio/wrfile.c:481:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(dirinfo, "w");
data/macutils-2.0b3/fileio/wrfile.c:490:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f_folder, "w");
data/macutils-2.0b3/fileio/wrfile.c:502:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(f_folder, "w");
data/macutils-2.0b3/fileio/wrfile.c:516:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char header[INFOBYTES];
data/macutils-2.0b3/fileio/wrfile.c:590:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(buffer + I_TYPEOFF, theinfo.fi_fndr, 4);
data/macutils-2.0b3/fileio/wrfile.c:591:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(buffer + I_AUTHOFF, theinfo.fi_fndr + 4, 4);
data/macutils-2.0b3/fileio/wrfile.c:592:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(buffer + I_FLAGOFF, theinfo.fi_fndr + 8, 2);
data/macutils-2.0b3/fileio/wrfile.c:598:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void)strcpy((char *)theinfo.fi_comnt,
data/macutils-2.0b3/fileio/wrfile.c:655:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(buffer + I_TYPEOFF, theinfo.fi_type, 4);
data/macutils-2.0b3/fileio/wrfile.c:656:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(buffer + I_AUTHOFF, theinfo.fi_auth, 4);
data/macutils-2.0b3/fileio/wrfile.c:657:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(buffer + I_FLAGOFF, theinfo.fi_finfo, 2);
data/macutils-2.0b3/fileio/wrfile.c:667:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void)strcpy((char *)theinfo.fi_comment,
data/macutils-2.0b3/fileio/wrfile.c:817:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char options[20];
data/macutils-2.0b3/fileio/wrfile.c:826:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    (void)strcat(options, "f3");
data/macutils-2.0b3/fileio/wrfile.c:828:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	(void)strcat(options, "rduU");
data/macutils-2.0b3/hexbin/globals.c:8:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char info[INFOBYTES];
data/macutils-2.0b3/hexbin/globals.c:9:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char trname[64];
data/macutils-2.0b3/hexbin/globals.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_name[128];
data/macutils-2.0b3/hexbin/globals.h:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_type[4];
data/macutils-2.0b3/hexbin/globals.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_author[4];
data/macutils-2.0b3/hexbin/hecx.c:191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[BUFSIZ];
data/macutils-2.0b3/hexbin/hexbin.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char options[128];
data/macutils-2.0b3/hexbin/hexbin.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char macname[32];
data/macutils-2.0b3/hexbin/hexbin.c:167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char namebuf[256];
data/macutils-2.0b3/hexbin/hexbin.c:189:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ifp = fopen(namebuf, "r");
data/macutils-2.0b3/hexbin/hexbin.c:243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[INFOBYTES];
data/macutils-2.0b3/hexbin/hqx.c:31:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char lookup[256] = {
data/macutils-2.0b3/hexbin/hqx.c:84:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char obuf[BUFSIZ];
data/macutils-2.0b3/hexbin/mu.c:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[BUFSIZ];
data/macutils-2.0b3/hexbin/printhdr.c:20:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/hexbin/readline.c:4:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char line[1024];	/* Allow a lot! */
data/macutils-2.0b3/macunpack/arc.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fname[31];
data/macutils-2.0b3/macunpack/arc.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ftype[4];
data/macutils-2.0b3/macunpack/arc.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fauth[4];
data/macutils-2.0b3/macunpack/arc.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		finfo[8];
data/macutils-2.0b3/macunpack/arc.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fname2[13];
data/macutils-2.0b3/macunpack/bin.c:16:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hdr[INFOBYTES];
data/macutils-2.0b3/macunpack/cpt.c:32:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char cpt_LZbuff[CIRCSIZE];
data/macutils-2.0b3/macunpack/cpt.c:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[CHDRSIZE];
data/macutils-2.0b3/macunpack/cpt.c:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/cpt.c:298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc_name[64];
data/macutils-2.0b3/macunpack/cpt.h:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	fName[32];	/* a STR32 */
data/macutils-2.0b3/macunpack/dd.c:76:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char dd_LZbuff[2048];
data/macutils-2.0b3/macunpack/dd.c:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/dd.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char locname[64];
data/macutils-2.0b3/macunpack/dd.c:330:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/dd.h:56:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	magic[4];	/* "DDAR" */
data/macutils-2.0b3/macunpack/dd.h:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	fill1[4];	/* ??? */
data/macutils-2.0b3/macunpack/dd.h:58:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	fName[64];	/* a STR63 */
data/macutils-2.0b3/macunpack/dd.h:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	fill2[18];	/* ??? */
data/macutils-2.0b3/macunpack/dd.h:77:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	magic[4];	/* "\253\315\000\124" */
data/macutils-2.0b3/macunpack/dd.h:93:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	fill1[6];	/* ??? */
data/macutils-2.0b3/macunpack/dd.h:100:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	fill2[20];	/* ??? */
data/macutils-2.0b3/macunpack/de_compress.c:29:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define tab_suffixof(i)	((unsigned char *)(htab))[i]
data/macutils-2.0b3/macunpack/de_compress.c:120:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char rmask[9] =
data/macutils-2.0b3/macunpack/de_compress.c:132:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char buf[BITS];
data/macutils-2.0b3/macunpack/de_lzah.c:88:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char lzah_buf[4096];
data/macutils-2.0b3/macunpack/de_lzh.c:86:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char c_len[NC], pt_len[NPT];
data/macutils-2.0b3/macunpack/dia.c:25:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char dia_bitbuf[BCHUNKSIZE];
data/macutils-2.0b3/macunpack/dia.c:116:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char lname[32];
data/macutils-2.0b3/macunpack/dia.c:198:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char lname[32];
data/macutils-2.0b3/macunpack/dia.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/dia.c:355:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char block[CHUNKSIZE];
data/macutils-2.0b3/macunpack/globals.c:6:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char info[INFOBYTES];
data/macutils-2.0b3/macunpack/globals.c:7:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char text[F_NAMELEN+1];
data/macutils-2.0b3/macunpack/jdw.c:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fauth[5], ftype[5];
data/macutils-2.0b3/macunpack/jdw.h:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		magic[6];
data/macutils-2.0b3/macunpack/jdw.h:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		finfo[8];
data/macutils-2.0b3/macunpack/jdw.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fname[32];	/* actually flength */
data/macutils-2.0b3/macunpack/lzc.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hdr[HEADERBYTES];
data/macutils-2.0b3/macunpack/lzc.c:34:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/lzc.c:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char subheader[3];
data/macutils-2.0b3/macunpack/lzh.c:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char lzh_lzbuf[LZBUFFSIZE];
data/macutils-2.0b3/macunpack/lzh.c:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc_name[64];
data/macutils-2.0b3/macunpack/lzh.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dirinfo[INFOBYTES];
data/macutils-2.0b3/macunpack/lzh.c:368:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/lzh.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		method[5];
data/macutils-2.0b3/macunpack/lzh.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[32];
data/macutils-2.0b3/macunpack/macbinary.c:63:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[INFOBYTES];
data/macutils-2.0b3/macunpack/macbinary.c:522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[1024];
data/macutils-2.0b3/macunpack/macbinary.c:542:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[255];
data/macutils-2.0b3/macunpack/macunpack.c:28:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char options[128];
data/macutils-2.0b3/macunpack/macunpack.c:138:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((infp = fopen(argv[optind], "r")) == NULL) {
data/macutils-2.0b3/macunpack/mcb.c:18:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/pit.c:26:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pithdr[4];
data/macutils-2.0b3/macunpack/pit.c:168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hdr[HDRBYTES];
data/macutils-2.0b3/macunpack/pit.c:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/pit.h:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[63];		/* name of packed file */
data/macutils-2.0b3/macunpack/pit.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[4];		/* file type */
data/macutils-2.0b3/macunpack/pit.h:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char auth[4];		/* file creator */
data/macutils-2.0b3/macunpack/sit.c:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char sit_buffer[32768];
data/macutils-2.0b3/macunpack/sit.c:138:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[SITHDRSIZE];
data/macutils-2.0b3/macunpack/sit.c:163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hdr[FILEHDRSIZE];
data/macutils-2.0b3/macunpack/sit.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/sit.c:328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc_name[64];
data/macutils-2.0b3/macunpack/sit.c:644:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char byte_int[4], byte_short[2];
data/macutils-2.0b3/macunpack/sit.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reserved[7];
data/macutils-2.0b3/macunpack/sit.h:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	fName[64];	/* a STR63 */
data/macutils-2.0b3/macunpack/sit.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reserved[6];
data/macutils-2.0b3/macunpack/stf.c:20:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char length[256];
data/macutils-2.0b3/macunpack/stf.c:29:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magic[3], fauth[5], ftype[5];
data/macutils-2.0b3/macunpack/stf.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		magic[3];
data/macutils-2.0b3/macunpack/stf.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fname[32];	/* actually flength */
data/macutils-2.0b3/macunpack/zma.c:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/macunpack/zma.c:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc_name[64];
data/macutils-2.0b3/macunpack/zma.h:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	fName[32];	/* a STR32 */
data/macutils-2.0b3/mixed/globals.c:4:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char info[INFOBYTES];
data/macutils-2.0b3/mixed/globals.c:5:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char text[F_NAMELEN+1];
data/macutils-2.0b3/mixed/macbinary.c:17:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[INFOBYTES];
data/macutils-2.0b3/mixed/macbinary.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[1024];
data/macutils-2.0b3/mixed/macbinary.c:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[1024], filename1[255];
data/macutils-2.0b3/mixed/macsave.c:14:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char options[128];
data/macutils-2.0b3/mixed/macstream.c:18:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char options[128];
data/macutils-2.0b3/mixed/macstream.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text[32], ftype[5], fauth[5];
data/macutils-2.0b3/mixed/mcb.c:18:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftype[5], fauth[5];
data/macutils-2.0b3/util/util.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *tp, temp[10];
data/macutils-2.0b3/comm/tty.c:93:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    i = read(ttyfd, &c, 1);
data/macutils-2.0b3/comm/tty.c:117:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	i = read(ttyfd, buf, cc);
data/macutils-2.0b3/fileio/rdfile.c:48:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern char *strncpy();
data/macutils-2.0b3/fileio/rdfile.c:227:12:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    (void)strcat(filename, "/");
data/macutils-2.0b3/fileio/rdfile.c:249:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	j = strlen(current_files->files[i]) - 5;
data/macutils-2.0b3/fileio/rdfile.c:362:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	file_info[I_NAMEOFF] = strlen(filename);
data/macutils-2.0b3/fileio/rdfile.c:377:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		(void)strncpy(file_info + I_TYPEOFF, "RSRC", 4);
data/macutils-2.0b3/fileio/rdfile.c:379:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		(void)strncpy(file_info + I_TYPEOFF, f_type, 4);
data/macutils-2.0b3/fileio/rdfile.c:382:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		(void)strncpy(file_info + I_AUTHOFF, "RSED", 4);
data/macutils-2.0b3/fileio/rdfile.c:384:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		(void)strncpy(file_info + I_AUTHOFF, f_auth, 4);
data/macutils-2.0b3/fileio/rdfile.c:408:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		(void)strncpy(file_info + I_TYPEOFF, "TEXT", 4);
data/macutils-2.0b3/fileio/rdfile.c:410:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		(void)strncpy(file_info + I_TYPEOFF, f_type, 4);
data/macutils-2.0b3/fileio/rdfile.c:413:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		(void)strncpy(file_info + I_AUTHOFF, "MACA", 4);
data/macutils-2.0b3/fileio/rdfile.c:415:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		(void)strncpy(file_info + I_AUTHOFF, f_auth, 4);
data/macutils-2.0b3/fileio/rdfile.c:440:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lname = strlen(filename) - 5;
data/macutils-2.0b3/fileio/rdfile.c:526:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		(void)fgetc(fd);
data/macutils-2.0b3/fileio/rdfile.c:548:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void)strcat(filename1, "/");
data/macutils-2.0b3/fileio/rdfile.c:556:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void)strcat(filename1, "/");
data/macutils-2.0b3/fileio/rdfile.c:607:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void)strcat(filename1, "/");
data/macutils-2.0b3/fileio/rdfile.c:675:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    file_info[I_NAMEOFF] = strlen(filename);
data/macutils-2.0b3/fileio/rdfile.c:686:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namlen = strlen(curentry->d_name);
data/macutils-2.0b3/fileio/rdfile.c:706:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cursize += (strlen(filetable + cursize) + 1);
data/macutils-2.0b3/fileio/rdfile.c:721:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void)strcat(filename1, "/");
data/macutils-2.0b3/fileio/rdfile.c:798:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen(theinfo.fi_macfilename);
data/macutils-2.0b3/fileio/rdfile.c:799:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	(void)strncpy(file_info + I_NAMEOFF + 1, (char *)theinfo.fi_macfilename,
data/macutils-2.0b3/fileio/rdfile.c:802:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen(theinfo.fi_shortfilename);
data/macutils-2.0b3/fileio/rdfile.c:803:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	(void)strncpy(file_info + I_NAMEOFF + 1,
data/macutils-2.0b3/fileio/rdfile.c:806:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen(filename);
data/macutils-2.0b3/fileio/rdfile.c:807:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	(void)strncpy(file_info + I_NAMEOFF + 1, filename, n);
data/macutils-2.0b3/fileio/rdfile.c:862:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(file_info + I_NAMEOFF + 1, theinfo.fi_name, n);
data/macutils-2.0b3/fileio/rdfile.c:876:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    i = fgetc(stdin);
data/macutils-2.0b3/fileio/rdfile.c:910:12:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    (void)fgetc(stdin);
data/macutils-2.0b3/fileio/rdfile.c:928:12:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    (void)fgetc(stdin);
data/macutils-2.0b3/fileio/rdfile.c:959:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	(void)strncpy(f_auth, name, 4);
data/macutils-2.0b3/fileio/rdfile.c:963:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	(void)strncpy(f_type, name, 4);
data/macutils-2.0b3/fileio/wrfile.c:41:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern char *strncpy();
data/macutils-2.0b3/fileio/wrfile.c:340:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(name);
data/macutils-2.0b3/fileio/wrfile.c:442:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void)strcat(dirinfo, "/");
data/macutils-2.0b3/fileio/wrfile.c:596:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy((char *)theinfo.fi_macfilename, buffer + I_NAMEOFF + 1,n);
data/macutils-2.0b3/fileio/wrfile.c:600:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    theinfo.fi_comln = strlen((char *)theinfo.fi_comnt);
data/macutils-2.0b3/fileio/wrfile.c:665:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy((char *)theinfo.fi_name, buffer + I_NAMEOFF + 1,n);
data/macutils-2.0b3/fileio/wrfile.c:669:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    put4(theinfo.fi_commsize, (unsigned long)strlen(theinfo.fi_comment));
data/macutils-2.0b3/fileio/wrfile.c:819:11:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void)strcpy(options, "b");
data/macutils-2.0b3/fileio/wrfile.c:821:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void)strcat(options, "s");
data/macutils-2.0b3/fileio/wrfile.c:823:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void)strcat(options, "S");
data/macutils-2.0b3/fileio/wrfile.c:830:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    (void)strcat(options, "a");
data/macutils-2.0b3/hexbin/dl.c:42:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen(macname);
data/macutils-2.0b3/hexbin/dl.c:50:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(macname);
data/macutils-2.0b3/hexbin/dl.c:54:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(mh.m_name, macname, n);
data/macutils-2.0b3/hexbin/dl.c:55:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    (void)strncpy(mh.m_type, "APPL", 4);
data/macutils-2.0b3/hexbin/dl.c:56:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    (void)strncpy(mh.m_author, "????", 4);
data/macutils-2.0b3/hexbin/dl.c:67:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_NAMEOFF + 1, mh.m_name, n);
data/macutils-2.0b3/hexbin/dl.c:68:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_TYPEOFF, mh.m_type, 4);
data/macutils-2.0b3/hexbin/dl.c:69:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_AUTHOFF, mh.m_author, 4);
data/macutils-2.0b3/hexbin/hecx.c:46:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen(macname);
data/macutils-2.0b3/hexbin/hecx.c:55:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(macname);
data/macutils-2.0b3/hexbin/hecx.c:59:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(mh.m_name, macname, n);
data/macutils-2.0b3/hexbin/hecx.c:63:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(line);
data/macutils-2.0b3/hexbin/hecx.c:66:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    (void)strncpy(mh.m_type, &line[1], 4);
data/macutils-2.0b3/hexbin/hecx.c:69:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    (void)strncpy(mh.m_author, &line[5], 4);
data/macutils-2.0b3/hexbin/hecx.c:86:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_NAMEOFF + 1, mh.m_name, n);
data/macutils-2.0b3/hexbin/hecx.c:87:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_TYPEOFF, mh.m_type, 4);
data/macutils-2.0b3/hexbin/hecx.c:88:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_AUTHOFF, mh.m_author, 4);
data/macutils-2.0b3/hexbin/hecx.c:197:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    numread = strlen(line);
data/macutils-2.0b3/hexbin/hecx.c:226:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(line);
data/macutils-2.0b3/hexbin/hexbin.c:248:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    c = fgetc(ifp);
data/macutils-2.0b3/hexbin/hexbin.c:252:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = fgetc(ifp);
data/macutils-2.0b3/hexbin/hexbin.c:298:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	llen = strlen(line);
data/macutils-2.0b3/hexbin/hqx.c:122:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen((char *)line);
data/macutils-2.0b3/hexbin/hqx.c:142:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    c = fgetc(ifp);
data/macutils-2.0b3/hexbin/hqx.c:252:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(g_macname);
data/macutils-2.0b3/hexbin/hqx.c:256:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(mh.m_name, g_macname, n);
data/macutils-2.0b3/hexbin/hqx.c:276:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_NAMEOFF + 1, mh.m_name, n);
data/macutils-2.0b3/hexbin/hqx.c:277:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_TYPEOFF, mh.m_type, 4);
data/macutils-2.0b3/hexbin/hqx.c:278:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_AUTHOFF, mh.m_author, 4);
data/macutils-2.0b3/hexbin/mu.c:35:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	line[strlen(line) - 1] = 0;
data/macutils-2.0b3/hexbin/mu.c:37:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(macname);
data/macutils-2.0b3/hexbin/mu.c:41:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(mh.m_name, macname, n);
data/macutils-2.0b3/hexbin/mu.c:44:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(info + I_NAMEOFF + 1, mh.m_name, n);
data/macutils-2.0b3/hexbin/mu.c:135:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(mh.m_type, info + I_TYPEOFF, 4);
data/macutils-2.0b3/hexbin/mu.c:136:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(mh.m_author, info + I_AUTHOFF, 4);
data/macutils-2.0b3/hexbin/mu.c:204:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    numread = strlen(ip);
data/macutils-2.0b3/hexbin/readline.c:17:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    c = getc(ifp);
data/macutils-2.0b3/hexbin/readline.c:32:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(ifp);
data/macutils-2.0b3/macunpack/cpt.c:101:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	*cptptr = getc(infp);
data/macutils-2.0b3/macunpack/dd.c:15:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern char *strncpy();
data/macutils-2.0b3/macunpack/lzc.c:139:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if(getc(infp) == EOF) {
data/macutils-2.0b3/macunpack/lzc.c:173:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if(getc(infp) == EOF) {
data/macutils-2.0b3/macunpack/macbinary.c:67:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if((c = fgetc(infp)) == EOF) {
data/macutils-2.0b3/macunpack/macbinary.c:483:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    c = getc(infp);
data/macutils-2.0b3/macunpack/macunpack.c:150:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(infp);
data/macutils-2.0b3/macunpack/mcb.c:112:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    if(getc(infp) == EOF) {
data/macutils-2.0b3/macunpack/mcb.c:127:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    if(getc(infp) == EOF) {
data/macutils-2.0b3/macunpack/sit.c:544:5:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if(getc(infp) == EOF) {
data/macutils-2.0b3/mixed/macbinary.c:21:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if((c = fgetc(infp)) == EOF) {
data/macutils-2.0b3/mixed/macsave.c:77:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(infp);
data/macutils-2.0b3/mixed/mcb.c:90:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    if(getc(infp) == EOF) {
data/macutils-2.0b3/mixed/mcb.c:102:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    if(getc(infp) == EOF) {
data/macutils-2.0b3/util/transname.c:4:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char *strncpy();
data/macutils-2.0b3/util/transname.c:96:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void)strncpy(namebuf, name, n);
data/macutils-2.0b3/util/util.c:78:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(fp);
data/macutils-2.0b3/util/util.c:101:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    (void) read(2, temp, sizeof(temp));

ANALYSIS SUMMARY:

Hits = 415
Lines analyzed = 14102 in approximately 0.43 seconds (32923 lines/second)
Physical Source Lines of Code (SLOC) = 12720
Hits@level = [0] 654 [1] 102 [2] 240 [3]   7 [4]  66 [5]   0
Hits@level+ = [0+] 1069 [1+] 415 [2+] 313 [3+]  73 [4+]  66 [5+]   0
Hits/KSLOC@level+ = [0+] 84.0409 [1+] 32.6258 [2+] 24.6069 [3+] 5.73899 [4+] 5.18868 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.